upload
This commit is contained in:
		
							
								
								
									
										63
									
								
								backends/base.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										63
									
								
								backends/base.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,63 @@ | |||||||
|  | """ | ||||||
|  | Bazowa klasa dla backendów firewall | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import logging | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class FirewallBackend: | ||||||
|  |     """Bazowa klasa dla backendów firewall""" | ||||||
|  |      | ||||||
|  |     def __init__(self, config): | ||||||
|  |         """ | ||||||
|  |         Args: | ||||||
|  |             config: ConfigParser object z konfiguracją | ||||||
|  |         """ | ||||||
|  |         self.config = config | ||||||
|  |         self.logger = logging.getLogger(self.__class__.__name__) | ||||||
|  |          | ||||||
|  |     def ban_ip(self, ip, duration): | ||||||
|  |         """ | ||||||
|  |         Banuje IP na określony czas | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             ip: Adres IP do zbanowania | ||||||
|  |             duration: Czas bana w sekundach | ||||||
|  |              | ||||||
|  |         Returns: | ||||||
|  |             bool: True jeśli ban się powiódł | ||||||
|  |         """ | ||||||
|  |         raise NotImplementedError("Subclasses must implement ban_ip()") | ||||||
|  |          | ||||||
|  |     def unban_ip(self, ip): | ||||||
|  |         """ | ||||||
|  |         Usuwa ban dla IP | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             ip: Adres IP do odbanowania | ||||||
|  |              | ||||||
|  |         Returns: | ||||||
|  |             bool: True jeśli odbanowanie się powiodło | ||||||
|  |         """ | ||||||
|  |         raise NotImplementedError("Subclasses must implement unban_ip()") | ||||||
|  |          | ||||||
|  |     def is_banned(self, ip): | ||||||
|  |         """ | ||||||
|  |         Sprawdza czy IP jest zbanowany | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             ip: Adres IP do sprawdzenia | ||||||
|  |              | ||||||
|  |         Returns: | ||||||
|  |             bool: True jeśli IP jest zbanowany | ||||||
|  |         """ | ||||||
|  |         raise NotImplementedError("Subclasses must implement is_banned()") | ||||||
|  |          | ||||||
|  |     def test_availability(self): | ||||||
|  |         """ | ||||||
|  |         Sprawdza czy backend jest dostępny w systemie | ||||||
|  |          | ||||||
|  |         Returns: | ||||||
|  |             bool: True jeśli backend jest dostępny | ||||||
|  |         """ | ||||||
|  |         return True | ||||||
							
								
								
									
										102
									
								
								backends/csf.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										102
									
								
								backends/csf.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,102 @@ | |||||||
|  | """ | ||||||
|  | Backend dla ConfigServer Security & Firewall (CSF) | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import subprocess | ||||||
|  | from pathlib import Path | ||||||
|  | from .base import FirewallBackend | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class CSFBackend(FirewallBackend): | ||||||
|  |     """Backend dla ConfigServer Firewall""" | ||||||
|  |      | ||||||
|  |     def __init__(self, config): | ||||||
|  |         super().__init__(config) | ||||||
|  |         self.csf_path = config.get('backend_csf', 'csf_path',  | ||||||
|  |                                    fallback='/usr/sbin/csf') | ||||||
|  |          | ||||||
|  |         if not self.test_availability(): | ||||||
|  |             self.logger.warning(f"CSF not found at {self.csf_path}") | ||||||
|  |              | ||||||
|  |     def test_availability(self): | ||||||
|  |         """Sprawdza czy CSF jest zainstalowany""" | ||||||
|  |         return Path(self.csf_path).exists() | ||||||
|  |          | ||||||
|  |     def ban_ip(self, ip, duration): | ||||||
|  |         """ | ||||||
|  |         Banuje IP używając CSF | ||||||
|  |          | ||||||
|  |         CSF używa: | ||||||
|  |         - csf -d IP "comment" - permanent deny | ||||||
|  |         - csf -td IP duration "comment" - temporary deny | ||||||
|  |         """ | ||||||
|  |         try: | ||||||
|  |             # Temporary deny na określony czas (w sekundach) | ||||||
|  |             cmd = [ | ||||||
|  |                 self.csf_path, '-td', ip,  | ||||||
|  |                 str(duration),  | ||||||
|  |                 f"LogMon auto-ban" | ||||||
|  |             ] | ||||||
|  |              | ||||||
|  |             result = subprocess.run( | ||||||
|  |                 cmd,  | ||||||
|  |                 capture_output=True,  | ||||||
|  |                 text=True, | ||||||
|  |                 timeout=10 | ||||||
|  |             ) | ||||||
|  |              | ||||||
|  |             if result.returncode == 0: | ||||||
|  |                 self.logger.debug(f"CSF ban successful: {result.stdout.strip()}") | ||||||
|  |                 return True | ||||||
|  |             else: | ||||||
|  |                 self.logger.error(f"CSF ban failed: {result.stderr.strip()}") | ||||||
|  |                 return False | ||||||
|  |                  | ||||||
|  |         except subprocess.TimeoutExpired: | ||||||
|  |             self.logger.error(f"CSF ban command timed out for {ip}") | ||||||
|  |             return False | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error banning IP with CSF: {e}") | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def unban_ip(self, ip): | ||||||
|  |         """Usuwa ban używając CSF""" | ||||||
|  |         try: | ||||||
|  |             # Remove temporary ban | ||||||
|  |             cmd = [self.csf_path, '-tr', ip] | ||||||
|  |             result = subprocess.run( | ||||||
|  |                 cmd,  | ||||||
|  |                 capture_output=True,  | ||||||
|  |                 text=True, | ||||||
|  |                 timeout=10 | ||||||
|  |             ) | ||||||
|  |              | ||||||
|  |             if result.returncode == 0: | ||||||
|  |                 self.logger.debug(f"CSF unban successful for {ip}") | ||||||
|  |                 return True | ||||||
|  |             else: | ||||||
|  |                 self.logger.warning(f"CSF unban may have failed: {result.stderr.strip()}") | ||||||
|  |                 # CSF czasem zwraca error nawet gdy się udało | ||||||
|  |                 return True | ||||||
|  |                  | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error unbanning IP with CSF: {e}") | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def is_banned(self, ip): | ||||||
|  |         """Sprawdza czy IP jest zbanowany w CSF""" | ||||||
|  |         try: | ||||||
|  |             cmd = [self.csf_path, '-g', ip] | ||||||
|  |             result = subprocess.run( | ||||||
|  |                 cmd,  | ||||||
|  |                 capture_output=True,  | ||||||
|  |                 text=True, | ||||||
|  |                 timeout=10 | ||||||
|  |             ) | ||||||
|  |              | ||||||
|  |             output = result.stdout.lower() | ||||||
|  |             return "deny" in output or "drop" in output | ||||||
|  |              | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error checking ban status: {e}") | ||||||
|  |             return False | ||||||
							
								
								
									
										17
									
								
								backends/init.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								backends/init.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,17 @@ | |||||||
|  | """ | ||||||
|  | LogMon Backends - Integracje z różnymi firewallami | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | from .base import FirewallBackend | ||||||
|  | from .csf import CSFBackend | ||||||
|  | from .nftables import NFTablesBackend | ||||||
|  | from .iptables import IPTablesBackend | ||||||
|  | from .ufw import UFWBackend | ||||||
|  |  | ||||||
|  | __all__ = [ | ||||||
|  |     'FirewallBackend', | ||||||
|  |     'CSFBackend', | ||||||
|  |     'NFTablesBackend', | ||||||
|  |     'IPTablesBackend', | ||||||
|  |     'UFWBackend' | ||||||
|  | ] | ||||||
							
