mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-26 01:23:14 +01:00
Correct typo in action.IfEvent
Signed-off-by: Tom Eastep <teastep@shorewall.net>
This commit is contained in:
parent
72651a5397
commit
36a4ef1676
@ -47,7 +47,7 @@ fatal_error "Invalid event name ($event)" unless $event =~ /^[a-zA-z][-\
|
|||||||
|
|
||||||
if ( supplied $duration ) {
|
if ( supplied $duration ) {
|
||||||
fatal_error "Invalid time limit ($duration)" unless $duration =~ /^\d+$/;
|
fatal_error "Invalid time limit ($duration)" unless $duration =~ /^\d+$/;
|
||||||
$duration = "--second $duration ";
|
$duration = "--seconds $duration ";
|
||||||
} else {
|
} else {
|
||||||
$duration = '';
|
$duration = '';
|
||||||
}
|
}
|
||||||
|
@ -487,7 +487,7 @@ root@gateway:~# </programlisting>
|
|||||||
|
|
||||||
<programlisting>#ACTION OPTION DESCRIPTION
|
<programlisting>#ACTION OPTION DESCRIPTION
|
||||||
SSHLIMIT #Automatically blacklist hosts who exceed SSH connection limits
|
SSHLIMIT #Automatically blacklist hosts who exceed SSH connection limits
|
||||||
</programlisting>
|
SSH_BLACKLIST #Helper for SSHLIMIT</programlisting>
|
||||||
|
|
||||||
<para><filename>/etc/shorewall/action.SSH_BLACKLIST</filename>:</para>
|
<para><filename>/etc/shorewall/action.SSH_BLACKLIST</filename>:</para>
|
||||||
|
|
||||||
|
592
docs/Events1.xml
592
docs/Events1.xml
@ -1,592 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
|
|
||||||
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
|
||||||
<article>
|
|
||||||
<!--$Id$-->
|
|
||||||
|
|
||||||
<articleinfo>
|
|
||||||
<title>Shorewall Events</title>
|
|
||||||
|
|
||||||
<authorgroup>
|
|
||||||
<author>
|
|
||||||
<firstname>Tom</firstname>
|
|
||||||
|
|
||||||
<surname>Eastep</surname>
|
|
||||||
</author>
|
|
||||||
</authorgroup>
|
|
||||||
|
|
||||||
<pubdate><?dbtimestamp format="Y/m/d"?></pubdate>
|
|
||||||
|
|
||||||
<copyright>
|
|
||||||
<year>2013</year>
|
|
||||||
|
|
||||||
<holder>Thomas M. Eastep</holder>
|
|
||||||
</copyright>
|
|
||||||
|
|
||||||
<legalnotice>
|
|
||||||
<para>Permission is granted to copy, distribute and/or modify this
|
|
||||||
document under the terms of the GNU Free Documentation License, Version
|
|
||||||
1.2 or any later version published by the Free Software Foundation; with
|
|
||||||
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
|
||||||
Texts. A copy of the license is included in the section entitled
|
|
||||||
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation
|
|
||||||
License</ulink></quote>.</para>
|
|
||||||
</legalnotice>
|
|
||||||
</articleinfo>
|
|
||||||
|
|
||||||
<caution>
|
|
||||||
<para>This article applies to Shorewall 4.5.19 and later and supercedes
|
|
||||||
<ulink url="PortKnocking.html">this article.</ulink></para>
|
|
||||||
</caution>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>Overview</title>
|
|
||||||
|
|
||||||
<para>Shorewall events were introduced in Shorewall 4.5.19 and provide a
|
|
||||||
high-level interface to the Netfilter<firstterm> recent match</firstterm>
|
|
||||||
capability. An event is actually a list of (IP address, timestamp) pairs,
|
|
||||||
and can be tested in a number of different ways:</para>
|
|
||||||
|
|
||||||
<itemizedlist>
|
|
||||||
<listitem>
|
|
||||||
<para>Has event E ever occurred for IP address A (is the IP address in
|
|
||||||
the list)?</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Has event E occurred M or more times for IP address A?</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Has Event E occurred in the last N seconds for IP Address A (is
|
|
||||||
there an entry for the address with a timestamp falling within the
|
|
||||||
last N seconds)?</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Has Event E occurred M or more times in the last N seconds for
|
|
||||||
IP address A (are there M or more entries for the address with
|
|
||||||
timestamps falling within the last N seconds)?</para>
|
|
||||||
</listitem>
|
|
||||||
</itemizedlist>
|
|
||||||
|
|
||||||
<para>The event interface is implemented as three parameterized Shorewall
|
|
||||||
<ulink url="Actions.html">Actions</ulink>:</para>
|
|
||||||
|
|
||||||
<variablelist>
|
|
||||||
<varlistentry>
|
|
||||||
<term>SetEvent</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>This action initializes an event list for either the source or
|
|
||||||
destination IP address in the current packets. The list will contain
|
|
||||||
a single entry for the address that will have the current
|
|
||||||
timestamp.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>ResetEvent</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>This action removes all entries for either the source or
