upload
This commit is contained in:
63
backends/base.py
Normal file
63
backends/base.py
Normal file
@@ -0,0 +1,63 @@
|
||||
"""
|
||||
Bazowa klasa dla backendów firewall
|
||||
"""
|
||||
|
||||
import logging
|
||||
|
||||
|
||||
class FirewallBackend:
|
||||
"""Bazowa klasa dla backendów firewall"""
|
||||
|
||||
def __init__(self, config):
|
||||
"""
|
||||
Args:
|
||||
config: ConfigParser object z konfiguracją
|
||||
"""
|
||||
self.config = config
|
||||
self.logger = logging.getLogger(self.__class__.__name__)
|
||||
|
||||
def ban_ip(self, ip, duration):
|
||||
"""
|
||||
Banuje IP na określony czas
|
||||
|
||||
Args:
|
||||
ip: Adres IP do zbanowania
|
||||
duration: Czas bana w sekundach
|
||||
|
||||
Returns:
|
||||
bool: True jeśli ban się powiódł
|
||||
"""
|
||||
raise NotImplementedError("Subclasses must implement ban_ip()")
|
||||
|
||||
def unban_ip(self, ip):
|
||||
"""
|
||||
Usuwa ban dla IP
|
||||
|
||||
Args:
|
||||
ip: Adres IP do odbanowania
|
||||
|
||||
Returns:
|
||||
bool: True jeśli odbanowanie się powiodło
|
||||
"""
|
||||
raise NotImplementedError("Subclasses must implement unban_ip()")
|
||||
|
||||
def is_banned(self, ip):
|
||||
"""
|
||||
Sprawdza czy IP jest zbanowany
|
||||
|
||||
Args:
|
||||
ip: Adres IP do sprawdzenia
|
||||
|
||||
Returns:
|
||||
bool: True jeśli IP jest zbanowany
|
||||
"""
|
||||
raise NotImplementedError("Subclasses must implement is_banned()")
|
||||
|
||||
def test_availability(self):
|
||||
"""
|
||||
Sprawdza czy backend jest dostępny w systemie
|
||||
|
||||
Returns:
|
||||
bool: True jeśli backend jest dostępny
|
||||
"""
|
||||
return True
|
||||
102
backends/csf.py
Normal file
102
backends/csf.py
Normal file
@@ -0,0 +1,102 @@
|
||||
"""
|
||||
Backend dla ConfigServer Security & Firewall (CSF)
|
||||
"""
|
||||
|
||||
import subprocess
|
||||
from pathlib import Path
|
||||
from .base import FirewallBackend
|
||||
|
||||
|
||||
class CSFBackend(FirewallBackend):
|
||||
"""Backend dla ConfigServer Firewall"""
|
||||
|
||||
def __init__(self, config):
|
||||
super().__init__(config)
|
||||
self.csf_path = config.get('backend_csf', 'csf_path',
|
||||
fallback='/usr/sbin/csf')
|
||||
|
||||
if not self.test_availability():
|
||||
self.logger.warning(f"CSF not found at {self.csf_path}")
|
||||
|
||||
def test_availability(self):
|
||||
"""Sprawdza czy CSF jest zainstalowany"""
|
||||
return Path(self.csf_path).exists()
|
||||
|
||||
def ban_ip(self, ip, duration):
|
||||
"""
|
||||
Banuje IP używając CSF
|
||||
|
||||
CSF używa:
|
||||
- csf -d IP "comment" - permanent deny
|
||||
- csf -td IP duration "comment" - temporary deny
|
||||
"""
|
||||
try:
|
||||
# Temporary deny na określony czas (w sekundach)
|
||||
cmd = [
|
||||
self.csf_path, '-td', ip,
|
||||
str(duration),
|
||||
f"LogMon auto-ban"
|
||||
]
|
||||
|
||||
result = subprocess.run(
|
||||
cmd,
|
||||
capture_output=True,
|
||||
text=True,
|
||||
timeout=10
|
||||
)
|
||||
|
||||
if result.returncode == 0:
|
||||
self.logger.debug(f"CSF ban successful: {result.stdout.strip()}")
|
||||
return True
|
||||
else:
|
||||
self.logger.error(f"CSF ban failed: {result.stderr.strip()}")
|
||||
return False
|
||||
|
||||
except subprocess.TimeoutExpired:
|
||||
self.logger.error(f"CSF ban command timed out for {ip}")
|
||||
return False
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error banning IP with CSF: {e}")
|
||||
return False
|
||||
|
||||
def unban_ip(self, ip):
|
||||
"""Usuwa ban używając CSF"""
|
||||
try:
|
||||
# Remove temporary ban
|
||||
cmd = [self.csf_path, '-tr', ip]
|
||||
result = subprocess.run(
|
||||
cmd,
|
||||
capture_output=True,
|
||||
text=True,
|
||||
timeout=10
|
||||
)
|
||||
|
||||
if result.returncode == 0:
|
||||
self.logger.debug(f"CSF unban successful for {ip}")
|
||||
return True
|
||||
else:
|
||||
self.logger.warning(f"CSF unban may have failed: {result.stderr.strip()}")
|
||||
# CSF czasem zwraca error nawet gdy się udało
|
||||
return True
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error unbanning IP with CSF: {e}")
|
||||
return False
|
||||
|
||||
def is_banned(self, ip):
|
||||
"""Sprawdza czy IP jest zbanowany w CSF"""
|
||||
try:
|
||||
cmd = [self.csf_path, '-g', ip]
|
||||
result = subprocess.run(
|
||||
cmd,
|
||||
capture_output=True,
|
||||
text=True,
|
||||
timeout=10
|
||||
)
|
||||
|
||||
output = result.stdout.lower()
|
||||
return "deny" in output or "drop" in output
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error checking ban status: {e}")
|
||||
return False
|
||||
17
backends/init.py
Normal file
17
backends/init.py
Normal file
@@ -0,0 +1,17 @@
|
||||
"""
|
||||
LogMon Backends - Integracje z różnymi firewallami
|
||||
"""
|
||||
|
||||
from .base import FirewallBackend
|
||||
from .csf import CSFBackend
|
||||
from .nftables import NFTablesBackend
|
||||
from .iptables import IPTablesBackend
|