								
								
									
										104
									
								
								backends/iptables.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										104
									
								
								backends/iptables.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,104 @@ | |||||||
|  | """ | ||||||
|  | Backend dla iptables | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import subprocess | ||||||
|  | from .base import FirewallBackend | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class IPTablesBackend(FirewallBackend): | ||||||
|  |     """Backend dla iptables""" | ||||||
|  |      | ||||||
|  |     def __init__(self, config): | ||||||
|  |         super().__init__(config) | ||||||
|  |         self.chain = config.get('backend_iptables', 'chain_name',  | ||||||
|  |                                fallback='LOGMON_BLOCK') | ||||||
|  |          | ||||||
|  |         if self.test_availability(): | ||||||
|  |             self.setup_chain() | ||||||
|  |         else: | ||||||
|  |             self.logger.warning("iptables not available") | ||||||
|  |              | ||||||
|  |     def test_availability(self): | ||||||
|  |         """Sprawdza czy iptables jest dostępny""" | ||||||
|  |         try: | ||||||
|  |             result = subprocess.run( | ||||||
|  |                 ['iptables', '--version'],  | ||||||
|  |                 capture_output=True, | ||||||
|  |                 timeout=5 | ||||||
|  |             ) | ||||||
|  |             return result.returncode == 0 | ||||||
|  |         except: | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def setup_chain(self): | ||||||
|  |         """Tworzy chain jeśli nie istnieje""" | ||||||
|  |         try: | ||||||
|  |             # Sprawdź czy chain istnieje | ||||||
|  |             cmd = ['iptables', '-L', self.chain, '-n'] | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, timeout=5) | ||||||
|  |              | ||||||
|  |             if result.returncode != 0: | ||||||
|  |                 # Utwórz chain | ||||||
|  |                 subprocess.run(['iptables', '-N', self.chain], check=True, timeout=5) | ||||||
|  |                  | ||||||
|  |                 # Dodaj do INPUT na początku | ||||||
|  |                 subprocess.run( | ||||||
|  |                     ['iptables', '-I', 'INPUT', '1', '-j', self.chain],  | ||||||
|  |                     check=True,  | ||||||
|  |                     timeout=5 | ||||||
|  |                 ) | ||||||
|  |                  | ||||||
|  |                 self.logger.info(f"Created iptables chain: {self.chain}") | ||||||
|  |                  | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error setting up iptables chain: {e}") | ||||||
|  |              | ||||||
|  |     def ban_ip(self, ip, duration): | ||||||
|  |         """Banuje IP używając iptables""" | ||||||
|  |         try: | ||||||
|  |             cmd = [ | ||||||
|  |                 'iptables', '-I', self.chain, '1', | ||||||
|  |                 '-s', ip, '-j', 'DROP', | ||||||
|  |                 '-m', 'comment', '--comment', f'LogMon ban {duration}s' | ||||||
|  |             ] | ||||||
|  |              | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, timeout=5) | ||||||
|  |              | ||||||
|  |             if result.returncode == 0: | ||||||
|  |                 self.logger.debug(f"iptables ban successful for {ip}") | ||||||
|  |                 return True | ||||||
|  |             else: | ||||||
|  |                 self.logger.error(f"iptables ban failed: {result.stderr.decode()}") | ||||||
|  |                 return False | ||||||
|  |                  | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error banning IP with iptables: {e}") | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def unban_ip(self, ip): | ||||||
|  |         """Usuwa ban używając iptables""" | ||||||
|  |         try: | ||||||
|  |             cmd = ['iptables', '-D', self.chain, '-s', ip, '-j', 'DROP'] | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, timeout=5) | ||||||
|  |              | ||||||
|  |             if result.returncode == 0: | ||||||
|  |                 self.logger.debug(f"iptables unban successful for {ip}") | ||||||
|  |                 return True | ||||||
|  |             else: | ||||||
|  |                 self.logger.warning(f"iptables unban may have failed") | ||||||
|  |                 return False | ||||||
|  |                  | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error unbanning IP with iptables: {e}") | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def is_banned(self, ip): | ||||||
|  |         """Sprawdza czy IP jest zbanowany""" | ||||||
|  |         try: | ||||||
|  |             cmd = ['iptables', '-L', self.chain, '-n', '--line-numbers'] | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, text=True, timeout=5) | ||||||
|  |             return ip in result.stdout | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error checking ban status: {e}") | ||||||
|  |             return False | ||||||
							
								
								
									
										120
									
								
								backends/nftables.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										120
									