|
|
||||||
destination IP address from an event list.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>IfEvent</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>This action tests an event in one of the ways listed above,
|
|
||||||
and performs an action based on the result.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
</variablelist>
|
|
||||||
|
|
||||||
<para>Events are based on the Netfilter 'recent match' capability which is
|
|
||||||
required for their use.</para>
|
|
||||||
|
|
||||||
<para>The recent-match kernel component is xt_recent which has two options
|
|
||||||
that are of interest to Shorewall users:</para>
|
|
||||||
|
|
||||||
<variablelist>
|
|
||||||
<varlistentry>
|
|
||||||
<term>ip_list_tot</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>The number of addresses remembered per event. Default is
|
|
||||||
100.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>ip_pkt_list_tot</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>The number of packets (event occurrences) remembered per
|
|
||||||
address. Default is 20.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
</variablelist>
|
|
||||||
|
|
||||||
<para>These may be changed with the xt_recent module is loaded or on the
|
|
||||||
kernel bootloader runline.</para>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>Details</title>
|
|
||||||
|
|
||||||
<para>Because these are parameterized actions, optional parameters may be
|
|
||||||
omitted. Trailing omitted parameters may be omitted entirely while
|
|
||||||
embedded omitted parameters are represented by a hyphen ("-").</para>
|
|
||||||
|
|
||||||
<para>Each event is given a name. Event names:</para>
|
|
||||||
|
|
||||||
<itemizedlist>
|
|
||||||
<listitem>
|
|
||||||
<para>Must begin with a letter.</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>May be composed of letters, digits, hyphens ('-') or underscores
|
|
||||||
('_').</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>May be at most 29 characters in length.</para>
|
|
||||||
</listitem>
|
|
||||||
</itemizedlist>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>SetEvent</title>
|
|
||||||
|
|
||||||
<para><emphasis role="bold">SetEvent</emphasis>(
|
|
||||||
<replaceable>event</replaceable>, [ <replaceable>action</replaceable> ],
|
|
||||||
[ <replaceable>src-dst</replaceable> ], [
|
|
||||||
<replaceable>disposition</replaceable> ] )</para>
|
|
||||||
|
|
||||||
<variablelist>
|
|
||||||
<varlistentry>
|
|
||||||
<term>event</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Name of the event.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>action</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>An action to perform after the event is initialized. May be
|
|
||||||
any action that may appear in the ACTION column of <ulink
|
|
||||||
url="manpages/shorewall-rules.html">shorewall-rules</ulink> (5).
|
|
||||||
If no action is to be performed, use COUNT.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>src-dst</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Specifies whether the source IP address (<emphasis
|
|
||||||
role="bold">src</emphasis>) or destination IP address (<emphasis
|
|
||||||
role="bold">dst</emphasis>) is to be added to the event. The
|
|
||||||
default is <emphasis role="bold">src</emphasis>.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>disposition</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>If the <replaceable>action</replaceable> involves logging,
|
|
||||||
then this parameter specifies the disposition that will appear in
|
|
||||||
the log entry prefix. If no <replaceable>disposition</replaceable>
|
|
||||||
is given, the log prefix is determines normally. The default is
|
|
||||||
ACCEPT.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
</variablelist>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>ResetEvent</title>
|
|
||||||
|
|
||||||
<para><emphasis role="bold">ResetEvent</emphasis>(
|
|
||||||
<replaceable>event</replaceable>, [ <replaceable>action</replaceable> ],
|
|
||||||
[ <replaceable>src-dst</replaceable> ], [
|
|
||||||
<replaceable>disposition</replaceable> ] )</para>
|
|
||||||
|
|
||||||
<variablelist>
|
|
||||||
<varlistentry>
|
|
||||||
<term>event</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Name of the event.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>action</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>An action to perform after the event is reset. May be any
|
|
||||||
action that may appear in the ACTION column of <ulink
|
|
||||||
url="manpages/shorewall-rules.html">shorewall-rules</ulink> (5).