||||
from .ufw import UFWBackend
|
||||
|
||||
__all__ = [
|
||||
'FirewallBackend',
|
||||
'CSFBackend',
|
||||
'NFTablesBackend',
|
||||
'IPTablesBackend',
|
||||
'UFWBackend'
|
||||
]
|
||||
104
backends/iptables.py
Normal file
104
backends/iptables.py
Normal file
@@ -0,0 +1,104 @@
|
||||
"""
|
||||
Backend dla iptables
|
||||
"""
|
||||
|
||||
import subprocess
|
||||
from .base import FirewallBackend
|
||||
|
||||
|
||||
class IPTablesBackend(FirewallBackend):
|
||||
"""Backend dla iptables"""
|
||||
|
||||
def __init__(self, config):
|
||||
super().__init__(config)
|
||||
self.chain = config.get('backend_iptables', 'chain_name',
|
||||
fallback='LOGMON_BLOCK')
|
||||
|
||||
if self.test_availability():
|
||||
self.setup_chain()
|
||||
else:
|
||||
self.logger.warning("iptables not available")
|
||||
|
||||
def test_availability(self):
|
||||
"""Sprawdza czy iptables jest dostępny"""
|
||||
try:
|
||||
result = subprocess.run(
|
||||
['iptables', '--version'],
|
||||
capture_output=True,
|
||||
timeout=5
|
||||
)
|
||||
return result.returncode == 0
|
||||
except:
|
||||
return False
|
||||
|
||||
def setup_chain(self):
|
||||
"""Tworzy chain jeśli nie istnieje"""
|
||||
try:
|
||||
# Sprawdź czy chain istnieje
|
||||
cmd = ['iptables', '-L', self.chain, '-n']
|
||||
result = subprocess.run(cmd, capture_output=True, timeout=5)
|
||||
|
||||
if result.returncode != 0:
|
||||
# Utwórz chain
|
||||
subprocess.run(['iptables', '-N', self.chain], check=True, timeout=5)
|
||||
|
||||
# Dodaj do INPUT na początku
|
||||
subprocess.run(
|
||||
['iptables', '-I', 'INPUT', '1', '-j', self.chain],
|
||||
check=True,
|
||||
timeout=5
|
||||
)
|
||||
|
||||
self.logger.info(f"Created iptables chain: {self.chain}")
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error setting up iptables chain: {e}")
|
||||
|
||||
def ban_ip(self, ip, duration):
|
||||
"""Banuje IP używając iptables"""
|
||||
try:
|
||||
cmd = [
|
||||
'iptables', '-I', self.chain, '1',
|
||||
'-s', ip, '-j', 'DROP',
|
||||
'-m', 'comment', '--comment', f'LogMon ban {duration}s'
|
||||
]
|
||||
|
||||
result = subprocess.run(cmd, capture_output=True, timeout=5)
|
||||
|
||||
if result.returncode == 0:
|
||||
self.logger.debug(f"iptables ban successful for {ip}")
|
||||
return True
|
||||
else:
|
||||
self.logger.error(f"iptables ban failed: {result.stderr.decode()}")
|
||||
return False
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error banning IP with iptables: {e}")
|
||||
return False
|
||||
|
||||
def unban_ip(self, ip):
|
||||
"""Usuwa ban używając iptables"""
|
||||
try:
|
||||
cmd = ['iptables', '-D', self.chain, '-s', ip, '-j', 'DROP']
|
||||
result = subprocess.run(cmd, capture_output=True, timeout=5)
|
||||
|
||||
if result.returncode == 0:
|
||||
self.logger.debug(f"iptables unban successful for {ip}")
|
||||
return True
|
||||
else:
|
||||
self.logger.warning(f"iptables unban may have failed")
|
||||
return False
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error unbanning IP with iptables: {e}")
|
||||
return False
|
||||
|
||||
def is_banned(self, ip):
|
||||
"""Sprawdza czy IP jest zbanowany"""
|
||||
try:
|
||||
cmd = ['iptables', '-L', self.chain, '-n', '--line-numbers']
|
||||
result = subprocess.run(cmd, capture_output=True, text=True, timeout=5)
|
||||
return ip in result.stdout
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error checking ban status: {e}")
|
||||
return False
|
||||
120
backends/nftables.py
Normal file
120
backends/nftables.py
Normal file
@@ -0,0 +1,120 @@
|
||||
"""
|
||||
Backend dla nftables
|
||||
"""
|
||||
|
||||
import subprocess
|
||||
from .base import FirewallBackend
|
||||
|
||||
|
||||
class NFTablesBackend(FirewallBackend):
|
||||
"""Backend dla nftables"""
|
||||
|
||||
def __init__(self, config):
|
||||
super().__init__(config)
|
||||
self.table = config.get('backend_nftables', 'table_name',
|
||||
fallback='filter')
|
||||
self.chain = config.get('backend_nftables', 'chain_name',
|
||||
fallback='logmon_block')
|
||||
|
||||
if self.test_availability():
|
||||
self.setup_chain()
|
||||
else:
|
||||
self.logger.warning("nftables not available")
|
||||
|
||||
def test_availability(self):
|
||||
"""Sprawdza czy nftables jest dostępny"""
|
||||
try:
|
||||
result = subprocess.run(
|
||||
['nft', '--version'],
|
||||
capture_output=True,
|
||||
timeout=5
|
||||
)
|
||||
return result.returncode == 0
|
||||
except:
|
||||
return False
|
||||
|
||||
def setup_chain(self):
|
||||
"""Tworzy chain jeśli nie istnieje"""
|
||||
try:
|
||||
# Sprawdź czy chain istnieje
|
||||
cmd = ['nft', 'list', 'chain', 'inet', self.table, self.chain]
|
||||
result = subprocess.run(cmd, capture_output=True, timeout=5)
|
||||
|
||||
if result.returncode != 0:
|
||||
# Utwórz chain z priorytetem input
|
||||
cmd = [
|
||||
'nft', 'add', 'chain', 'inet', self.table, self.chain,
|
||||
