mirror of https://github.com/fail2ban/fail2ban
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
234 lines
7.0 KiB
234 lines
7.0 KiB
# emacs: -*- mode: python; py-indent-offset: 4; indent-tabs-mode: t -*-
|
|
# vi: set ft=python sts=4 ts=4 sw=4 noet :
|
|
|
|
# This file is part of Fail2Ban.
|
|
#
|
|
# Fail2Ban is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# Fail2Ban is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with Fail2Ban; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
# Author: Cyril Jaquier
|
|
#
|
|
# $Revision$
|
|
|
|
__author__ = "Cyril Jaquier"
|
|
__version__ = "$Revision$"
|
|
__date__ = "$Date$"
|
|
__copyright__ = "Copyright (c) 2004 Cyril Jaquier"
|
|
__license__ = "GPL"
|
|
|
|
import unittest
|
|
import time
|
|
|
|
from server.filterpoll import FilterPoll
|
|
from server.filter import FileFilter, DNSUtils
|
|
from server.failmanager import FailManager
|
|
from server.failmanager import FailManagerEmpty
|
|
|
|
class IgnoreIP(unittest.TestCase):
|
|
|
|
def setUp(self):
|
|
"""Call before every test case."""
|
|
self.__filter = FileFilter(None)
|
|
|
|
def tearDown(self):
|
|
"""Call after every test case."""
|
|
|
|
def testIgnoreIPOK(self):
|
|
ipList = "127.0.0.1", "192.168.0.1", "255.255.255.255", "99.99.99.99"
|
|
for ip in ipList:
|
|
self.__filter.addIgnoreIP(ip)
|
|
self.assertTrue(self.__filter.inIgnoreIPList(ip))
|
|
# Test DNS
|
|
self.__filter.addIgnoreIP("www.epfl.ch")
|
|
self.assertTrue(self.__filter.inIgnoreIPList("128.178.50.12"))
|
|
|
|
def testIgnoreIPNOK(self):
|
|
ipList = "", "999.999.999.999", "abcdef", "192.168.0."
|
|
for ip in ipList:
|
|
self.__filter.addIgnoreIP(ip)
|
|
self.assertFalse(self.__filter.inIgnoreIPList(ip))
|
|
# Test DNS
|
|
self.__filter.addIgnoreIP("www.epfl.ch")
|
|
self.assertFalse(self.__filter.inIgnoreIPList("127.177.50.10"))
|
|
|
|
|
|
class LogFile(unittest.TestCase):
|
|
|
|
FILENAME = "testcases/files/testcase01.log"
|
|
|
|
def setUp(self):
|
|
"""Call before every test case."""
|
|
self.__filter = FilterPoll(None)
|
|
self.__filter.addLogPath(LogFile.FILENAME)
|
|
|
|
def tearDown(self):
|
|
"""Call after every test case."""
|
|
|
|
#def testOpen(self):
|
|
# self.__filter.openLogFile(LogFile.FILENAME)
|
|
|
|
def testIsModified(self):
|
|
self.assertTrue(self.__filter.isModified(LogFile.FILENAME))
|
|
|
|
|
|
class GetFailures(unittest.TestCase):
|
|
|
|
FILENAME_01 = "testcases/files/testcase01.log"
|
|
FILENAME_02 = "testcases/files/testcase02.log"
|
|
FILENAME_03 = "testcases/files/testcase03.log"
|
|
FILENAME_04 = "testcases/files/testcase04.log"
|
|
|
|
def setUp(self):
|
|
"""Call before every test case."""
|
|
self.__filter = FileFilter(None)
|
|
self.__filter.setActive(True)
|
|
# TODO Test this
|
|
#self.__filter.setTimeRegex("\S{3}\s{1,2}\d{1,2} \d{2}:\d{2}:\d{2}")
|
|
#self.__filter.setTimePattern("%b %d %H:%M:%S")
|
|
|
|
def tearDown(self):
|
|
"""Call after every test case."""
