1
0

101 lines
3.3 KiB
Rust
Raw Normal View History

pub mod cli;
pub mod iptables_save;
pub mod iptables_wrapper;
2024-05-12 13:46:11 +02:00
pub mod login_attempt;
use cli::Arguments;
use iptables_wrapper::{allow_ip_port, ban_port, remove_ip_port, unban_port};
2024-05-12 13:46:11 +02:00
use linemux::MuxedLines;
use login_attempt::LoginAttempt;
use std::path::PathBuf;
2024-05-20 23:36:34 +02:00
use std::thread;
2024-05-12 14:54:47 +02:00
use std::{collections::HashMap, thread::sleep, time::Duration};
use structopt::StructOpt;
2024-05-12 13:46:11 +02:00
#[tokio::main]
async fn main() {
let opts = Arguments::from_args();
match opts {
Arguments::BanServer {
ssh_auth_log,
iptables_save,
} => {
let _ = start_ban_server(ssh_auth_log, iptables_save).await;
}
Arguments::BanPort {
port,
docker,
position,
} => ban_port(port, docker, position),
2024-05-28 17:31:14 +02:00
Arguments::UnbanPort { port, docker } => unban_port(port, docker),
Arguments::AllowIpPort {
ip,
port,
docker,
position,
} => allow_ip_port(&ip, port, docker, position),
Arguments::OnlyIpPort { ip, port, docker } => {
allow_ip_port(&ip, port, docker, Some(1));
ban_port(port, docker, Some(2));
}
2024-05-28 17:31:14 +02:00
Arguments::RemoveIpPort { ip, port, docker } => remove_ip_port(&ip, port, docker),
}
}
async fn start_ban_server(
ssh_auth_log: PathBuf,
iptables_save: Option<PathBuf>,
) -> std::io::Result<()> {
2024-05-12 13:46:11 +02:00
let iptables = iptables::new(false).unwrap();
let mut lines = MuxedLines::new()?;
lines.add_file(&ssh_auth_log).await?;
2024-05-12 13:46:11 +02:00
let mut login_attempts: HashMap<String, usize> = HashMap::new();
if let Some(iptables_save) = iptables_save {
let seconds_iptables = Duration::from_secs(60);
println!(
2024-05-29 12:27:18 +02:00
"starting iptables-save, save every {} seconds",
seconds_iptables.as_secs()
);
thread::spawn(move || loop {
sleep(seconds_iptables);
iptables_save::save_iptables(&iptables_save);
});
}
2024-05-12 14:54:47 +02:00
println!("listening to changes over {}", ssh_auth_log.display());
2024-05-12 13:46:11 +02:00
while let Ok(Some(line)) = lines.next_line().await {
if let Some(login_attempt) = LoginAttempt::capture(line.line()) {
println!(
"failed login attempt from {}@{}:{}",
login_attempt.user, login_attempt.ip, login_attempt.port
);
2024-05-12 13:46:11 +02:00
match login_attempts.get_mut(&login_attempt.ip) {
Some(count) => {
*count += 1;
if *count == 3 {
match iptables.append_unique(
"filter",
"INPUT",
&format!("--source {} -j DROP", login_attempt.ip),
) {
Ok(_) => {
println!("{} banned", login_attempt.ip);
}
Err(_) => {
println!("{} already banned", login_attempt.ip);
}
}
2024-05-12 13:46:11 +02:00
login_attempts.remove(&login_attempt.ip);
}
}
None => {
login_attempts.insert(login_attempt.ip.clone(), 1);
}
}
}
}
Ok(())
}