Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Sat May 09, 2009 5:41 pm 
Offline
Senior Newbie

Joined: Thu Oct 23, 2008 4:13 pm
Posts: 13
AOL: eyeni4net
I'm spending the weekend creating a replacement for fail2ban. I need mod_security and ssh logs from other people / platforms to make sure our regex's will work for everyone.

Should have an alpha preview on monday. Here's a quick overview

name: funyun
tag: hate security, love funyun

features:
    Expiring iptables bans
    Combines multiple logs from multiple servers to a central database - sync mode
    creates ip bans using combined data - sync mode
    supports snort, ssh, and mod_security logs, other formats can be added
[lists]provides a restful api that can be tied into the sync database[/list]

Why I'm making funyun:

We have 2 clusters all with separate log files. Some are from snort, others from mod_security, and all have sshd logs. We needed a simple way to combine all this log data so we can ban offenders at the gateway, enter funyun.

You can either post your logs here, or email me at: greg [at] halfgray [dot] com

Greg


Top
   
 Post subject:
PostPosted: Sat May 09, 2009 5:54 pm 
Offline
Senior Member

Joined: Mon Apr 27, 2009 7:36 pm
Posts: 59
Website: http://www.xenscale.com
Location: Boise, ID
why reinvent the wheel? fail2ban works great.


Top
   
 Post subject:
PostPosted: Sat May 09, 2009 9:07 pm 
Offline
Senior Member
User avatar

Joined: Sun Jan 18, 2009 2:41 pm
Posts: 830
Sounds like your real need might be to consolidate the logs from various machines onto the one serving as the gateway. Something like syslog-ng can be set up to do this.


Top
   
 Post subject:
PostPosted: Sat May 09, 2009 10:17 pm 
Offline
Senior Member

Joined: Tue Apr 29, 2008 6:26 pm
Posts: 58
Website: http://blog.shadypixel.com/
What language are you using? The main problem I have with fail2ban is that it's sort of a pig on a vps. I'd definitely switch to a lightweight daemon written in C.


Top
   
 Post subject:
PostPosted: Sat May 09, 2009 10:25 pm 
Offline
Senior Member

Joined: Mon Feb 28, 2005 7:21 pm
Posts: 76
I like your feature list, but it seems like a "Not Invented Here" kind of thing.

Start with OSSEC and you'll be pretty much done.

ConfigServer firewall also does this stuff, except for central logging.

OSSEC is open source, so if there isn't an API you like, you could focus your efforts on that and contribute something to that larger community.


Top
   
 Post subject:
PostPosted: Sun May 10, 2009 1:32 am 
Offline
Senior Newbie

Joined: Thu Oct 23, 2008 4:13 pm
Posts: 13
AOL: eyeni4net
I looked at the current options:

Fail2ban doesn't allow us to use All log data, both local and remote, for our ban lists on the gateway servers. Also it makes no sense to run fail2ban on the cluster machines because the user will not always hit the same machine.

I know its may sound similar to ossec, but I need something simple and light weight with minimal conf. Also it just has to work without having to learn another framework. lastly ossec is an ids, funyun just uses log data to block users. Ossec has been around for awhile, but again funyun is about our needs and hopefully it will help others.

I won't mention denyhosts as I think its already covered enough.

Were not reinventing the wheel so much as making something to meet our needs that may also help the community. There are other features we have slated that help combat spam, but in the end our main goal is use all log data from all clusters to secure the network.

Greg


Top
   
 Post subject: update
PostPosted: Wed May 13, 2009 4:22 pm 
Offline
Senior Newbie

Joined: Thu Oct 23, 2008 4:13 pm
Posts: 13
AOL: eyeni4net
Heres whats done:
  • daemon
  • uses multiple logs from multiple servers
  • snort,mode_security, and sshd support
  • distributed log management (prunes logs after saving to sync server)
  • reactive bans (the more you attack the longer the ban, config controlled)
  • auto whitelisting (all ips on your server are whitelisted)
  • ban expirations (like fail2ban)
  • per key whitelisting (if a part of your network is blocked, it will only be blocked for others, not you)
  • currently only supports iptables
  • low memory footprint (my main focus is keeping this extremely light weight)
  • catches more sshd threats than fail2ban did

Here's whats pending:
  • additional threat discovery sources using passive services (honeypot, stop forum spam, emerging threats)
  • whois lookup and provider notifacation
  • public sync server so the SU's can test it out.
  • some formula / method to allow public attack data submission.
  • benchmarks
  • documentation


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 2 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group