'{', 'type', 'filter', 'hook', 'input', 'priority', '0', ';', '}'
|
||||
]
|
||||
subprocess.run(cmd, check=True, timeout=5)
|
||||
self.logger.info(f"Created nftables chain: {self.chain}")
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error setting up nftables chain: {e}")
|
||||
|
||||
def ban_ip(self, ip, duration):
|
||||
"""Banuje IP używając nftables"""
|
||||
try:
|
||||
# Dodaj regułę DROP
|
||||
cmd = [
|
||||
'nft', 'add', 'rule', 'inet', self.table, self.chain,
|
||||
'ip', 'saddr', ip, 'counter', 'drop',
|
||||
'comment', f'"LogMon ban {duration}s"'
|
||||
]
|
||||
|
||||
result = subprocess.run(cmd, capture_output=True, timeout=5)
|
||||
|
||||
if result.returncode == 0:
|
||||
self.logger.debug(f"nftables ban successful for {ip}")
|
||||
return True
|
||||
else:
|
||||
self.logger.error(f"nftables ban failed: {result.stderr.decode()}")
|
||||
return False
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error banning IP with nftables: {e}")
|
||||
return False
|
||||
|
||||
def unban_ip(self, ip):
|
||||
"""Usuwa ban używając nftables"""
|
||||
try:
|
||||
# Znajdź handle reguły
|
||||
cmd = ['nft', '-a', 'list', 'chain', 'inet', self.table, self.chain]
|
||||
result = subprocess.run(cmd, capture_output=True, text=True, timeout=5)
|
||||
|
||||
if result.returncode != 0:
|
||||
return False
|
||||
|
||||
# Parsuj output i znajdź handle
|
||||
for line in result.stdout.split('\n'):
|
||||
if ip in line and '# handle' in line:
|
||||
try:
|
||||
handle = line.split('# handle')[1].strip()
|
||||
|
||||
# Usuń regułę
|
||||
cmd = [
|
||||
'nft', 'delete', 'rule', 'inet',
|
||||
self.table, self.chain, 'handle', handle
|
||||
]
|
||||
subprocess.run(cmd, check=True, timeout=5)
|
||||
self.logger.debug(f"nftables unban successful for {ip}")
|
||||
return True
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error parsing handle: {e}")
|
||||
|
||||
return False
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error unbanning IP with nftables: {e}")
|
||||
return False
|
||||
|
||||
def is_banned(self, ip):
|
||||
"""Sprawdza czy IP jest zbanowany"""
|
||||
try:
|
||||
cmd = ['nft', 'list', 'chain', 'inet', self.table, self.chain]
|
||||
result = subprocess.run(cmd, capture_output=True, text=True, timeout=5)
|
||||
return ip in result.stdout
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error checking ban status: {e}")
|
||||
return False
|
||||
78
backends/ufw.py
Normal file
78
backends/ufw.py
Normal file
@@ -0,0 +1,78 @@
|
||||
"""
|
||||
Backend dla UFW (Uncomplicated Firewall)
|
||||
"""
|
||||
|
||||
import subprocess
|
||||
from .base import FirewallBackend
|
||||
|
||||
|
||||
class UFWBackend(FirewallBackend):
|
||||
"""Backend dla UFW"""
|
||||
|
||||
def test_availability(self):
|
||||
"""Sprawdza czy UFW jest dostępny"""
|
||||
try:
|
||||
result = subprocess.run(
|
||||
['ufw', 'version'],
|
||||
capture_output=True,
|
||||
timeout=5
|
||||
)
|
||||
return result.returncode == 0
|
||||
except:
|
||||
return False
|
||||
|
||||
def ban_ip(self, ip, duration):
|
||||
"""Banuje IP używając UFW"""
|
||||
try:
|
||||
# UFW nie wspiera natywnie timeout, więc używamy prostego deny
|
||||
cmd = ['ufw', 'deny', 'from', ip]
|
||||
|
||||
result = subprocess.run(cmd, capture_output=True, timeout=5)
|
||||
|
||||
if result.returncode == 0:
|
||||
self.logger.debug(f"UFW ban successful for {ip}")
|
||||
# UFW wymaga reload
|
||||
subprocess.run(['ufw', 'reload'], capture_output=True, timeout=5)
|
||||
return True
|
||||
else:
|
||||
self.logger.error(f"UFW ban failed: {result.stderr.decode()}")
|
||||
return False
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error banning IP with UFW: {e}")
|
||||
return False
|
||||
|
||||
def unban_ip(self, ip):
|
||||
"""Usuwa ban używając UFW"""
|
||||
try:
|
||||
cmd = ['ufw', 'delete', 'deny', 'from', ip]
|
||||
result = subprocess.run(cmd, capture_output=True, timeout=5)
|
||||
|
||||
if result.returncode == 0:
|
||||
self.logger.debug(f"UFW unban successful for {ip}")
|
||||
subprocess.run(['ufw', 'reload'], capture_output=True, timeout=5)
|
||||
return True
|
||||
else:
|
||||
self.logger.warning(f"UFW unban may have failed")
|
||||
return False
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error unbanning IP with UFW: {e}")
|
||||
return False
|
||||
|
||||
def is_banned(self, ip):
|
||||
"""Sprawdza czy IP jest zbanowany"""
|
||||
try:
|
||||
cmd = ['ufw', 'status', 'numbered']
|
||||
result = subprocess.run(cmd, capture_output=True, text=True, timeout=5)
|
||||
|
||||
# Szukaj IP z DENY
|
||||
for line in result.stdout.split('\n'):
|
||||
if ip in line and 'DENY' in line:
|
||||
return True
|
||||
|
||||
return False
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error checking ban status: {e}")
|
||||
return False
|
||||
42
config.ini
Normal file
42
config.ini
Normal file
@@ -0,0 +1,42 @@
|
||||
[general]
|
||||