								
								backends/nftables.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,120 @@ | |||||||
|  | """ | ||||||
|  | Backend dla nftables | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import subprocess | ||||||
|  | from .base import FirewallBackend | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class NFTablesBackend(FirewallBackend): | ||||||
|  |     """Backend dla nftables""" | ||||||
|  |      | ||||||
|  |     def __init__(self, config): | ||||||
|  |         super().__init__(config) | ||||||
|  |         self.table = config.get('backend_nftables', 'table_name',  | ||||||
|  |                                fallback='filter') | ||||||
|  |         self.chain = config.get('backend_nftables', 'chain_name',  | ||||||
|  |                                fallback='logmon_block') | ||||||
|  |          | ||||||
|  |         if self.test_availability(): | ||||||
|  |             self.setup_chain() | ||||||
|  |         else: | ||||||
|  |             self.logger.warning("nftables not available") | ||||||
|  |              | ||||||
|  |     def test_availability(self): | ||||||
|  |         """Sprawdza czy nftables jest dostępny""" | ||||||
|  |         try: | ||||||
|  |             result = subprocess.run( | ||||||
|  |                 ['nft', '--version'],  | ||||||
|  |                 capture_output=True, | ||||||
|  |                 timeout=5 | ||||||
|  |             ) | ||||||
|  |             return result.returncode == 0 | ||||||
|  |         except: | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def setup_chain(self): | ||||||
|  |         """Tworzy chain jeśli nie istnieje""" | ||||||
|  |         try: | ||||||
|  |             # Sprawdź czy chain istnieje | ||||||
|  |             cmd = ['nft', 'list', 'chain', 'inet', self.table, self.chain] | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, timeout=5) | ||||||
|  |              | ||||||
|  |             if result.returncode != 0: | ||||||
|  |                 # Utwórz chain z priorytetem input | ||||||
|  |                 cmd = [ | ||||||
|  |                     'nft', 'add', 'chain', 'inet', self.table, self.chain, | ||||||
|  |                     '{', 'type', 'filter', 'hook', 'input', 'priority', '0', ';', '}' | ||||||
|  |                 ] | ||||||
|  |                 subprocess.run(cmd, check=True, timeout=5) | ||||||
|  |                 self.logger.info(f"Created nftables chain: {self.chain}") | ||||||
|  |                  | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error setting up nftables chain: {e}") | ||||||
|  |              | ||||||
|  |     def ban_ip(self, ip, duration): | ||||||
|  |         """Banuje IP używając nftables""" | ||||||
|  |         try: | ||||||
|  |             # Dodaj regułę DROP | ||||||
|  |             cmd = [ | ||||||
|  |                 'nft', 'add', 'rule', 'inet', self.table, self.chain, | ||||||
|  |                 'ip', 'saddr', ip, 'counter', 'drop', | ||||||
|  |                 'comment', f'"LogMon ban {duration}s"' | ||||||
|  |             ] | ||||||
|  |              | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, timeout=5) | ||||||
|  |              | ||||||
|  |             if result.returncode == 0: | ||||||
|  |                 self.logger.debug(f"nftables ban successful for {ip}") | ||||||
|  |                 return True | ||||||
|  |             else: | ||||||
|  |                 self.logger.error(f"nftables ban failed: {result.stderr.decode()}") | ||||||
|  |                 return False | ||||||
|  |                  | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error banning IP with nftables: {e}") | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def unban_ip(self, ip): | ||||||
|  |         """Usuwa ban używając nftables""" | ||||||
|  |         try: | ||||||
|  |             # Znajdź handle reguły | ||||||
|  |             cmd = ['nft', '-a', 'list', 'chain', 'inet', self.table, self.chain] | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, text=True, timeout=5) | ||||||
|  |              | ||||||
|  |             if result.returncode != 0: | ||||||
|  |                 return False | ||||||
|  |                  | ||||||
|  |             # Parsuj output i znajdź handle | ||||||
|  |             for line in result.stdout.split('\n'): | ||||||
|  |                 if ip in line and '# handle' in line: | ||||||
|  |                     try: | ||||||
|  |                         handle = line.split('# handle')[1].strip() | ||||||
|  |                          | ||||||
|  |                         # Usuń regułę | ||||||
|  |                         cmd = [ | ||||||
|  |                             'nft', 'delete', 'rule', 'inet',  | ||||||
|  |                             self.table, self.chain, 'handle', handle | ||||||
|  |                         ] | ||||||
|  |                         subprocess.run(cmd, check=True, timeout=5) | ||||||
|  |                         self.logger.debug(f"nftables unban successful for {ip}") | ||||||
|  |                         return True | ||||||
|  |                          | ||||||
|  |                     except Exception as e: | ||||||
|  |                         self.logger.error(f"Error parsing handle: {e}") | ||||||
|  |                          | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error unbanning IP with nftables: {e}") | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def is_banned(self, ip): | ||||||
|  |         """Sprawdza czy IP jest zbanowany""" | ||||||
|  |         try: | ||||||
|  |             cmd = ['nft', 'list', 'chain', 'inet', self.table, self.chain] | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, text=True, timeout=5) | ||||||
|  |             return ip in result.stdout | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error checking ban status: {e}") | ||||||
|  |             return False | ||||||
							
								
								
									
										78
									
								
								backends/ufw.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										78
									
								
								backends/ufw.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,78 @@ | |||||||
|  | """ | ||||||
|  | Backend dla UFW (Uncomplicated Firewall) | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import subprocess | ||||||
|  | from .base import FirewallBackend | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class UFWBackend(FirewallBackend): | ||||||
|  |     """Backend dla UFW""" | ||||||
|  |      | ||||||
|  |     def test_availability(self): | ||||||
|  |         """Sprawdza czy UFW jest dostępny""" | ||||||
|  |         try: | ||||||
|  |             result = subprocess.run( | ||||||
|  |                 ['ufw', 'version'],  | ||||||
|  |                 capture_output=True, | ||||||
|  |                 timeout=5 | ||||||
|  |             ) | ||||||
|  |             return result.returncode == 0 | ||||||
|  |         except: | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def ban_ip(self, ip, duration): | ||||||
|  |         """Banuje IP używając UFW""" | ||||||
|  |         try: | ||||||
|  |             # UFW nie wspiera natywnie timeout, więc używamy prostego deny | ||||||
|  |             cmd = ['ufw', 'deny', 'from', ip] | ||||||
|  |              | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, timeout=5) | ||||||
|  |              | ||||||
|  |             if result.returncode == 0: | ||||||
|  |                 self.logger.debug(f"UFW ban successful for {ip}") | ||||||
|  |                 # UFW wymaga reload | ||||||
|  |                 subprocess.run(['ufw', 'reload'], capture_output=True, timeout=5) | ||||||
|  |                 return True | ||||||
|  |             else: | ||||||
|  |                 self.logger.error(f"UFW ban failed: {result.stderr.decode()}") | ||||||
|  |                 return False | ||||||
|  |                  | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error banning IP with UFW: {e}") | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def unban_ip(self, ip): | ||||||
|  |         """Usuwa ban używając UFW""" | ||||||
|  |         try: | ||||||
|  |             cmd = ['ufw', 'delete', 'deny', 'from', ip] | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, timeout=5) | ||||||
|  |              | ||||||
|  |             if result.returncode == 0: | ||||||
|  |                 self.logger.debug(f"UFW unban successful for {ip}") | ||||||
|  |                 subprocess.run(['ufw', 'reload'], capture_output=True, timeout=5) | ||||||
|  |                 return True | ||||||
|  |             else: | ||||||
|  |                 self.logger.warning(f"UFW unban may have failed") | ||||||
|  |                 return False | ||||||
|  |                  | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error unbanning IP with UFW: {e}") | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |     def is_banned(self, ip): | ||||||
|  |         """Sprawdza czy IP jest zbanowany""" | ||||||
|  |         try: | ||||||
|  |             cmd = ['ufw', 'status', 'numbered'] | ||||||
|  |             result = subprocess.run(cmd, capture_output=True, text=True, timeout=5) | ||||||
|  |              | ||||||
|  |             # Szukaj IP z DENY | ||||||
|  |             for line in result.stdout.split('\n'): | ||||||
|  |                 if ip in line and 'DENY' in line: | ||||||
|  |                     return True | ||||||
|  |                      | ||||||
|  |             return False | ||||||
|  |              | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error checking ban status: {e}") | ||||||
|  |             return False | ||||||
							
								
								
									
										42
									
								
								config.ini
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										42
									
								
								config.ini
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,42 @@ | |||||||
|  | [general] | ||||||
|  | debug = false | ||||||
|  | log_file = /var/log/logmon.log | ||||||
|  | pid_file = /var/run/logmon.pid | ||||||
|  | backend = csf | ||||||
|  |  | ||||||
|  | [backend_csf] | ||||||
|  | csf_path = /usr/sbin/csf | ||||||
|  | # Dodatkowe opcje CSF | ||||||
|  |  | ||||||
|  | [backend_nftables] | ||||||
|  | table_name = filter | ||||||
|  | chain_name = logmon_block | ||||||
|  |  | ||||||
|  | [backend_iptables] | ||||||
|  | chain_name = LOGMON_BLOCK | ||||||
|  |  | ||||||
|  | [backend_ufw] | ||||||
|  | # UFW nie wymaga dodatkowych parametrów | ||||||
|  |  | ||||||
|  | [module_postfix] | ||||||
|  | enabled = true | ||||||
|  | log_file = /var/log/mail.log | ||||||
|  | # Alternatywnie dla systemd: | ||||||
|  | # use_journald = true | ||||||
|  | # journald_unit = postfix.service | ||||||
|  |  | ||||||
|  | # Parametry detekcji | ||||||
|  | max_failures = 5 | ||||||
|  | time_window = 60 | ||||||
|  | ban_duration = 86400 | ||||||
|  |  | ||||||
|  | # Wzorce do wykrywania | ||||||
|  | patterns = auth_failed,sasl_failed | ||||||
|  |  | ||||||
|  | [pattern_auth_failed] | ||||||
|  | regex = authentication failed | ||||||
|  | score = 1 | ||||||
|  |  | ||||||
|  | [pattern_sasl_failed] | ||||||
|  | regex = SASL [A-Z\-\d]+ authentication failed | ||||||
|  | score = 2 | ||||||
							
