Merge pull request #311 from mkuron/fail2ban
Fail2ban-like authentication rate limiting for Postfix, Dovecot and SOGomaster
commit
8c73b8eb5f
|
@ -0,0 +1,8 @@
|
|||
FROM python:2-alpine
|
||||
LABEL maintainer "Andre Peters <andre.peters@servercow.de>"
|
||||
|
||||
RUN apk add -U --no-cache iptables ip6tables
|
||||
RUN pip install docker
|
||||
|
||||
COPY logwatch.py /
|
||||
CMD ["python2", "-u", "/logwatch.py"]
|
|
@ -0,0 +1,103 @@
|
|||
#!/usr/bin/env python2
|
||||
|
||||
import re
|
||||
import time
|
||||
import atexit
|
||||
import signal
|
||||
import ipaddress
|
||||
import subprocess
|
||||
from threading import Thread
|
||||
import docker
|
||||
|
||||
RULES = {
|
||||
'mailcowdockerized_postfix-mailcow_1': 'warning: .*\[([0-9a-f\.:]+)\]: SASL .* authentication failed',
|
||||
'mailcowdockerized_dovecot-mailcow_1': '-login: Disconnected \(auth failed, .*\): user=.*, method=.*, rip=([0-9a-f\.:]+),',
|
||||
'mailcowdockerized_sogo-mailcow_1': 'SOGo.* Login from \'([0-9a-f\.:]+)\' for user .* might not have worked',
|
||||
}
|
||||
BAN_TIME = 1800
|
||||
MAX_ATTEMPTS = 10
|
||||
|
||||
bans = {}
|
||||
quit_now = False
|
||||
|
||||
def ban(address):
|
||||
ip = ipaddress.ip_address(address.decode('ascii'))
|
||||
if ip.is_private or ip.is_loopback:
|
||||
return
|
||||
|
||||
net = ipaddress.ip_network((address + ('/24' if type(ip) is ipaddress.IPv4Address else '/64')).decode('ascii'), strict=False)
|
||||
net = str(net)
|
||||
|
||||
if not net in bans or time.time() - bans[net]['last_attempt'] > BAN_TIME:
|
||||
bans[net] = { 'attempts': 0 }
|
||||
|
||||
bans[net]['attempts'] += 1
|
||||
bans[net]['last_attempt'] = time.time()
|
||||
|
||||
if bans[net]['attempts'] >= MAX_ATTEMPTS:
|
||||
print "Banning %s" % net
|
||||
if type(ip) is ipaddress.IPv4Address:
|
||||
subprocess.call(["iptables", "-I", "INPUT", "-s", net, "-j", "REJECT"])
|
||||
subprocess.call(["iptables", "-I", "FORWARD", "-s", net, "-j", "REJECT"])
|
||||
else:
|
||||
subprocess.call(["ip6tables", "-I", "INPUT", "-s", net, "-j", "REJECT"])
|
||||
subprocess.call(["ip6tables", "-I", "FORWARD", "-s", net, "-j", "REJECT"])
|
||||
else:
|
||||
print "%d more attempts until %s is banned" % (MAX_ATTEMPTS - bans[net]['attempts'], net)
|
||||
|
||||
def unban(net):
|
||||
print "Unbanning %s" % net
|
||||
if type(ipaddress.ip_network(net.decode('ascii'))) is ipaddress.IPv4Network:
|
||||
subprocess.call(["iptables", "-D", "INPUT", "-s", net, "-j", "REJECT"])
|
||||
subprocess.call(["iptables", "-D", "FORWARD", "-s", net, "-j", "REJECT"])
|
||||
else:
|
||||
subprocess.call(["ip6tables", "-D", "INPUT", "-s", net, "-j", "REJECT"])
|
||||
subprocess.call(["ip6tables", "-D", "FORWARD", "-s", net, "-j", "REJECT"])
|
||||
del bans[net]
|
||||
|
||||
def quit(signum, frame):
|
||||
global quit_now
|
||||
quit_now = True
|
||||
|
||||
def clear():
|
||||
print "Clearing all bans"
|
||||
for net in bans.copy():
|
||||
unban(net)
|
||||
|
||||
def watch(container):
|
||||
print "Watching", container
|
||||
client = docker.from_env()
|
||||
for msg in client.containers.get(container).attach(stream=True, logs=False):
|
||||
result = re.search(RULES[container], msg)
|
||||
if result:
|
||||
addr = result.group(1)
|
||||
ban(addr)
|
||||
|
||||
def autopurge():
|
||||
while not quit_now:
|
||||
for net in bans.copy():
|
||||
if time.time() - bans[net]['last_attempt'] > BAN_TIME:
|
||||
unban(net)
|
||||
time.sleep(60)
|
||||
|
||||
if __name__ == '__main__':
|
||||
threads = []
|
||||
for container in RULES:
|
||||
threads.append(Thread(target=watch, args=(container,)))
|
||||
threads[-1].daemon = True
|
||||
threads[-1].start()
|
||||
|
||||
autopurge_thread = Thread(target=autopurge)
|
||||
autopurge_thread.daemon = True
|
||||
autopurge_thread.start()
|
||||
|
||||
signal.signal(signal.SIGTERM, quit)
|
||||
atexit.register(clear)
|
||||
|
||||
while not quit_now:
|
||||
for thread in threads:
|
||||
if not thread.isAlive():
|
||||
break
|
||||
time.sleep(0.1)
|
||||
|
||||
clear()
|
|
@ -266,6 +266,20 @@ services:
|
|||
aliases:
|
||||
- nginx
|
||||
|
||||
fail2ban-mailcow:
|
||||
image: mailcow/fail2ban
|
||||
build: ./data/Dockerfiles/fail2ban
|
||||
depends_on:
|
||||
- dovecot-mailcow
|
||||
- postfix-mailcow
|
||||
- sogo-mailcow
|
||||
restart: always
|
||||
privileged: true
|
||||
network_mode: "host"
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
- /lib/modules:/lib/modules:ro
|
||||
|
||||
ipv6nat:
|
||||
image: robbertkl/ipv6nat
|
||||
restart: always
|
||||
|
|
Loading…
Reference in New Issue