debug = false
|
||||
log_file = /var/log/logmon.log
|
||||
pid_file = /var/run/logmon.pid
|
||||
backend = csf
|
||||
|
||||
[backend_csf]
|
||||
csf_path = /usr/sbin/csf
|
||||
# Dodatkowe opcje CSF
|
||||
|
||||
[backend_nftables]
|
||||
table_name = filter
|
||||
chain_name = logmon_block
|
||||
|
||||
[backend_iptables]
|
||||
chain_name = LOGMON_BLOCK
|
||||
|
||||
[backend_ufw]
|
||||
# UFW nie wymaga dodatkowych parametrów
|
||||
|
||||
[module_postfix]
|
||||
enabled = true
|
||||
log_file = /var/log/mail.log
|
||||
# Alternatywnie dla systemd:
|
||||
# use_journald = true
|
||||
# journald_unit = postfix.service
|
||||
|
||||
# Parametry detekcji
|
||||
max_failures = 5
|
||||
time_window = 60
|
||||
ban_duration = 86400
|
||||
|
||||
# Wzorce do wykrywania
|
||||
patterns = auth_failed,sasl_failed
|
||||
|
||||
[pattern_auth_failed]
|
||||
regex = authentication failed
|
||||
score = 1
|
||||
|
||||
[pattern_sasl_failed]
|
||||
regex = SASL [A-Z\-\d]+ authentication failed
|
||||
score = 2
|
||||
477
logmon.py
Normal file
477
logmon.py
Normal file
@@ -0,0 +1,477 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
LogMon - Modularny demon do monitorowania logów i blokowania IP
|
||||
Autor: System Administrator
|
||||
Wersja: 1.0
|
||||
"""
|
||||
|
||||
import sys
|
||||
import os
|
||||
import time
|
||||
import signal
|
||||
import logging
|
||||
import argparse
|
||||
import configparser
|
||||
from collections import defaultdict, deque
|
||||
from datetime import datetime, timedelta
|
||||
from pathlib import Path
|
||||
|
||||
# Importy z lokalnych modułów
|
||||
from modules import PostfixModule
|
||||
from backends import CSFBackend, NFTablesBackend, IPTablesBackend, UFWBackend
|
||||
|
||||
|
||||
class LogMonDaemon:
|
||||
"""Główny demon LogMon"""
|
||||
|
||||
def __init__(self, config_file):
|
||||
"""
|
||||
Inicjalizacja demona
|
||||
|
||||
Args:
|
||||
config_file: Ścieżka do pliku konfiguracyjnego INI
|
||||
"""
|
||||
self.config = configparser.ConfigParser()
|
||||
self.config.read(config_file)
|
||||
|
||||
self.running = False
|
||||
self.ip_tracker = defaultdict(lambda: deque())
|
||||
self.banned_ips = {}
|
||||
|
||||
# Konfiguracja logowania
|
||||
self.setup_logging()
|
||||
|
||||
# Wybór backendu firewall
|
||||
self.backend = self.load_backend()
|
||||
|
||||
# Ładowanie modułów monitorowania
|
||||
self.modules = self.load_modules()
|
||||
|
||||
# Obsługa sygnałów systemowych
|
||||
signal.signal(signal.SIGTERM, self.signal_handler)
|
||||
signal.signal(signal.SIGINT, self.signal_handler)
|
||||
signal.signal(signal.SIGHUP, self.signal_reload)
|
||||
|
||||
self.logger.info("LogMon daemon initialized")
|
||||
|
||||
def setup_logging(self):
|
||||
"""Konfiguracja systemu logowania"""
|
||||
debug = self.config.getboolean('general', 'debug', fallback=False)
|
||||
log_file = self.config.get('general', 'log_file',
|
||||
fallback='/var/log/logmon.log')
|
||||
|
||||
level = logging.DEBUG if debug else logging.INFO
|
||||
|
||||
# Usuń istniejące handlery
|
||||
logging.basicConfig(
|
||||
level=level,
|
||||
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s',
|
||||
handlers=[
|
||||
logging.FileHandler(log_file),
|
||||
logging.StreamHandler(sys.stdout)
|
||||
]
|
||||
)
|
||||
|
||||
self.logger = logging.getLogger('LogMon')
|
||||
self.logger.info(f"Logging initialized (debug={debug})")
|
||||
|
||||
def load_backend(self):
|
||||
"""Ładuje odpowiedni backend firewall"""
|
||||
backend_name = self.config.get('general', 'backend', fallback='csf')
|
||||
|
||||
self.logger.info(f"Loading backend: {backend_name}")
|
||||
|
||||
backend_map = {
|
||||
'csf': CSFBackend,
|
||||
'nftables': NFTablesBackend,
|
||||
'iptables': IPTablesBackend,
|
||||
'ufw': UFWBackend
|
||||
}
|
||||
|
||||
if backend_name not in backend_map:
|
||||
raise ValueError(f"Unknown backend: {backend_name}")
|
||||
|
||||
backend_class = backend_map[backend_name]
|
||||
backend = backend_class(self.config)
|
||||
|
||||
# Sprawdź dostępność
|
||||
if not backend.test_availability():
|
||||
self.logger.warning(f"Backend {backend_name} may not be available!")
|
||||
|
||||
return backend
|
||||
|
||||
def load_modules(self):
|
||||
"""Ładuje moduły monitorowania"""
|
||||
modules = []
|
||||
|
||||
# Postfix module
|
||||
if self.config.getboolean('module_postfix', 'enabled', fallback=False):
|
||||
try:
|
||||
module = PostfixModule(self.config, self)
|
||||
modules.append(module)
|
||||
self.logger.info("Loaded Postfix module")
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error loading Postfix module: {e}")
|
||||
|
||||
# Tutaj można dodać więcej modułów w przyszłości
|
||||
# if self.config.getboolean('module_ssh', 'enabled', fallback=False):
|
||||
# modules.append(SSHModule(self.config, self))
|
||||
|
||||
if not modules:
|
||||
self.logger.warning("No modules loaded!")