								
								
									
										477
									
								
								logmon.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										477
									
								
								logmon.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,477 @@ | |||||||
|  | #!/usr/bin/env python3 | ||||||
|  | """ | ||||||
|  | LogMon - Modularny demon do monitorowania logów i blokowania IP | ||||||
|  | Autor: System Administrator | ||||||
|  | Wersja: 1.0 | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import sys | ||||||
|  | import os | ||||||
|  | import time | ||||||
|  | import signal | ||||||
|  | import logging | ||||||
|  | import argparse | ||||||
|  | import configparser | ||||||
|  | from collections import defaultdict, deque | ||||||
|  | from datetime import datetime, timedelta | ||||||
|  | from pathlib import Path | ||||||
|  |  | ||||||
|  | # Importy z lokalnych modułów | ||||||
|  | from modules import PostfixModule | ||||||
|  | from backends import CSFBackend, NFTablesBackend, IPTablesBackend, UFWBackend | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class LogMonDaemon: | ||||||
|  |     """Główny demon LogMon""" | ||||||
|  |      | ||||||
|  |     def __init__(self, config_file): | ||||||
|  |         """ | ||||||
|  |         Inicjalizacja demona | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             config_file: Ścieżka do pliku konfiguracyjnego INI | ||||||
|  |         """ | ||||||
|  |         self.config = configparser.ConfigParser() | ||||||
|  |         self.config.read(config_file) | ||||||
|  |          | ||||||
|  |         self.running = False | ||||||
|  |         self.ip_tracker = defaultdict(lambda: deque()) | ||||||
|  |         self.banned_ips = {} | ||||||
|  |          | ||||||
|  |         # Konfiguracja logowania | ||||||
|  |         self.setup_logging() | ||||||
|  |          | ||||||
|  |         # Wybór backendu firewall | ||||||
|  |         self.backend = self.load_backend() | ||||||
|  |          | ||||||
|  |         # Ładowanie modułów monitorowania | ||||||
|  |         self.modules = self.load_modules() | ||||||
|  |          | ||||||
|  |         # Obsługa sygnałów systemowych | ||||||
|  |         signal.signal(signal.SIGTERM, self.signal_handler) | ||||||
|  |         signal.signal(signal.SIGINT, self.signal_handler) | ||||||
|  |         signal.signal(signal.SIGHUP, self.signal_reload) | ||||||
|  |          | ||||||
|  |         self.logger.info("LogMon daemon initialized") | ||||||
|  |          | ||||||
|  |     def setup_logging(self): | ||||||
|  |         """Konfiguracja systemu logowania""" | ||||||
|  |         debug = self.config.getboolean('general', 'debug', fallback=False) | ||||||
|  |         log_file = self.config.get('general', 'log_file',  | ||||||
|  |                                    fallback='/var/log/logmon.log') | ||||||
|  |          | ||||||
|  |         level = logging.DEBUG if debug else logging.INFO | ||||||
|  |          | ||||||
|  |         # Usuń istniejące handlery | ||||||
|  |         logging.basicConfig( | ||||||
|  |             level=level, | ||||||
|  |             format='%(asctime)s - %(name)s - %(levelname)s - %(message)s', | ||||||
|  |             handlers=[ | ||||||
|  |                 logging.FileHandler(log_file), | ||||||
|  |                 logging.StreamHandler(sys.stdout) | ||||||
|  |             ] | ||||||
|  |         ) | ||||||
|  |          | ||||||
|  |         self.logger = logging.getLogger('LogMon') | ||||||
|  |         self.logger.info(f"Logging initialized (debug={debug})") | ||||||
|  |          | ||||||
|  |     def load_backend(self): | ||||||
|  |         """Ładuje odpowiedni backend firewall""" | ||||||
|  |         backend_name = self.config.get('general', 'backend', fallback='csf') | ||||||
|  |          | ||||||
|  |         self.logger.info(f"Loading backend: {backend_name}") | ||||||
|  |          | ||||||
|  |         backend_map = { | ||||||
|  |             'csf': CSFBackend, | ||||||
|  |             'nftables': NFTablesBackend, | ||||||
|  |             'iptables': IPTablesBackend, | ||||||
|  |             'ufw': UFWBackend | ||||||
|  |         } | ||||||
|  |          | ||||||
|  |         if backend_name not in backend_map: | ||||||
|  |             raise ValueError(f"Unknown backend: {backend_name}") | ||||||
|  |              | ||||||
|  |         backend_class = backend_map[backend_name] | ||||||
|  |         backend = backend_class(self.config) | ||||||
|  |          | ||||||
|  |         # Sprawdź dostępność | ||||||
|  |         if not backend.test_availability(): | ||||||
|  |             self.logger.warning(f"Backend {backend_name} may not be available!") | ||||||
|  |              | ||||||
|  |         return backend | ||||||
|  |          | ||||||
|  |     def load_modules(self): | ||||||
|  |         """Ładuje moduły monitorowania""" | ||||||
|  |         modules = [] | ||||||
|  |          | ||||||
|  |         # Postfix module | ||||||
|  |         if self.config.getboolean('module_postfix', 'enabled', fallback=False): | ||||||
|  |             try: | ||||||
|  |                 module = PostfixModule(self.config, self) | ||||||
|  |                 modules.append(module) | ||||||
|  |                 self.logger.info("Loaded Postfix module") | ||||||
|  |             except Exception as e: | ||||||
|  |                 self.logger.error(f"Error loading Postfix module: {e}") | ||||||
|  |                  | ||||||
|  |         # Tutaj można dodać więcej modułów w przyszłości | ||||||
|  |         # if self.config.getboolean('module_ssh', 'enabled', fallback=False): | ||||||
|  |         #     modules.append(SSHModule(self.config, self)) | ||||||
|  |          | ||||||
|  |         if not modules: | ||||||
|  |             self.logger.warning("No modules loaded!") | ||||||
|  |              | ||||||
|  |         return modules | ||||||
|  |          | ||||||
|  |     def signal_handler(self, signum, frame): | ||||||
|  |         """Obsługa sygnałów SIGTERM i SIGINT""" | ||||||
|  |         self.logger.info(f"Received signal {signum}, shutting down gracefully...") | ||||||
|  |         self.running = False | ||||||
|  |          | ||||||
|  |     def signal_reload(self, signum, frame): | ||||||
|  |         """Obsługa sygnału SIGHUP - reload konfiguracji""" | ||||||
|  |         self.logger.info("Received SIGHUP, reloading configuration...") | ||||||
|  |         # TODO: Implementacja reload konfiguracji | ||||||
|  |          | ||||||
|  |     def track_failure(self, ip, score=1): | ||||||
|  |         """ | ||||||
|  |         Śledzi nieudane próby logowania dla danego IP | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             ip: Adres IP atakującego | ||||||
|  |             score: Punkty za dane niepowodzenie (domyślnie 1) | ||||||
|  |         """ | ||||||
|  |         now = datetime.now() | ||||||
|  |          | ||||||
|  |         # Dodaj wpis do trackera | ||||||
|  |         self.ip_tracker[ip].append((now, score)) | ||||||
|  |          | ||||||
|  |         # Usuń stare wpisy spoza okna czasowego | ||||||
|  |         time_window = self.config.getint('module_postfix', 'time_window',  | ||||||
|  |                                          fallback=60) | ||||||
|  |         cutoff = now - timedelta(seconds=time_window) | ||||||
|  |          | ||||||
|  |         while self.ip_tracker[ip] and self.ip_tracker[ip][0][0] < cutoff: | ||||||