|
|
||||||
If no action is to be performed, use COUNT. The default is
|
|
||||||
ACCEPT.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>src-dst</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Specifies whether the source IP address (<emphasis
|
|
||||||
role="bold">src</emphasis>) or destination IP address (<emphasis
|
|
||||||
role="bold">dst</emphasis>) is to be removed from the event. The
|
|
||||||
default is <emphasis role="bold">src</emphasis>.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>disposition</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>If the <replaceable>action</replaceable> involves logging,
|
|
||||||
then this parameter specifies the disposition that will appear in
|
|
||||||
the log entry prefix. If no <replaceable>disposition</replaceable>
|
|
||||||
is given, the log prefix is determines normally.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
</variablelist>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>IfEvent</title>
|
|
||||||
|
|
||||||
<para><emphasis role="bold">IfEvent</emphasis>(
|
|
||||||
<replaceable>event</replaceable>, [ <replaceable>action</replaceable> ],
|
|
||||||
[ <replaceable>duration</replaceable> ], [
|
|
||||||
<replaceable>hitcount</replaceable> ], [
|
|
||||||
<replaceable>src-dst</replaceable>], [
|
|
||||||
<replaceable>command</replaceable> ], [
|
|
||||||
<replaceable>disposition</replaceable> ] )</para>
|
|
||||||
|
|
||||||
<variablelist>
|
|
||||||
<varlistentry>
|
|
||||||
<term>event</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Name of the event.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>action</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>An action to perform if the test succeeds. May be any action
|
|
||||||
that may appear in the ACTION column of <ulink
|
|
||||||
url="manpages/shorewall-rules.html">shorewall-rules</ulink> (5).
|
|
||||||
The default is ACCEPT.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>duration</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Number of seconds over which the event is to be tested. If
|
|
||||||
not specified, the test is not constrained by time.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>hitcount</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Specifies the minimum number of packets required for the
|
|
||||||
test to succeed. If not specified, 1 packet is assumed.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>src-dst</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Specifies whether the source IP address (<emphasis
|
|
||||||
role="bold">src</emphasis>) or destination IP address (<emphasis
|
|
||||||
role="bold">dst</emphasis>) is to be tested. The default is
|
|
||||||
<emphasis role="bold">src</emphasis>.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>command</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>May be one of the following:</para>
|
|
||||||
|
|
||||||
<variablelist>
|
|
||||||
<varlistentry>
|
|
||||||
<term>check</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Simply test if the
|
|
||||||
<replaceable>duration</replaceable>/<replaceable>hitcount</replaceable>
|
|
||||||
test is satisfied. If so, the
|
|
||||||
<replaceable>action</replaceable> is performed.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>reset</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Like <emphasis role="bold">check</emphasis>. If the
|
|
||||||
test succeeds, the <replaceable>event</replaceable> will be
|
|
||||||
reset before the <replaceable>action</replaceable> is
|
|
||||||
taken.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>update</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Like <emphasis role="bold">check</emphasis>.
|
|
||||||
Regardless of whether the test succeeds, an entry with the
|
|
||||||
current time and for the <replaceable>src-dst</replaceable>
|
|
||||||
iP address will be added to the
|
|
||||||
<replaceable>event</replaceable>.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>checkreap</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Requires a <replaceable>duration</replaceable>. Like
|
|
||||||
<emphasis role="bold">check</emphasis> but regardless of
|
|
||||||
whether the test succeeds, entries for the
|
|
||||||
<replaceable>src-dst</replaceable> IP address that are older
|
|
||||||