|
||||
|
||||
return modules
|
||||
|
||||
def signal_handler(self, signum, frame):
|
||||
"""Obsługa sygnałów SIGTERM i SIGINT"""
|
||||
self.logger.info(f"Received signal {signum}, shutting down gracefully...")
|
||||
self.running = False
|
||||
|
||||
def signal_reload(self, signum, frame):
|
||||
"""Obsługa sygnału SIGHUP - reload konfiguracji"""
|
||||
self.logger.info("Received SIGHUP, reloading configuration...")
|
||||
# TODO: Implementacja reload konfiguracji
|
||||
|
||||
def track_failure(self, ip, score=1):
|
||||
"""
|
||||
Śledzi nieudane próby logowania dla danego IP
|
||||
|
||||
Args:
|
||||
ip: Adres IP atakującego
|
||||
score: Punkty za dane niepowodzenie (domyślnie 1)
|
||||
"""
|
||||
now = datetime.now()
|
||||
|
||||
# Dodaj wpis do trackera
|
||||
self.ip_tracker[ip].append((now, score))
|
||||
|
||||
# Usuń stare wpisy spoza okna czasowego
|
||||
time_window = self.config.getint('module_postfix', 'time_window',
|
||||
fallback=60)
|
||||
cutoff = now - timedelta(seconds=time_window)
|
||||
|
||||
while self.ip_tracker[ip] and self.ip_tracker[ip][0][0] < cutoff:
|
||||
self.ip_tracker[ip].popleft()
|
||||
|
||||
# Oblicz całkowity wynik
|
||||
total_score = sum(score for _, score in self.ip_tracker[ip])
|
||||
failures_count = len(self.ip_tracker[ip])
|
||||
|
||||
max_failures = self.config.getint('module_postfix', 'max_failures',
|
||||
fallback=5)
|
||||
|
||||
self.logger.debug(
|
||||
f"IP {ip}: {failures_count} failures, score {total_score}/{max_failures}"
|
||||
)
|
||||
|
||||
# Sprawdź czy przekroczono limit
|
||||
if total_score >= max_failures and ip not in self.banned_ips:
|
||||
self.ban_ip(ip)
|
||||
elif total_score >= max_failures and ip in self.banned_ips:
|
||||
self.logger.debug(f"IP {ip} already banned, ignoring")
|
||||
|
||||
def ban_ip(self, ip):
|
||||
"""
|
||||
Banuje adres IP
|
||||
|
||||
Args:
|
||||
ip: Adres IP do zbanowania
|
||||
"""
|
||||
ban_duration = self.config.getint('module_postfix', 'ban_duration',
|
||||
fallback=86400)
|
||||
|
||||
self.logger.warning(
|
||||
f"Banning IP {ip} for {ban_duration} seconds "
|
||||
f"({ban_duration/3600:.1f} hours)"
|
||||
)
|
||||
|
||||
if self.backend.ban_ip(ip, ban_duration):
|
||||
expiry_time = datetime.now() + timedelta(seconds=ban_duration)
|
||||
self.banned_ips[ip] = expiry_time
|
||||
|
||||
self.logger.info(
|
||||
f"Successfully banned {ip} until {expiry_time.strftime('%Y-%m-%d %H:%M:%S')}"
|
||||
)
|
||||
|
||||
# Wyczyść tracker dla tego IP
|
||||
if ip in self.ip_tracker:
|
||||
del self.ip_tracker[ip]
|
||||
else:
|
||||
self.logger.error(f"Failed to ban {ip}")
|
||||
|
||||
def unban_ip(self, ip):
|
||||
"""
|
||||
Odbania adres IP
|
||||
|
||||
Args:
|
||||
ip: Adres IP do odbanowania
|
||||
"""
|
||||
self.logger.info(f"Unbanning expired IP {ip}")
|
||||
|
||||
if self.backend.unban_ip(ip):
|
||||
if ip in self.banned_ips:
|
||||
del self.banned_ips[ip]
|
||||
self.logger.info(f"Successfully unbanned {ip}")
|
||||
else:
|
||||
self.logger.error(f"Failed to unban {ip}")
|
||||
|
||||
def unban_expired(self):
|
||||
"""Usuwa bany, które wygasły"""
|
||||
now = datetime.now()
|
||||
expired = [ip for ip, expiry in self.banned_ips.items()
|
||||
if now >= expiry]
|
||||
|
||||
for ip in expired:
|
||||
self.unban_ip(ip)
|
||||
|
||||
def save_state(self):
|
||||
"""Zapisuje stan banów do pliku (opcjonalnie)"""
|
||||
# TODO: Implementacja persystencji stanu
|
||||
pass
|
||||
|
||||
def load_state(self):
|
||||
"""Ładuje stan banów z pliku (opcjonalnie)"""
|
||||
# TODO: Implementacja persystencji stanu
|
||||
pass
|
||||
|
||||
def daemonize(self):
|
||||
"""Przechodzi w tryb demona (fork)"""
|
||||
pid_file = self.config.get('general', 'pid_file',
|
||||
fallback='/var/run/logmon.pid')