|  |             self.ip_tracker[ip].popleft() | ||||||
|  |              | ||||||
|  |         # Oblicz całkowity wynik | ||||||
|  |         total_score = sum(score for _, score in self.ip_tracker[ip]) | ||||||
|  |         failures_count = len(self.ip_tracker[ip]) | ||||||
|  |          | ||||||
|  |         max_failures = self.config.getint('module_postfix', 'max_failures',  | ||||||
|  |                                          fallback=5) | ||||||
|  |          | ||||||
|  |         self.logger.debug( | ||||||
|  |             f"IP {ip}: {failures_count} failures, score {total_score}/{max_failures}" | ||||||
|  |         ) | ||||||
|  |          | ||||||
|  |         # Sprawdź czy przekroczono limit | ||||||
|  |         if total_score >= max_failures and ip not in self.banned_ips: | ||||||
|  |             self.ban_ip(ip) | ||||||
|  |         elif total_score >= max_failures and ip in self.banned_ips: | ||||||
|  |             self.logger.debug(f"IP {ip} already banned, ignoring") | ||||||
|  |              | ||||||
|  |     def ban_ip(self, ip): | ||||||
|  |         """ | ||||||
|  |         Banuje adres IP | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             ip: Adres IP do zbanowania | ||||||
|  |         """ | ||||||
|  |         ban_duration = self.config.getint('module_postfix', 'ban_duration',  | ||||||
|  |                                          fallback=86400) | ||||||
|  |          | ||||||
|  |         self.logger.warning( | ||||||
|  |             f"Banning IP {ip} for {ban_duration} seconds " | ||||||
|  |             f"({ban_duration/3600:.1f} hours)" | ||||||
|  |         ) | ||||||
|  |          | ||||||
|  |         if self.backend.ban_ip(ip, ban_duration): | ||||||
|  |             expiry_time = datetime.now() + timedelta(seconds=ban_duration) | ||||||
|  |             self.banned_ips[ip] = expiry_time | ||||||
|  |              | ||||||
|  |             self.logger.info( | ||||||
|  |                 f"Successfully banned {ip} until {expiry_time.strftime('%Y-%m-%d %H:%M:%S')}" | ||||||
|  |             ) | ||||||
|  |              | ||||||
|  |             # Wyczyść tracker dla tego IP | ||||||
|  |             if ip in self.ip_tracker: | ||||||
|  |                 del self.ip_tracker[ip] | ||||||
|  |         else: | ||||||
|  |             self.logger.error(f"Failed to ban {ip}") | ||||||
|  |              | ||||||
|  |     def unban_ip(self, ip): | ||||||
|  |         """ | ||||||
|  |         Odbania adres IP | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             ip: Adres IP do odbanowania | ||||||
|  |         """ | ||||||
|  |         self.logger.info(f"Unbanning expired IP {ip}") | ||||||
|  |          | ||||||
|  |         if self.backend.unban_ip(ip): | ||||||
|  |             if ip in self.banned_ips: | ||||||
|  |                 del self.banned_ips[ip] | ||||||
|  |             self.logger.info(f"Successfully unbanned {ip}") | ||||||
|  |         else: | ||||||
|  |             self.logger.error(f"Failed to unban {ip}") | ||||||
|  |              | ||||||
|  |     def unban_expired(self): | ||||||
|  |         """Usuwa bany, które wygasły""" | ||||||
|  |         now = datetime.now() | ||||||
|  |         expired = [ip for ip, expiry in self.banned_ips.items()  | ||||||
|  |                    if now >= expiry] | ||||||
|  |          | ||||||
|  |         for ip in expired: | ||||||
|  |             self.unban_ip(ip) | ||||||
|  |              | ||||||
|  |     def save_state(self): | ||||||
|  |         """Zapisuje stan banów do pliku (opcjonalnie)""" | ||||||
|  |         # TODO: Implementacja persystencji stanu | ||||||
|  |         pass | ||||||
|  |          | ||||||
|  |     def load_state(self): | ||||||
|  |         """Ładuje stan banów z pliku (opcjonalnie)""" | ||||||
|  |         # TODO: Implementacja persystencji stanu | ||||||
|  |         pass | ||||||
|  |          | ||||||
|  |     def daemonize(self): | ||||||
|  |         """Przechodzi w tryb demona (fork)""" | ||||||
|  |         pid_file = self.config.get('general', 'pid_file',  | ||||||
|  |                                    fallback='/var/run/logmon.pid') | ||||||
|  |          | ||||||
|  |         # Sprawdź czy już działa | ||||||
|  |         if os.path.exists(pid_file): | ||||||
|  |             with open(pid_file, 'r') as f: | ||||||
|  |                 old_pid = int(f.read().strip()) | ||||||
|  |                  | ||||||
|  |             # Sprawdź czy proces istnieje | ||||||
|  |             try: | ||||||
|  |                 os.kill(old_pid, 0) | ||||||
|  |                 self.logger.error(f"Daemon already running with PID {old_pid}") | ||||||
|  |                 sys.exit(1) | ||||||
|  |             except OSError: | ||||||
|  |                 # Proces nie istnieje, usuń stary PID file | ||||||
|  |                 os.remove(pid_file) | ||||||
|  |          | ||||||
|  |         # Pierwszy fork | ||||||
|  |         try: | ||||||
|  |             pid = os.fork() | ||||||
|  |             if pid > 0: | ||||||
|  |                 # Parent process | ||||||
|  |                 sys.exit(0) | ||||||
|  |         except OSError as e: | ||||||
|  |             self.logger.error(f"Fork #1 failed: {e}") | ||||||
|  |             sys.exit(1) | ||||||
|  |              | ||||||
|  |         # Odłącz od terminala | ||||||
|  |         os.chdir('/') | ||||||
|  |         os.setsid() | ||||||
|  |         os.umask(0) | ||||||
|  |          | ||||||
|  |         # Drugi fork | ||||||
|  |         try: | ||||||
|  |             pid = os.fork() | ||||||
|  |             if pid > 0: | ||||||
|  |                 # Parent process | ||||||
|  |                 sys.exit(0) | ||||||
|  |         except OSError as e: | ||||||
|  |             self.logger.error(f"Fork #2 failed: {e}") | ||||||
|  |             sys.exit(1) | ||||||
|  |              | ||||||
|  |         # Zapisz PID | ||||||
|  |         pid = os.getpid() | ||||||
|  |         with open(pid_file, 'w') as f: | ||||||
|  |             f.write(str(pid)) | ||||||
|  |              | ||||||
|  |         self.logger.info(f"Daemon started with PID {pid}") | ||||||
|  |          | ||||||
|  |         # Przekieruj standardowe wyjścia | ||||||
|  |         sys.stdout.flush() | ||||||
|  |         sys.stderr.flush() | ||||||
|  |          | ||||||
|  |         devnull = open(os.devnull, 'r+') | ||||||
|  |         os.dup2(devnull.fileno(), sys.stdin.fileno()) | ||||||
|  |          | ||||||
|  |         # Stdout i stderr zostawiamy dla logowania | ||||||
|  |          | ||||||
|  |     def cleanup(self): | ||||||
|  |         """Sprzątanie przed zakończeniem""" | ||||||
|  |         pid_file = self.config.get('general', 'pid_file',  | ||||||
|  |                                    fallback='/var/run/logmon.pid') | ||||||
|  |          | ||||||
|  |         # Usuń PID file | ||||||
|  |         if os.path.exists(pid_file): | ||||||
|  |             try: | ||||||
|  |                 os.remove(pid_file) | ||||||
|  |             except Exception as e: | ||||||
|  |                 self.logger.error(f"Error removing PID file: {e}") | ||||||
|  |                  | ||||||
|  |     def print_status(self): | ||||||
|  |         """Wyświetla status demona""" | ||||||
|  |         print("\n=== LogMon Status ===") | ||||||
|  |         print(f"Backend: {self.backend.__class__.__name__}") | ||||||
|  |         print(f"Modules: {len(self.modules)}") | ||||||
