failUser.py 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143
  1. #!/usr/bin/env python3
  2. from json import loads, dumps
  3. from json.decoder import JSONDecodeError
  4. import pendulum
  5. from subprocess import run, PIPE, CalledProcessError
  6. from os.path import exists, join
  7. from pyinotify import WatchManager, Notifier, ProcessEvent
  8. from pyinotify import IN_MODIFY, IN_DELETE, IN_MOVE_SELF, IN_CREATE
  9. import sys
  10. # https://github.com/manos/python-inotify-tail_example/blob/master/tail-F_inotify.py
  11. # Branch off the logging into a seperate file
  12. from config import log, load_config, save_config, add_block, rm_block, check_blocks
  13. myConfig = load_config()
  14. myfile = myConfig["target"]
  15. last_run = myConfig["last_unblock"]
  16. bad_users = myConfig["bad_users"]
  17. target = open(myfile, 'r')
  18. target.seek(0,2)
  19. WM = WatchManager()
  20. dirmask = IN_MODIFY | IN_DELETE | IN_MOVE_SELF | IN_CREATE
  21. def blocker(ip):
  22. # Utility function to block given ip as string
  23. run(["iptables", "-I", "DOCKER-USER", "-i", "eth0", "-s", ip, "-j", "DROP"], stdout=PIPE, check=True)
  24. #print("iptables -I DOCKER-USER -i eth0 -s {0} -j DROP".format(ip))
  25. def unblocker(ip):
  26. # Utility function to unblock given ip as string
  27. try:
  28. run(["iptables", "-D", "DOCKER-USER", "-i", "eth0", "-s", ip, "-j", "DROP"], stdout=PIPE, check=True)
  29. except CalledProcessError:
  30. pass
  31. #print("iptables -D DOCKER-USER -i eth0 -s {0} -j DROP".format(ip))
  32. # def is_bad(line):
  33. # # Given line, attempt to parse... then is there a issue with it
  34. # # Returns a python dict with ip and time in log
  35. # if line: # Do we actually have something?
  36. # try:
  37. # j = loads(line)
  38. # #if j["msg"] == "Attempt to login with banned username":
  39. # if j["username"] in bad_users:
  40. # r = {}
  41. # r["ip"] = "{0}".format(j["ip"][7:])
  42. # r["time"] = j["time"]
  43. # return r
  44. # except JSONDecodeError:
  45. # log.error("Failed to decode line, '{0}'".format(line))
  46. struct = {}
  47. state = 0
  48. def is_bad(line):
  49. global state, struct
  50. if state == 0 and line.startswith("SUSPECTED"):
  51. _, user, at = line.split("'")
  52. at = at.replace(" on ", "")
  53. struct = {"user": user.lower(), "time": at}
  54. state = 1
  55. print(struct)
  56. elif state == 1 and line.startswith("Using port"):
  57. _, ip = line.split("[")
  58. ip = ip.replace("]", "")
  59. struct["ip"] = ip
  60. state = 0
  61. print(struct)
  62. return struct
  63. def checkup():
  64. # Check all our blocks
  65. unblocks = check_blocks()
  66. if unblocks:
  67. for ip in unblocks:
  68. log.info("Unblocked {0}".format(ip))
  69. unblocker(ip)
  70. rm_block(ip)
  71. class EventHandler(ProcessEvent):
  72. def process_IN_MODIFY(self, event):
  73. if myfile not in join(event.path, event.name):
  74. return
  75. else:
  76. #luser = is_bad(target.readline().rstrip())
  77. for line in target.readlines():
  78. luser = is_bad(line.rstrip())
  79. if(luser):
  80. blocker(luser["ip"])
  81. now = pendulum.now().to_atom_string()
  82. log.info("Blocked {0} at {1}".format(luser["ip"], now))
  83. add_block(luser["ip"], now)
  84. def process_IN_MOVE_SELF(self, event):
  85. log.debug("Log file moved... continuing read on stale log!")
  86. def process_IN_CREATE(self, event):
  87. global target
  88. if myfile in join(event.path, event.name):
  89. target.close()
  90. target = open(myfile, 'r')
  91. log.debug("Log file created... Catching up!")
  92. for line in target.readlines():
  93. luser = is_bad(line.rstrip())
  94. if(luser):
  95. blocker(luser["ip"])
  96. now = pendulum.now().to_atom_string()
  97. log.info("Blocked {0} at {1}".format(luser["ip"], now))
  98. add_block(luser["ip"], now)
  99. target.seek(0,2)
  100. return
  101. notifier = Notifier(WM, EventHandler())
  102. index = myfile.rfind("/")
  103. WM.add_watch(myfile[:index], dirmask)
  104. last = pendulum.parse(last_run)
  105. while True:
  106. try:
  107. now = pendulum.now()
  108. if now.diff(last).in_hours() > 1:
  109. last = now
  110. checkup()
  111. notifier.process_events()
  112. if notifier.check_events():
  113. notifier.read_events()
  114. except KeyboardInterrupt:
  115. break
  116. # Issue stop on event system
  117. notifier.stop()
  118. target.close()
  119. # Update config
  120. myConfig["last_unblock"] = last.to_atom_string()
  121. myConfig["bad_users"] = bad_users
  122. save_config(myConfig)
  123. exit(0)