|
||||
|
||||
# Sprawdź czy już działa
|
||||
if os.path.exists(pid_file):
|
||||
with open(pid_file, 'r') as f:
|
||||
old_pid = int(f.read().strip())
|
||||
|
||||
# Sprawdź czy proces istnieje
|
||||
try:
|
||||
os.kill(old_pid, 0)
|
||||
self.logger.error(f"Daemon already running with PID {old_pid}")
|
||||
sys.exit(1)
|
||||
except OSError:
|
||||
# Proces nie istnieje, usuń stary PID file
|
||||
os.remove(pid_file)
|
||||
|
||||
# Pierwszy fork
|
||||
try:
|
||||
pid = os.fork()
|
||||
if pid > 0:
|
||||
# Parent process
|
||||
sys.exit(0)
|
||||
except OSError as e:
|
||||
self.logger.error(f"Fork #1 failed: {e}")
|
||||
sys.exit(1)
|
||||
|
||||
# Odłącz od terminala
|
||||
os.chdir('/')
|
||||
os.setsid()
|
||||
os.umask(0)
|
||||
|
||||
# Drugi fork
|
||||
try:
|
||||
pid = os.fork()
|
||||
if pid > 0:
|
||||
# Parent process
|
||||
sys.exit(0)
|
||||
except OSError as e:
|
||||
self.logger.error(f"Fork #2 failed: {e}")
|
||||
sys.exit(1)
|
||||
|
||||
# Zapisz PID
|
||||
pid = os.getpid()
|
||||
with open(pid_file, 'w') as f:
|
||||
f.write(str(pid))
|
||||
|
||||
self.logger.info(f"Daemon started with PID {pid}")
|
||||
|
||||
# Przekieruj standardowe wyjścia
|
||||
sys.stdout.flush()
|
||||
sys.stderr.flush()
|
||||
|
||||
devnull = open(os.devnull, 'r+')
|
||||
os.dup2(devnull.fileno(), sys.stdin.fileno())
|
||||
|
||||
# Stdout i stderr zostawiamy dla logowania
|
||||
|
||||
def cleanup(self):
|
||||
"""Sprzątanie przed zakończeniem"""
|
||||
pid_file = self.config.get('general', 'pid_file',
|
||||
fallback='/var/run/logmon.pid')
|
||||
|
||||
# Usuń PID file
|
||||
if os.path.exists(pid_file):
|
||||
try:
|
||||
os.remove(pid_file)
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error removing PID file: {e}")
|
||||
|
||||
def print_status(self):
|
||||
"""Wyświetla status demona"""
|
||||
print("\n=== LogMon Status ===")
|
||||
print(f"Backend: {self.backend.__class__.__name__}")
|
||||
print(f"Modules: {len(self.modules)}")
|
||||
print(f"Currently banned IPs: {len(self.banned_ips)}")
|
||||
print(f"Tracked IPs: {len(self.ip_tracker)}")
|
||||
|
||||
if self.banned_ips:
|
||||
print("\nBanned IPs:")
|
||||
for ip, expiry in sorted(self.banned_ips.items(),
|
||||
key=lambda x: x[1]):
|
||||
remaining = (expiry - datetime.now()).total_seconds()
|
||||
if remaining > 0:
|
||||
print(f" {ip:15s} - expires in {remaining/60:.1f} minutes")
|
||||
else:
|
||||
print(f" {ip:15s} - EXPIRED")
|
||||
|
||||
print("\n")
|
||||
|
||||
def run(self, daemonize=True):
|
||||
"""
|
||||
Główna pętla demona
|
||||
|
||||
Args:
|
||||
daemonize: Czy przejść w tryb demona (fork)
|
||||
"""
|
||||
if daemonize:
|
||||
self.daemonize()
|
||||
|
||||
self.running = True
|
||||
self.logger.info("LogMon daemon started")
|
||||
|
||||
# Uruchom moduły
|
||||
for module in self.modules:
|
||||
try:
|
||||
module.start()
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error starting module: {e}")
|
||||
|
||||
# Główna pętla
|
||||
try:
|
||||
while self.running:
|
||||
try:
|
||||
# Sprawdź wygasłe bany co 10 sekund
|
||||
self.unban_expired()
|
||||
|
||||
# Wyświetl status co minutę (tylko w debug mode)
|
||||
if self.config.getboolean('general', 'debug', fallback=False):
|
||||
if int(time.time()) % 60 == 0:
|
||||
self.logger.debug(
|
||||
f"Status: {len(self.banned_ips)} banned, "
|
||||
f"{len(self.ip_tracker)} tracked"
|
||||
)
|
||||
|
||||
# Krótkie oczekiwanie
|
||||
time.sleep(10)
|
||||
|
||||
except KeyboardInterrupt:
|
||||
self.logger.info("Keyboard interrupt received")
|
||||
break
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error in main loop: {e}", exc_info=True)
|
||||
time.sleep(1)
|
||||
|
||||
finally:
|
||||
# Zatrzymaj moduły
|
||||
self.logger.info("Stopping modules...")