|  |         print(f"Currently banned IPs: {len(self.banned_ips)}") | ||||||
|  |         print(f"Tracked IPs: {len(self.ip_tracker)}") | ||||||
|  |          | ||||||
|  |         if self.banned_ips: | ||||||
|  |             print("\nBanned IPs:") | ||||||
|  |             for ip, expiry in sorted(self.banned_ips.items(),  | ||||||
|  |                                     key=lambda x: x[1]): | ||||||
|  |                 remaining = (expiry - datetime.now()).total_seconds() | ||||||
|  |                 if remaining > 0: | ||||||
|  |                     print(f"  {ip:15s} - expires in {remaining/60:.1f} minutes") | ||||||
|  |                 else: | ||||||
|  |                     print(f"  {ip:15s} - EXPIRED") | ||||||
|  |                      | ||||||
|  |         print("\n") | ||||||
|  |          | ||||||
|  |     def run(self, daemonize=True): | ||||||
|  |         """ | ||||||
|  |         Główna pętla demona | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             daemonize: Czy przejść w tryb demona (fork) | ||||||
|  |         """ | ||||||
|  |         if daemonize: | ||||||
|  |             self.daemonize() | ||||||
|  |              | ||||||
|  |         self.running = True | ||||||
|  |         self.logger.info("LogMon daemon started") | ||||||
|  |          | ||||||
|  |         # Uruchom moduły | ||||||
|  |         for module in self.modules: | ||||||
|  |             try: | ||||||
|  |                 module.start() | ||||||
|  |             except Exception as e: | ||||||
|  |                 self.logger.error(f"Error starting module: {e}") | ||||||
|  |                  | ||||||
|  |         # Główna pętla | ||||||
|  |         try: | ||||||
|  |             while self.running: | ||||||
|  |                 try: | ||||||
|  |                     # Sprawdź wygasłe bany co 10 sekund | ||||||
|  |                     self.unban_expired() | ||||||
|  |                      | ||||||
|  |                     # Wyświetl status co minutę (tylko w debug mode) | ||||||
|  |                     if self.config.getboolean('general', 'debug', fallback=False): | ||||||
|  |                         if int(time.time()) % 60 == 0: | ||||||
|  |                             self.logger.debug( | ||||||
|  |                                 f"Status: {len(self.banned_ips)} banned, " | ||||||
|  |                                 f"{len(self.ip_tracker)} tracked" | ||||||
|  |                             ) | ||||||
|  |                      | ||||||
|  |                     # Krótkie oczekiwanie | ||||||
|  |                     time.sleep(10) | ||||||
|  |                      | ||||||
|  |                 except KeyboardInterrupt: | ||||||
|  |                     self.logger.info("Keyboard interrupt received") | ||||||
|  |                     break | ||||||
|  |                 except Exception as e: | ||||||
|  |                     self.logger.error(f"Error in main loop: {e}", exc_info=True) | ||||||
|  |                     time.sleep(1) | ||||||
|  |                      | ||||||
|  |         finally: | ||||||
|  |             # Zatrzymaj moduły | ||||||
|  |             self.logger.info("Stopping modules...") | ||||||
|  |             for module in self.modules: | ||||||
|  |                 try: | ||||||
|  |                     module.stop() | ||||||
|  |                 except Exception as e: | ||||||
|  |                     self.logger.error(f"Error stopping module: {e}") | ||||||
|  |                      | ||||||
|  |             # Sprzątanie | ||||||
|  |             self.cleanup() | ||||||
|  |              | ||||||
|  |             self.logger.info("LogMon daemon stopped") | ||||||
|  |  | ||||||
|  |  | ||||||
|  | def main(): | ||||||
|  |     """Główna funkcja programu""" | ||||||
|  |     parser = argparse.ArgumentParser( | ||||||
|  |         description='LogMon - Log Monitoring and IP Blocking Daemon', | ||||||
|  |         formatter_class=argparse.RawDescriptionHelpFormatter, | ||||||
|  |         epilog=""" | ||||||
|  | Przykłady użycia: | ||||||
|  |   %(prog)s -c /etc/logmon/config.ini          # Uruchom jako demon | ||||||
|  |   %(prog)s -c /etc/logmon/config.ini -f       # Uruchom w foreground | ||||||
|  |   %(prog)s -c /etc/logmon/config.ini -f -d    # Uruchom w foreground z debugiem | ||||||
|  |    | ||||||
|  | Sygnały: | ||||||
|  |   SIGTERM, SIGINT - graceful shutdown | ||||||
|  |   SIGHUP          - reload konfiguracji (TODO) | ||||||
|  |         """ | ||||||
|  |     ) | ||||||
|  |      | ||||||
|  |     parser.add_argument( | ||||||
|  |         '-c', '--config', | ||||||
|  |         default='/etc/logmon/config.ini', | ||||||
|  |         help='Ścieżka do pliku konfiguracyjnego (domyślnie: /etc/logmon/config.ini)' | ||||||
|  |     ) | ||||||
|  |      | ||||||
|  |     parser.add_argument( | ||||||
|  |         '-f', '--foreground', | ||||||
|  |         action='store_true', | ||||||
|  |         help='Uruchom w foreground (nie demonizuj)' | ||||||
|  |     ) | ||||||
|  |      | ||||||
|  |     parser.add_argument( | ||||||
|  |         '-d', '--debug', | ||||||
|  |         action='store_true', | ||||||
|  |         help='Włącz tryb debug (nadpisuje ustawienie z config.ini)' | ||||||
|  |     ) | ||||||
|  |      | ||||||
|  |     parser.add_argument( | ||||||
|  |         '-t', '--test', | ||||||
|  |         action='store_true', | ||||||
|  |         help='Test konfiguracji i wyjście' | ||||||
|  |     ) | ||||||
|  |      | ||||||
|  |     parser.add_argument( | ||||||
|  |         '--version', | ||||||
|  |         action='version', | ||||||
|  |         version='LogMon 1.0' | ||||||
|  |     ) | ||||||
|  |      | ||||||
|  |     args = parser.parse_args() | ||||||
|  |      | ||||||
|  |     # Sprawdź czy plik konfiguracyjny istnieje | ||||||
|  |     if not os.path.exists(args.config): | ||||||
|  |         print(f"Error: Configuration file not found: {args.config}", file=sys.stderr) | ||||||
|  |         sys.exit(1) | ||||||
|  |          | ||||||
|  |     # Sprawdź uprawnienia root | ||||||
|  |     if os.geteuid() != 0 and not args.test: | ||||||
|  |         print("Error: This program must be run as root", file=sys.stderr) | ||||||
|  |         sys.exit(1) | ||||||
|  |          | ||||||
|  |     try: | ||||||
|  |         # Inicjalizacja demona | ||||||
|  |         daemon = LogMonDaemon(args.config) | ||||||
|  |          | ||||||
|  |         # Nadpisz debug jeśli podano w argumentach | ||||||
|  |         if args.debug: | ||||||
|  |             daemon.config.set('general', 'debug', 'true') | ||||||
|  |             daemon.setup_logging() | ||||||
|  |              | ||||||
|  |         # Tryb testowy | ||||||
|  |         if args.test: | ||||||
|  |             print("Configuration test successful") | ||||||
|  |             daemon.print_status() | ||||||
|  |             sys.exit(0) | ||||||
|  |              | ||||||
|  |         # Uruchom demona | ||||||
|  |         daemon.run(daemonize=not args.foreground) | ||||||
|  |          | ||||||
|  |     except KeyboardInterrupt: | ||||||
|  |         print("\nInterrupted by user") | ||||||
|  |         sys.exit(0) | ||||||
|  |     except Exception as e: | ||||||
|  |         print(f"Fatal error: {e}", file=sys.stderr) | ||||||
|  |         import traceback | ||||||
|  |         traceback.print_exc() | ||||||
|  |         sys.exit(1) | ||||||
|  |  | ||||||
|  |  | ||||||
|  | if __name__ == '__main__': | ||||||
|  |     main() | ||||||
							
