Subversion Repositories configs

Rev

Rev 34 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
34 - 1
# Fail2Ban action for sending xarf Login-Attack messages to IP owner
2
#
39 - 3
# IMPORTANT:
4
#
34 - 5
# Emailing a IP owner of abuse is a serious complain. Make sure that it is
6
# serious. Fail2ban developers and network owners recommend you only use this
7
# action for:
8
#   * The recidive where the IP has been banned multiple times
9
#   * Where maxretry has been set quite high, beyond the normal user typing
10
#     password incorrectly.
11
#   * For filters that have a low likelihood of receiving human errors
12
#
13
# DEPENDENCIES:
14
#
15
# This requires the dig command from bind-utils
16
#
17
# This uses the https://abusix.com/contactdb.html to lookup abuse contacts.
18
#
19
# XARF is a specification for sending a formatted response
20
# for non-messaging based abuse including:
21
#
22
# Login-Attack, Malware-Attack, Fraud (Phishing, etc.), Info DNSBL
23
#
24
# For details see:
25
# https://github.com/abusix/xarf-specification
26
# http://www.x-arf.org/schemata.html
27
#
28
# Author: Daniel Black
29
# Based on complain written by Russell Odom <russ@gloomytrousers.co.uk>
30
#
31
#
32
 
33
[Definition]
34
 
35
actionstart =
36
 
37
actionstop =
38
 
39
actioncheck =
40
 
41
actionban = oifs=${IFS}; IFS=.;SEP_IP=( <ip> ); set -- ${SEP_IP}; ADDRESSES=$(dig +short -t txt -q $4.$3.$2.$1.abuse-contacts.abusix.org); IFS=${oifs}
42
            IP=<ip>
43
            FROM=<sender>
44
            SERVICE=<service>
45
            FAILURES=<failures>
46
            REPORTID=<time>@`uname -n`
47
            TLP=<tlp>
48
            PORT=<port>
39 - 49
            DATE=`LC_ALL=C date --date=@<time> +"%%a, %%d %%h %%Y %%T %%z"`
34 - 50
            if [ ! -z "$ADDRESSES" ]; then
51
                (printf -- %%b "<header>\n<message>\n<report>\n";
52
                 date '+Note: Local timezone is %%z (%%Z)';
53
                 printf -- %%b "<ipmatches>\n\n<footer>") | <mailcmd> <mailargs> ${ADDRESSES//,/\" \"}
54
            fi
55
 
56
actionunban =
57
 
58
[Init]
59
# Option: header
60
# Notes:  This is really a fixed value
61
header  = Subject: abuse report about $IP - $DATE\nAuto-Submitted: auto-generated\nX-XARF: PLAIN\nContent-Transfer-Encoding: 7bit\nContent-Type: multipart/mixed; charset=utf8;\n  boundary=Abuse-bfbb0f920793ac03cb8634bde14d8a1e;\n\n--Abuse-bfbb0f920793ac03cb8634bde14d8a1e\nMIME-Version: 1.0\nContent-Transfer-Encoding: 7bit\nContent-Type: text/plain; charset=utf-8;\n
62
 
63
# Option: footer
64
# Notes:  This is really a fixed value and needs to match the report and header
65
#         mime delimiters
66
footer = \n\n--Abuse-bfbb0f920793ac03cb8634bde14d8a1e--
67
 
68
# Option: report
69
# Notes:  Intended to be fixed
70
report =  --Abuse-bfbb0f920793ac03cb8634bde14d8a1e\nMIME-Version: 1.0\nContent-Transfer-Encoding: 7bit\nContent-Type: text/plain; charset=utf-8; name=\"report.txt\";\n\n---\nReported-From: $FROM\nCategory: abuse\nReport-ID: $REPORTID\nReport-Type: login-attack\nService: $SERVICE\nVersion: 0.2\nUser-Agent: Fail2ban v0.9\nDate: $DATE\nSource-Type: ip-address\nSource: $IP\nPort: $PORT\nSchema-URL: http://www.x-arf.org/schema/abuse_login-attack_0.1.2.json\nAttachment: text/plain\nOccurances: $FAILURES\nTLP: $TLP\n\n\n--Abuse-bfbb0f920793ac03cb8634bde14d8a1e\nMIME-Version: 1.0\nContent-Transfer-Encoding: 7bit\nContent-Type: text/plain; charset=utf8; name=\"logfile.log\";
71
 
72
# Option: Message
39 - 73
# Notes:  This can be modified by the users
34 - 74
message = Dear Sir/Madam,\n\nWe have detected abuse from the IP address $IP, which according to abusix.com is on your network. We would appreciate if you would investigate and take action as appropriate.\n\nLog lines are given below, but please ask if you require any further information.\n\n(If you are not the correct person to contact about this please accept our apologies - your e-mail address was extracted from the whois record by an automated process.)\n\n This mail was generated by Fail2Ban in a X-ARF format! You can find more information about x-arf at http://www.x-arf.org/specification.html.\n\nThe recipient address of this report was provided by the Abuse Contact DB by abusix.com. abusix.com does not maintain the content of the database. All information which we pass out, derives from the RIR databases and is processed for ease of use. If you want to change or report non working abuse contacts please contact the appropriate RIR. If you have any further question, contact abusix.com directly via email (info@abusix.com). Information about the Abuse Contact Database can be found here: https://abusix.com/global-reporting/abuse-contact-db\nabusix.com is neither responsible nor liable for the content or accuracy of this message.\n
75
 
76
# Option:  loglines
77
# Notes.:  The number of log lines to search for the IP for the report
78
loglines = 9000
79
 
80
# Option:  mailcmd
81
# Notes.:  Your system mail command. It is passed the recipient
82
# Values:  CMD
83
#
84
mailcmd =  /usr/sbin/sendmail
85
 
86
# Option:  mailargs
87
# Notes.:  Additional arguments to mail command. e.g. for standard Unix mail:
88
#          CC reports to another address:
89
#              -c me@example.com
90
#          Appear to come from a different address - the '--' indicates
91
#          arguments to be passed to Sendmail:
92
#              -- -f me@example.com
93
# Values:  [ STRING ]
94
#
95
mailargs = -f <sender>
96
 
97
# Option:  tlp
98
# Notes.:  Traffic light protocol defining the sharing of this information.
99
#          http://www.trusted-introducer.org/ISTLPv11.pdf
39 - 100
#          green is share to those involved in network security but it is not
34 - 101
#          to be released to the public.
102
tlp = green
103
 
104
# ALL of the following parameters should be set so the report contains
105
# meaningful information
106
 
107
# Option: service
108
# Notes.: This is the service type that was attacked. e.g. ssh, pop3
109
service = unspecified
110
 
111
# Option:  logpath
112
# Notes:   Path to the log files which contain relevant lines for the abuser IP
113
# Values:  Filename(s) space separated and can contain wildcards (these are
114
#          greped for the IP so make sure these aren't too long
115
logpath = /dev/null
116
 
117
# Option:  sender
118
# Notes.:  This is the sender that is included in the XARF report
119
sender = fail2ban@`uname -n`
120
 
121
# Option:  port
122
# Notes.:  This is the port number that received the login-attack
123
port = 0
124