|
||||
for module in self.modules:
|
||||
try:
|
||||
module.stop()
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error stopping module: {e}")
|
||||
|
||||
# Sprzątanie
|
||||
self.cleanup()
|
||||
|
||||
self.logger.info("LogMon daemon stopped")
|
||||
|
||||
|
||||
def main():
|
||||
"""Główna funkcja programu"""
|
||||
parser = argparse.ArgumentParser(
|
||||
description='LogMon - Log Monitoring and IP Blocking Daemon',
|
||||
formatter_class=argparse.RawDescriptionHelpFormatter,
|
||||
epilog="""
|
||||
Przykłady użycia:
|
||||
%(prog)s -c /etc/logmon/config.ini # Uruchom jako demon
|
||||
%(prog)s -c /etc/logmon/config.ini -f # Uruchom w foreground
|
||||
%(prog)s -c /etc/logmon/config.ini -f -d # Uruchom w foreground z debugiem
|
||||
|
||||
Sygnały:
|
||||
SIGTERM, SIGINT - graceful shutdown
|
||||
SIGHUP - reload konfiguracji (TODO)
|
||||
"""
|
||||
)
|
||||
|
||||
parser.add_argument(
|
||||
'-c', '--config',
|
||||
default='/etc/logmon/config.ini',
|
||||
help='Ścieżka do pliku konfiguracyjnego (domyślnie: /etc/logmon/config.ini)'
|
||||
)
|
||||
|
||||
parser.add_argument(
|
||||
'-f', '--foreground',
|
||||
action='store_true',
|
||||
help='Uruchom w foreground (nie demonizuj)'
|
||||
)
|
||||
|
||||
parser.add_argument(
|
||||
'-d', '--debug',
|
||||
action='store_true',
|
||||
help='Włącz tryb debug (nadpisuje ustawienie z config.ini)'
|
||||
)
|
||||
|
||||
parser.add_argument(
|
||||
'-t', '--test',
|
||||
action='store_true',
|
||||
help='Test konfiguracji i wyjście'
|
||||
)
|
||||
|
||||
parser.add_argument(
|
||||
'--version',
|
||||
action='version',
|
||||
version='LogMon 1.0'
|
||||
)
|
||||
|
||||
args = parser.parse_args()
|
||||
|
||||
# Sprawdź czy plik konfiguracyjny istnieje
|
||||
if not os.path.exists(args.config):
|
||||
print(f"Error: Configuration file not found: {args.config}", file=sys.stderr)
|
||||
sys.exit(1)
|
||||
|
||||
# Sprawdź uprawnienia root
|
||||
if os.geteuid() != 0 and not args.test:
|
||||
print("Error: This program must be run as root", file=sys.stderr)
|
||||
sys.exit(1)
|
||||
|
||||
try:
|
||||
# Inicjalizacja demona
|
||||
daemon = LogMonDaemon(args.config)
|
||||
|
||||
# Nadpisz debug jeśli podano w argumentach
|
||||
if args.debug:
|
||||
daemon.config.set('general', 'debug', 'true')
|
||||
daemon.setup_logging()
|
||||
|
||||
# Tryb testowy
|
||||
if args.test:
|
||||
print("Configuration test successful")
|
||||
daemon.print_status()
|
||||
sys.exit(0)
|
||||
|
||||
# Uruchom demona
|
||||
daemon.run(daemonize=not args.foreground)
|
||||
|
||||
except KeyboardInterrupt:
|
||||
print("\nInterrupted by user")
|
||||
sys.exit(0)
|
||||
except Exception as e:
|
||||
print(f"Fatal error: {e}", file=sys.stderr)
|
||||
import traceback
|
||||
traceback.print_exc()
|
||||
sys.exit(1)
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
||||
23
logmon.service
Normal file
23
logmon.service
Normal file
@@ -0,0 +1,23 @@
|
||||
[Unit]
|
||||
Description=LogMon - Log Monitoring and IP Blocking Daemon
|
||||
After=network.target syslog.target
|
||||
|
||||
[Service]
|
||||
Type=forking
|
||||
User=root
|
||||
Group=root
|
||||
WorkingDirectory=/opt/logmon
|
||||
ExecStart=/usr/bin/python3 /opt/logmon/logmon.py -c /etc/logmon/config.ini
|
||||
ExecReload=/bin/kill -HUP $MAINPID
|
||||
PIDFile=/var/run/logmon.pid
|
||||
Restart=on-failure
|
||||
RestartSec=10s
|
||||
|
||||
# Security hardening
|
||||
PrivateTmp=yes
|
||||
NoNewPrivileges=false
|
||||
ProtectSystem=strict
|
||||
ReadWritePaths=/var/log /var/run /etc/csf
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
54
modules/base.py
Normal file
54
modules/base.py
Normal file
@@ -0,0 +1,54 @@
|
||||
"""
|
||||
Bazowa klasa dla modułów monitorowania logów
|
||||
"""
|
||||
|
||||
import logging
|
||||
import time
|
||||
import threading
|
||||
|
||||
|
||||
class LogModule:
|
||||
"""Bazowa klasa dla modułów monitorowania"""
|
||||
|
||||
def __init__(self, config, daemon):
|
||||
"""
|
||||
Args:
|
||||
config: ConfigParser object z konfiguracją
|
||||
daemon: Referencja do głównego demona
|
||||
"""
|
||||
self.config = config
|
||||
self.daemon = daemon
|
||||
self.logger = logging.getLogger(self.__class__.__name__)
|
||||
self.running = False
|
||||
self.thread = None
|
||||
|
||||
def start(self):
|
||||
"""Uruchamia moduł w osobnym wątku"""
|
||||
if self.running:
|
||||
self.logger.warning("Module already running")
|
||||
return
|
||||
|
||||
self.running = True
|
||||
self.thread = threading.Thread(target=self._run, daemon=True)
|
||||
self.thread.start()
|
||||
self.logger.info(f"{self.__class__.__name__} started")
|
||||
|
||||
def stop(self):
|
||||
"""Zatrzymuje moduł"""
|
||||
self.running = False
|
||||
if self.thread and self.thread.is_alive():
|
||||
self.thread.join(timeout=5)
|
||||
self.logger.info(f"{self.__class__.__name__} stopped")
|
||||
|
||||
def _run(self):
|
||||
"""Główna pętla modułu - do nadpisania w klasach potomnych"""
|
||||
raise NotImplementedError("Subclasses must implement _run()")
|
||||
|
||||
def process_line(self, line):
|
||||
"""
|
||||
Przetwarza pojedynczą linię logu
|
||||
|
||||
Args:
|
||||
line: Linia tekstu z logu
|
||||
"""
|
||||
raise NotImplementedError("Subclasses must implement process_line()")
|
||||
8
modules/init.py