								
								
									
										23
									
								
								logmon.service
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								logmon.service
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,23 @@ | |||||||
|  | [Unit] | ||||||
|  | Description=LogMon - Log Monitoring and IP Blocking Daemon | ||||||
|  | After=network.target syslog.target | ||||||
|  |  | ||||||
|  | [Service] | ||||||
|  | Type=forking | ||||||
|  | User=root | ||||||
|  | Group=root | ||||||
|  | WorkingDirectory=/opt/logmon | ||||||
|  | ExecStart=/usr/bin/python3 /opt/logmon/logmon.py -c /etc/logmon/config.ini | ||||||
|  | ExecReload=/bin/kill -HUP $MAINPID | ||||||
|  | PIDFile=/var/run/logmon.pid | ||||||
|  | Restart=on-failure | ||||||
|  | RestartSec=10s | ||||||
|  |  | ||||||
|  | # Security hardening | ||||||
|  | PrivateTmp=yes | ||||||
|  | NoNewPrivileges=false | ||||||
|  | ProtectSystem=strict | ||||||
|  | ReadWritePaths=/var/log /var/run /etc/csf | ||||||
|  |  | ||||||
|  | [Install] | ||||||
|  | WantedBy=multi-user.target | ||||||
							
								
								
									
										54
									
								
								modules/base.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										54
									
								
								modules/base.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,54 @@ | |||||||
|  | """ | ||||||
|  | Bazowa klasa dla modułów monitorowania logów | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import logging | ||||||
|  | import time | ||||||
|  | import threading | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class LogModule: | ||||||
|  |     """Bazowa klasa dla modułów monitorowania""" | ||||||
|  |      | ||||||
|  |     def __init__(self, config, daemon): | ||||||
|  |         """ | ||||||
|  |         Args: | ||||||
|  |             config: ConfigParser object z konfiguracją | ||||||
|  |             daemon: Referencja do głównego demona | ||||||
|  |         """ | ||||||
|  |         self.config = config | ||||||
|  |         self.daemon = daemon | ||||||
|  |         self.logger = logging.getLogger(self.__class__.__name__) | ||||||
|  |         self.running = False | ||||||
|  |         self.thread = None | ||||||
|  |          | ||||||
|  |     def start(self): | ||||||
|  |         """Uruchamia moduł w osobnym wątku""" | ||||||
|  |         if self.running: | ||||||
|  |             self.logger.warning("Module already running") | ||||||
|  |             return | ||||||
|  |              | ||||||
|  |         self.running = True | ||||||
|  |         self.thread = threading.Thread(target=self._run, daemon=True) | ||||||
|  |         self.thread.start() | ||||||
|  |         self.logger.info(f"{self.__class__.__name__} started") | ||||||
|  |          | ||||||
|  |     def stop(self): | ||||||
|  |         """Zatrzymuje moduł""" | ||||||
|  |         self.running = False | ||||||
|  |         if self.thread and self.thread.is_alive(): | ||||||
|  |             self.thread.join(timeout=5) | ||||||
|  |         self.logger.info(f"{self.__class__.__name__} stopped") | ||||||
|  |          | ||||||
|  |     def _run(self): | ||||||
|  |         """Główna pętla modułu - do nadpisania w klasach potomnych""" | ||||||
|  |         raise NotImplementedError("Subclasses must implement _run()") | ||||||
|  |          | ||||||
|  |     def process_line(self, line): | ||||||
|  |         """ | ||||||
|  |         Przetwarza pojedynczą linię logu | ||||||
|  |          | ||||||
|  |         Args: | ||||||
|  |             line: Linia tekstu z logu | ||||||
|  |         """ | ||||||
|  |         raise NotImplementedError("Subclasses must implement process_line()") | ||||||
							
								
								
									
										8
									
								
								modules/init.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								modules/init.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,8 @@ | |||||||
|  | """ | ||||||
|  | LogMon Modules - Moduły monitorowania różnych aplikacji | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | from .base import LogModule | ||||||
|  | from .postfix import PostfixModule | ||||||
|  |  | ||||||
|  | __all__ = ['LogModule', 'PostfixModule'] | ||||||
							
								
								