than <replaceable>duration</replaceable> seconds will be
|
|
||||||
deleted from the <replaceable>event</replaceable>.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>updatereap</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Requires a <replaceable>duration</replaceable>. Like
|
|
||||||
<emphasis role="bold">update</emphasis> but regardless of
|
|
||||||
whether the test succeeds, entries for the
|
|
||||||
<replaceable>src-dst</replaceable> IP address that are older
|
|
||||||
than <replaceable>duration</replaceable> seconds will be
|
|
||||||
deleted from the <replaceable>event</replaceable>.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
</variablelist>
|
|
||||||
|
|
||||||
<para>The default is <emphasis
|
|
||||||
role="bold">check</emphasis>.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term>disposition</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>If the <replaceable>action</replaceable> involves logging,
|
|
||||||
then this parameter specifies the disposition that will appear in
|
|
||||||
the log entry prefix. If no <replaceable>disposition</replaceable>
|
|
||||||
is given, the log prefix is determines normally.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
</variablelist>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>'show event' and 'show events' Commands</title>
|
|
||||||
|
|
||||||
<para>The CLI programs (<filename>/sbin/shorewall</filename>,
|
|
||||||
<filename>/sbin/shorewall-lite</filename>, etc.) support <command>show
|
|
||||||
event</command> and <command>show events</command> commands.</para>
|
|
||||||
|
|
||||||
<para>The <command>show event</command> command shows the contents of
|
|
||||||
the events listed in the command while <emphasis role="bold">show
|
|
||||||
events</emphasis> lists the contents of all events.</para>
|
|
||||||
|
|
||||||
<programlisting>root@gateway:/usr/src/linux-source-3.2/net/netfilter# shorewall show events
|
|
||||||
Shorewall 4.5.19-Beta2 events at gateway - Fri Jul 12 15:57:20 PDT 2013
|
|
||||||
|
|
||||||
SSH
|
|
||||||
src=125.46.13.163 : 3453
|
|
||||||
src=200.59.55.50 : 3900 3900
|
|
||||||
src=65.182.111.112 : 2946
|
|
||||||
|
|
||||||
SSH_COUNTER
|
|
||||||
|
|
||||||
sticky001
|
|
||||||
src=172.20.1.146 : 8 8 8 8 8 8 8 8 8 8 8 8 8 8 7 7 7 7 7 7
|
|
||||||
|
|
||||||
sticky002
|
|
||||||
src=172.20.1.213 : 53 49 49 49 49 49 49 49 49 49 49 49 49 49 49 49 49 49 46 46
|
|
||||||
|
|
||||||
root@gateway:/usr/src/linux-source-3.2/net/netfilter# </programlisting>
|
|
||||||
|
|
||||||
<para>The SSH and SSH_COUNTER events are created using the following
|
|
||||||
Automatic Blacklisting example. The sticky001 and sticky002 events are
|
|
||||||
created by the SAME rule action.</para>
|
|
||||||
|
|
||||||
<para>Each line represents one event. The list of numbers following the
|
|
||||||
':' represent the number of seconds ago that a matching packet triggered
|
|
||||||
the event. The numbers are in chronological sequence, so In this event,
|
|
||||||
there were 20 packets from 172.20.1.213 that arrived between 53 and 46
|
|
||||||
seconds ago:</para>
|
|
||||||
|
|
||||||
<programlisting>sticky002
|
|
||||||
src=172.20.1.213 : <emphasis role="bold">53</emphasis> 49 49 49 49 49 49 49 49 49 49 49 49 49 49 49 49 49 46 <emphasis
|
|
||||||
role="bold">46</emphasis></programlisting>
|
|
||||||
|
|
||||||
<para>Note that there may have been earlier packets that also matched,
|
|
||||||
but the system where this example was captured used the default value of
|
|
||||||
the <emphasis role="bold">ip_pkt_list_tot</emphasis> xt_recent option
|
|
||||||
(20).</para>
|
|
||||||
|
|
||||||
<para>The output of these commands is produced by processing the
|
|
||||||
contents of <filename>/proc/net/xt_recent/*</filename>. You can access
|
|
||||||
those files directly to see the raw data. Additional about these files
|
|
||||||
may be found in iptables (8).</para>
|
|
||||||
</section>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>Examples</title>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>Automatic Blacklisting</title>
|
|
||||||
|
|
||||||
<para>This example is taken from <ulink
|
|
||||||
url="http://www.briandowney.net/blog/2009/08/20/firewalling-brute-force-attempts-with-iptables/">this
|
|
||||||
article</ulink> which explains the nice benifits of this approach. This