Normal file
8
modules/init.py
Normal file
@@ -0,0 +1,8 @@
|
||||
"""
|
||||
LogMon Modules - Moduły monitorowania różnych aplikacji
|
||||
"""
|
||||
|
||||
from .base import LogModule
|
||||
from .postfix import PostfixModule
|
||||
|
||||
__all__ = ['LogModule', 'PostfixModule']
|
||||
120
modules/postfix.py
Normal file
120
modules/postfix.py
Normal file
@@ -0,0 +1,120 @@
|
||||
"""
|
||||
Moduł monitorujący Postfix SMTP server
|
||||
"""
|
||||
|
||||
import re
|
||||
import time
|
||||
from .base import LogModule
|
||||
|
||||
|
||||
class PostfixModule(LogModule):
|
||||
"""Moduł monitorujący Postfix"""
|
||||
|
||||
def __init__(self, config, daemon):
|
||||
super().__init__(config, daemon)
|
||||
|
||||
# Kompiluj wzorce regex dla wydajności
|
||||
self.patterns = self._load_patterns()
|
||||
|
||||
# Regex do wyciągania IP z logów Postfix
|
||||
# Obsługuje zarówno unknown[IP] jak i hostname[IP]
|
||||
self.ip_pattern = re.compile(
|
||||
r'(?:unknown|[\w\-\.]+)\[(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\]'
|
||||
)
|
||||
|
||||
# Ścieżka do pliku logu
|
||||
self.log_file = config.get('module_postfix', 'log_file',
|
||||
fallback='/var/log/mail.log')
|
||||
|
||||
self.logger.info(f"Loaded {len(self.patterns)} patterns for Postfix")
|
||||
|
||||
def _load_patterns(self):
|
||||
"""Ładuje wzorce z konfiguracji"""
|
||||
patterns = []
|
||||
pattern_names = self.config.get('module_postfix', 'patterns',
|
||||
fallback='').split(',')
|
||||
|
||||
for name in pattern_names:
|
||||
name = name.strip()
|
||||
if not name:
|
||||
continue
|
||||
|
||||
section = f'pattern_{name}'
|
||||
if section not in self.config:
|
||||
self.logger.warning(f"Pattern section '{section}' not found in config")
|
||||
continue
|
||||
|
||||
try:
|
||||
regex = self.config.get(section, 'regex')
|
||||
score = self.config.getint(section, 'score', fallback=1)
|
||||
|
||||
patterns.append({
|
||||
'name': name,
|
||||
'regex': re.compile(regex, re.IGNORECASE),
|
||||
'score': score
|
||||
})
|
||||
|
||||
self.logger.debug(f"Loaded pattern '{name}': {regex} (score: {score})")
|
||||
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error loading pattern '{name}': {e}")
|
||||
|
||||
return patterns
|
||||
|
||||
def _run(self):
|
||||
"""Główna pętla - tail -f na pliku logu"""
|
||||
self.logger.info(f"Tailing log file: {self.log_file}")
|
||||
|
||||
try:
|
||||
with open(self.log_file, 'r') as f:
|
||||
# Przejdź na koniec pliku
|
||||
f.seek(0, 2)
|
||||
|
||||
while self.running:
|
||||
line = f.readline()
|
||||
|
||||
if line:
|
||||
self.process_line(line.strip())
|
||||
else:
|
||||
# Brak nowych linii, czekaj chwilę
|
||||
time.sleep(0.1)
|
||||
|
||||
except FileNotFoundError:
|
||||
self.logger.error(f"Log file not found: {self.log_file}")
|
||||
except PermissionError:
|
||||
self.logger.error(f"Permission denied reading: {self.log_file}")
|
||||
except Exception as e:
|
||||
self.logger.error(f"Error tailing log: {e}")
|
||||
|
||||
def process_line(self, line):
|
||||
"""
|
||||
Przetwarza linię z logu Postfix
|
||||
|
||||
Przykłady linii:
|
||||
- postfix/smtpd[1234]: warning: unknown[1.2.3.4]: SASL LOGIN authentication failed
|
||||
- postfix/smtpd[1234]: connect from unknown[1.2.3.4]
|
||||
"""
|
||||
# Wyciągnij IP
|
||||
ip_match = self.ip_pattern.search(line)
|
||||
if not ip_match:
|
||||
return
|
||||
|
||||
ip = ip_match.group(1)
|
||||
|
||||
# Pomiń lokalne IP
|
||||
if ip.startswith('127.') or ip.startswith('192.168.') or ip.startswith('10.'):
|
||||
return
|
||||
|
||||
# Sprawdź wzorce
|
||||
for pattern in self.patterns:
|
||||
if pattern['regex'].search(line):
|
||||
self.logger.debug(
|
||||
f"Pattern '{pattern['name']}' matched for IP {ip}"
|
||||
)
|
||||
self.logger.debug(f"Line: {line}")
|
||||
|
||||
# Zgłoś niepowodzenie do demona
|
||||
self.daemon.track_failure(ip, pattern['score'])
|
||||
|
||||
# Tylko pierwszy pasujący wzorzec
|
||||
break
|
||||
5
utils/init.py
Normal file
5
utils/init.py
Normal file
@@ -0,0 +1,5 @@
|
||||
"""
|
||||
LogMon Utils - Narzędzia pomocnicze
|
||||
"""
|
||||
|
||||
__all__ = []
|
||||
40
utils/logger.py
Normal file
40
utils/logger.py
Normal file
@@ -0,0 +1,40 @@
|
||||
"""
|
||||
Pomocnicze funkcje do logowania
|
||||
"""
|
||||
|
||||
import logging
|
||||
import logging.handlers
|
||||
|
||||
|
||||
def setup_rotating_logger(name, log_file, max_bytes=10485760, backup_count=5, level=logging.INFO):
|
||||
"""
|
||||
Konfiguruje logger z rotacją plików
|
||||
|
||||
Args:
|
||||
name: Nazwa loggera
|
||||
log_file: Ścieżka do pliku logu
|
||||
max_bytes: Maksymalny rozmiar pliku (domyślnie 10MB)
|
||||
backup_count: Liczba backup plików
|
||||
level: Poziom logowania
|
||||
|
||||
Returns:
|
||||
Logger object
|
||||
"""
|
||||
logger = logging.getLogger(name)
|
||||
logger.setLevel(level)
|
||||
|
||||
# Rotating file handler
|
||||
handler = logging.handlers.RotatingFileHandler(
|
||||
log_file,
|
||||
maxBytes=max_bytes,
|
||||
backupCount=backup_count
|
||||
)
|
||||
|
||||
formatter = logging.Formatter(
|
||||
'%(asctime)s - %(name)s - %(levelname)s - %(message)s'
|
||||
)
|
||||
handler.setFormatter(formatter)
|
||||
|
||||
logger.addHandler(handler)
|
||||
|
||||
return logger
|
||||
Reference in New Issue
Block a user