									
										120
									
								
								modules/postfix.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										120
									
								
								modules/postfix.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,120 @@ | |||||||
|  | """ | ||||||
|  | Moduł monitorujący Postfix SMTP server | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import re | ||||||
|  | import time | ||||||
|  | from .base import LogModule | ||||||
|  |  | ||||||
|  |  | ||||||
|  | class PostfixModule(LogModule): | ||||||
|  |     """Moduł monitorujący Postfix""" | ||||||
|  |      | ||||||
|  |     def __init__(self, config, daemon): | ||||||
|  |         super().__init__(config, daemon) | ||||||
|  |          | ||||||
|  |         # Kompiluj wzorce regex dla wydajności | ||||||
|  |         self.patterns = self._load_patterns() | ||||||
|  |          | ||||||
|  |         # Regex do wyciągania IP z logów Postfix | ||||||
|  |         # Obsługuje zarówno unknown[IP] jak i hostname[IP] | ||||||
|  |         self.ip_pattern = re.compile( | ||||||
|  |             r'(?:unknown|[\w\-\.]+)\[(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\]' | ||||||
|  |         ) | ||||||
|  |          | ||||||
|  |         # Ścieżka do pliku logu | ||||||
|  |         self.log_file = config.get('module_postfix', 'log_file',  | ||||||
|  |                                    fallback='/var/log/mail.log') | ||||||
|  |          | ||||||
|  |         self.logger.info(f"Loaded {len(self.patterns)} patterns for Postfix") | ||||||
|  |          | ||||||
|  |     def _load_patterns(self): | ||||||
|  |         """Ładuje wzorce z konfiguracji""" | ||||||
|  |         patterns = [] | ||||||
|  |         pattern_names = self.config.get('module_postfix', 'patterns',  | ||||||
|  |                                        fallback='').split(',') | ||||||
|  |          | ||||||
|  |         for name in pattern_names: | ||||||
|  |             name = name.strip() | ||||||
|  |             if not name: | ||||||
|  |                 continue | ||||||
|  |                  | ||||||
|  |             section = f'pattern_{name}' | ||||||
|  |             if section not in self.config: | ||||||
|  |                 self.logger.warning(f"Pattern section '{section}' not found in config") | ||||||
|  |                 continue | ||||||
|  |                  | ||||||
|  |             try: | ||||||
|  |                 regex = self.config.get(section, 'regex') | ||||||
|  |                 score = self.config.getint(section, 'score', fallback=1) | ||||||
|  |                  | ||||||
|  |                 patterns.append({ | ||||||
|  |                     'name': name, | ||||||
|  |                     'regex': re.compile(regex, re.IGNORECASE), | ||||||
|  |                     'score': score | ||||||
|  |                 }) | ||||||
|  |                  | ||||||
|  |                 self.logger.debug(f"Loaded pattern '{name}': {regex} (score: {score})") | ||||||
|  |                  | ||||||
|  |             except Exception as e: | ||||||
|  |                 self.logger.error(f"Error loading pattern '{name}': {e}") | ||||||
|  |                  | ||||||
|  |         return patterns | ||||||
|  |          | ||||||
|  |     def _run(self): | ||||||
|  |         """Główna pętla - tail -f na pliku logu""" | ||||||
|  |         self.logger.info(f"Tailing log file: {self.log_file}") | ||||||
|  |          | ||||||
|  |         try: | ||||||
|  |             with open(self.log_file, 'r') as f: | ||||||
|  |                 # Przejdź na koniec pliku | ||||||
|  |                 f.seek(0, 2) | ||||||
|  |                  | ||||||
|  |                 while self.running: | ||||||
|  |                     line = f.readline() | ||||||
|  |                      | ||||||
|  |                     if line: | ||||||
|  |                         self.process_line(line.strip()) | ||||||
|  |                     else: | ||||||
|  |                         # Brak nowych linii, czekaj chwilę | ||||||
|  |                         time.sleep(0.1) | ||||||
|  |                          | ||||||
|  |         except FileNotFoundError: | ||||||
|  |             self.logger.error(f"Log file not found: {self.log_file}") | ||||||
|  |         except PermissionError: | ||||||
|  |             self.logger.error(f"Permission denied reading: {self.log_file}") | ||||||
|  |         except Exception as e: | ||||||
|  |             self.logger.error(f"Error tailing log: {e}") | ||||||
|  |              | ||||||
|  |     def process_line(self, line): | ||||||
|  |         """ | ||||||
|  |         Przetwarza linię z logu Postfix | ||||||
|  |          | ||||||
|  |         Przykłady linii: | ||||||
|  |         - postfix/smtpd[1234]: warning: unknown[1.2.3.4]: SASL LOGIN authentication failed | ||||||
|  |         - postfix/smtpd[1234]: connect from unknown[1.2.3.4] | ||||||
|  |         """ | ||||||
|  |         # Wyciągnij IP | ||||||
|  |         ip_match = self.ip_pattern.search(line) | ||||||
|  |         if not ip_match: | ||||||
|  |             return | ||||||
|  |              | ||||||
|  |         ip = ip_match.group(1) | ||||||
|  |          | ||||||
|  |         # Pomiń lokalne IP | ||||||
|  |         if ip.startswith('127.') or ip.startswith('192.168.') or ip.startswith('10.'): | ||||||
|  |             return | ||||||
|  |              | ||||||
|  |         # Sprawdź wzorce | ||||||
|  |         for pattern in self.patterns: | ||||||
|  |             if pattern['regex'].search(line): | ||||||
|  |                 self.logger.debug( | ||||||
|  |                     f"Pattern '{pattern['name']}' matched for IP {ip}" | ||||||
|  |                 ) | ||||||
|  |                 self.logger.debug(f"Line: {line}") | ||||||
|  |                  | ||||||
|  |                 # Zgłoś niepowodzenie do demona | ||||||
|  |                 self.daemon.track_failure(ip, pattern['score']) | ||||||
|  |                  | ||||||
|  |                 # Tylko pierwszy pasujący wzorzec | ||||||
|  |                 break | ||||||
							
								
								
									
										5
									
								
								utils/init.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								utils/init.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,5 @@ | |||||||
|  | """ | ||||||
|  | LogMon Utils - Narzędzia pomocnicze | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | __all__ = [] | ||||||
							
								
								
									
										40
									
								
								utils/logger.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										40
									
								
								utils/logger.py
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,40 @@ | |||||||
|  | """ | ||||||
|  | Pomocnicze funkcje do logowania | ||||||
|  | """ | ||||||
|  |  | ||||||
|  | import logging | ||||||
|  | import logging.handlers | ||||||
|  |  | ||||||
|  |  | ||||||
|  | def setup_rotating_logger(name, log_file, max_bytes=10485760, backup_count=5, level=logging.INFO): | ||||||
|  |     """ | ||||||
|  |     Konfiguruje logger z rotacją plików | ||||||
|  |      | ||||||
|  |     Args: | ||||||
|  |         name: Nazwa loggera | ||||||
|  |         log_file: Ścieżka do pliku logu | ||||||
|  |         max_bytes: Maksymalny rozmiar pliku (domyślnie 10MB) | ||||||
|  |         backup_count: Liczba backup plików | ||||||
|  |         level: Poziom logowania | ||||||
|  |          | ||||||
|  |     Returns: | ||||||
|  |         Logger object | ||||||
|  |     """ | ||||||
|  |     logger = logging.getLogger(name) | ||||||
|  |     logger.setLevel(level) | ||||||
|  |      | ||||||
|  |     # Rotating file handler | ||||||
|  |     handler = logging.handlers.RotatingFileHandler( | ||||||
|  |         log_file, | ||||||
|  |         maxBytes=max_bytes, | ||||||
|  |         backupCount=backup_count | ||||||
|  |     ) | ||||||
|  |      | ||||||
|  |     formatter = logging.Formatter( | ||||||
|  |         '%(asctime)s - %(name)s - %(levelname)s - %(message)s' | ||||||
|  |     ) | ||||||
|  |     handler.setFormatter(formatter) | ||||||
|  |      | ||||||
|  |     logger.addHandler(handler) | ||||||
|  |      | ||||||
|  |     return logger | ||||||
		Reference in New Issue
	
	Block a user
	 Mateusz Gruszczyński
					Mateusz Gruszczyński