|
|
||||||
example is for ssh, but it can be adapted for any application.</para>
|
|
||||||
|
|
||||||
<para>The name SSH has been changed to SSHLIMIT so as not to override
|
|
||||||
the Shorewall macro of the same name.</para>
|
|
||||||
|
|
||||||
<para><filename>/etc/shorewall/actions</filename>:</para>
|
|
||||||
|
|
||||||
<programlisting>#ACTION OPTION DESCRIPTION
|
|
||||||
SSHLIMIT #Automatically blacklist hosts who exceed SSH connection limits
|
|
||||||
</programlisting>
|
|
||||||
|
|
||||||
<para><filename>/etc/shorewall/action.SSH_BLACKLIST</filename>:</para>
|
|
||||||
|
|
||||||
<programlisting>#
|
|
||||||
# Shorewall version 4 - SSH_BLACKLIST Action
|
|
||||||
#
|
|
||||||
?format 2
|
|
||||||
###############################################################################
|
|
||||||
#TARGET SOURCE DEST PROTO DPORT SPORT
|
|
||||||
#
|
|
||||||
# Log the Reject
|
|
||||||
#
|
|
||||||
LOG:warn:REJECT
|
|
||||||
#
|
|
||||||
# And set the SSH_COUNTER event for the SOURCE IP address
|
|
||||||
#
|
|
||||||
SetEvent(SSH_COUNTER,REJECT,src)</programlisting>
|
|
||||||
|
|
||||||
<para><filename>/etc/shorewall/action.SSH</filename>LIMIT:</para>
|
|
||||||
|
|
||||||
<programlisting>#
|
|
||||||
# Shorewall version 4 - SSHLIMIT Action
|
|
||||||
#
|
|
||||||
?format 2
|
|
||||||
###############################################################################
|
|
||||||
#TARGET SOURCE DEST PROTO DPORT SPORT
|
|
||||||
#
|
|
||||||
# Silently reject the client if blacklisted
|
|
||||||
#
|
|
||||||
IfEvent(SSH_COUNTER,REJECT,300,1)
|
|
||||||
#
|
|
||||||
# Blacklist if 5 attempts in the last minute
|
|
||||||
#
|
|
||||||
IfEvent(SSH,SSH_BLACKLIST,60,5,src,checkreap)
|
|
||||||
#
|
|
||||||
# Log and reject if the client has tried to connect
|
|
||||||
# in the last two seconds
|
|
||||||
#
|
|
||||||
IfEvent(SSH,REJECT:warn:,2,1,-,update,Added)
|
|
||||||
#
|
|
||||||
# Un-blacklist the client
|
|
||||||
#
|
|
||||||
ResetEvent(SSH_COUNTER,LOG:warn,-,Removed)
|
|
||||||
#
|
|
||||||
# Set the 'SSH' EVENT and accept the connection
|
|
||||||
#
|
|
||||||
SetEvent(SSH,ACCEPT,src)</programlisting>
|
|
||||||
|
|
||||||
<para><filename>etc/shorewall/rules</filename>:</para>
|
|
||||||
|
|
||||||
<programlisting>#ACTION SOURCE DEST PROTO DEST
|
|
||||||
# PORT(S)
|
|
||||||
SSHLIMIT net $FW tcp 22 </programlisting>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>Port Knocking</title>
|
|
||||||
|
|
||||||
<para>This example shows a different implementation of the one shown in
|
|
||||||
the <ulink url="PortKnocking.html">Port Knocking</ulink> article.</para>
|
|
||||||
|
|
||||||
<para>In this example:</para>
|
|
||||||
|
|
||||||
<orderedlist>
|
|
||||||
<listitem>
|
|
||||||
<para>Attempting to connect to port 1600 enables SSH access. Access
|
|
||||||
is enabled for 60 seconds.</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>Attempting to connect to port 1601 disables SSH access (note
|
|
||||||
that in the article linked above, attempting to connect to port 1599
|
|
||||||
also disables access. This is an port scan defence as explained in
|
|
||||||
the article).</para>
|
|
||||||
</listitem>
|
|
||||||
</orderedlist>
|
|
||||||
|
|
||||||
<para>To implement that approach:</para>
|
|
||||||
|
|
||||||
<para><filename>/etc/shorewall/actions</filename>:</para>
|
|
||||||
|
|
||||||
<programlisting>#ACTION OPTION DESCRIPTION
|
|
||||||
Knock #Port Knocking</programlisting>
|
|
||||||
|
|
||||||
<para><filename>/etc/shorewall/action.Knock</filename>:</para>
|
|
||||||
|
|
||||||
<programlisting>#
|
|
||||||
# Shorewall version 4 - SSH_BLACKLIST Action
|
|
||||||
#
|
|
||||||
?format 2
|
|
||||||
###############################################################################
|
|
||||||
#ACTION SOURCE DEST PROTO DEST
|
|
||||||
# PORT(S)
|
|
||||||
IfEvent(SSH,ACCEPT:info,60,1,src,reset)\
|
|
||||||
- - tcp 22
|
|
||||||
SetEvent(SSH,ACCEPT) - - tcp 1600
|
|
||||||
ResetEvent(SSH,DROP:info) </programlisting>
|
|
||||||
|
|
||||||
<para><filename>etc/shorewall/rules</filename>:</para>
|
|
||||||
|
|
||||||
<programlisting>#ACTION SOURCE DEST PROTO DEST
|
|
||||||
# PORT(S)
|
|
||||||
Knock net $FW tcp 22,1599-1601 </programlisting>
|
|
||||||
</section>
|
|
||||||
</section>
|
|
||||||
</article>
|
|
Loading…
Reference in New Issue
Block a user