|
|
|
|
def _assertEqualEntries(self, found, output):
|
|
"""Little helper to unify comparisons with the target entries
|
|
|
|
and report helpful failure reports instead of millions of seconds ;)
|
|
"""
|
|
self.assertEqual(found[:2], output[:2])
|
|
found_time, output_time = \
|
|
time.localtime(found[2]),\
|
|
time.localtime(output[2])
|
|
self.assertEqual(found_time, output_time)
|
|
if len(found) > 3: # match matches
|
|
self.assertEqual(found[3], output[3])
|
|
|
|
|
|
def testGetFailures01(self):
|
|
output = ('193.168.0.128', 3, 1124013599.0,
|
|
['Aug 14 11:59:59 [sshd] error: PAM: Authentication failure for kevin from 193.168.0.128\n']*3)
|
|
|
|
self.__filter.addLogPath(GetFailures.FILENAME_01)
|
|
self.__filter.addFailRegex("(?:(?:Authentication failure|Failed [-/\w+]+) for(?: [iI](?:llegal|nvalid) user)?|[Ii](?:llegal|nvalid) user|ROOT LOGIN REFUSED) .*(?: from|FROM) <HOST>")
|
|
|
|
self.__filter.getFailures(GetFailures.FILENAME_01)
|
|
|
|
ticket = self.__filter.failManager.toBan()
|
|
|
|
attempts = ticket.getAttempt()
|
|
date = ticket.getTime()
|
|
ip = ticket.getIP()
|
|
matches = ticket.getMatches()
|
|
found = (ip, attempts, date, matches)
|
|
|
|
self._assertEqualEntries(found, output)
|
|
|
|
def testGetFailures02(self):
|
|
output = ('141.3.81.106', 4, 1124013539.0,
|
|
['Aug 14 11:%d:59 i60p295 sshd[12365]: Failed publickey for roehl from ::ffff:141.3.81.106 port 51332 ssh2\n'
|
|
% m for m in 53, 54, 57, 58])
|
|
|
|
self.__filter.addLogPath(GetFailures.FILENAME_02)
|
|
self.__filter.addFailRegex("Failed .* from <HOST>")
|
|
|
|
self.__filter.getFailures(GetFailures.FILENAME_02)
|
|
|
|
ticket = self.__filter.failManager.toBan()
|
|
|
|
attempts = ticket.getAttempt()
|
|
date = ticket.getTime()
|
|
ip = ticket.getIP()
|
|
matches = ticket.getMatches()
|
|
found = (ip, attempts, date, matches)
|
|
|
|
self._assertEqualEntries(found, output)
|
|
|
|
def testGetFailures03(self):
|
|
output = ('203.162.223.135', 6, 1124013544.0)
|
|
|
|
self.__filter.addLogPath(GetFailures.FILENAME_03)
|
|
self.__filter.addFailRegex("error,relay=<HOST>,.*550 User unknown")
|
|
|
|
self.__filter.getFailures(GetFailures.FILENAME_03)
|
|
|
|
ticket = self.__filter.failManager.toBan()
|
|
|
|
attempts = ticket.getAttempt()
|
|
date = ticket.getTime()
|
|
ip = ticket.getIP()
|
|
found = (ip, attempts, date)
|
|
|
|
self._assertEqualEntries(found, output)
|
|
|
|
def testGetFailures04(self):
|
|
output = [('212.41.96.186', 4, 1124013600.0),
|
|
('212.41.96.185', 4, 1124013598.0)]
|
|
|
|
self.__filter.addLogPath(GetFailures.FILENAME_04)
|
|
self.__filter.addFailRegex("Invalid user .* <HOST>")
|
|
|
|
self.__filter.getFailures(GetFailures.FILENAME_04)
|
|
|
|
try:
|
|
for i in range(2):
|
|
ticket = self.__filter.failManager.toBan()
|
|
attempts = ticket.getAttempt()
|
|
date = ticket.getTime()
|
|
ip = ticket.getIP()
|
|
found = (ip, attempts, date)
|
|
self.assertEqual(found, output[i])
|
|
except FailManagerEmpty:
|
|
pass
|
|
|
|
def testGetFailuresMultiRegex(self):
|
|
output = ('141.3.81.106', 8, 1124013541.0)
|
|
|
|
self.__filter.addLogPath(GetFailures.FILENAME_02)
|
|
self.__filter.addFailRegex("Failed .* from <HOST>")
|
|
self.__filter.addFailRegex("Accepted .* from <HOST>")
|
|
|
|
self.__filter.getFailures(GetFailures.FILENAME_02)
|
|
|
|
ticket = self.__filter.failManager.toBan()
|
|
|
|
attempts = ticket.getAttempt()
|
|
date = ticket.getTime()
|
|
ip = ticket.getIP()
|
|
found = (ip, attempts, date)
|
|
|
|
self._assertEqualEntries(found, output)
|
|
|
|
def testGetFailuresIgnoreRegex(self):
|
|
output = ('141.3.81.106', 8, 1124013541.0)
|
|
|
|
self.__filter.addLogPath(GetFailures.FILENAME_02)
|
|
self.__filter.addFailRegex("Failed .* from <HOST>")
|
|
self.__filter.addFailRegex("Accepted .* from <HOST>")
|
|
self.__filter.addIgnoreRegex("for roehl")
|
|
|
|
self.__filter.getFailures(GetFailures.FILENAME_02)
|
|
|
|
self.assertRaises(FailManagerEmpty, self.__filter.failManager.toBan)
|
|
|
|
class DNSUtilsTests(unittest.TestCase):
|
|
|
|
def testTextToIp(self):
|
|
# Bogus addresses which should have no DNS matches
|
|
bogus = [
|
|
'doh1.2.3.4.buga.xxxxx.yyy.invalid',
|
|
'1.2.3.4.buga.xxxxx.yyy.invalid',
|
|
]
|
|
for s in bogus:
|
|
res = DNSUtils.textToIp(s)
|
|
self.assertEqual(res, [])
|