linux - Fail2ban named-refused failregex 语法

标签 linux iptables named fail2ban

运行 fail2ban-regex 时

fail2ban-regex /var/log/named/security1.log /etc/fail2ban/filter.d/named-refused.conf

我得到以下输出

Running tests
=============

Use regex file : /etc/fail2ban/filter.d/named-refused.conf
Use log file   : /var/log/named/security1.log

Matched time template Day-MONTH-Year Hour:Minute:Second[.Millisecond]
Matched time template Day-MONTH-Year Hour:Minute:Second[.Millisecond]
Matched time template Day-MONTH-Year Hour:Minute:Second[.Millisecond]
Matched time template Day-MONTH-Year Hour:Minute:Second[.Millisecond]
Matched time template Day-MONTH-Year Hour:Minute:Second[.Millisecond]


Results
=======

Failregex: 0 total

Ignoreregex: 0 total

Summary
=======

Sorry, no match

这是 security1.log 文件的一些输出

08-Feb-2016 11:38:15.324 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.325 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.326 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.326 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.326 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied
08-Feb-2016 11:38:15.326 client 192.168.0.1#4444 (cpsc.gov): query (cache) 'cpsc.gov/ANY/IN' denied

失败正则表达式如下

failregex = %(__line_prefix)sclient <HOST>#\S+: (view (internal|external): )?query(?: \(cache\))? '.*' denied\s*$

我认为我的 security1.log 的输出与 named-refused.conf 文件的 failregex 语法之间存在差异,这使得它找不到任何内容。

提前致谢

家伙

最佳答案

我按照您描述的方式在我的 Debian 8.2 fail2ban 中运行了您的日志。

Results
=======

Failregex: 14 total
|-  #) [# of hits] regular expression
|   1) [14] ^(?:\s\S+ (?:(?:\[\d+\])?:\s+\(?named(?:\(\S+\))?\)?:?|\(?named(?:\(\S+\))?\)?:?(?:\[\d+\])?:)\s+)?(\.\d+)?( error:)?\s*client <HOST>#\S+( \([\S.]+\))?: (view (internal|external): )?query(?: \(cache\))? '.*' denied\s*$
`-

Ignoreregex: 0 total

Date template hits:
|- [# of hits] date format
|  [14] Day-MONTH-Year Hour:Minute:Second[.Millisecond]
`-

Lines: 14 lines, 0 ignored, 14 matched, 0 missed

因此,如果您感兴趣,我的发行版中的/etc/fail2ban/filter.d/named-refused.conf 文件是:

[Definition]                                                                                                                                                                    

# Daemon name                                                                                                                                                                   
_daemon=named                                                                                                                                                                   

# Shortcuts for easier comprehension of the failregex                                                                                                                           

__pid_re=(?:\[\d+\])                                                                                                                                                            
__daemon_re=\(?%(_daemon)s(?:\(\S+\))?\)?:?                                                                                                                                     
__daemon_combs_re=(?:%(__pid_re)s?:\s+%(__daemon_re)s|%(__daemon_re)s%(__pid_re)s?:)                                                                                            

#       hostname       daemon_id         spaces                                                                                                                                 
# this can be optional (for instance if we match named native log files)                                                                                                        
__line_prefix=(?:\s\S+ %(__daemon_combs_re)s\s+)?                                                                                                                               

failregex = ^%(__line_prefix)s(\.\d+)?( error:)?\s*client <HOST>#\S+( \([\S.]+\))?: (view (internal|external): )?query(?: \(cache\))? '.*' denied\s*$                           
            ^%(__line_prefix)s(\.\d+)?( error:)?\s*client <HOST>#\S+( \([\S.]+\))?: zone transfer '\S+/AXFR/\w+' denied\s*$                                                     
            ^%(__line_prefix)s(\.\d+)?( error:)?\s*client <HOST>#\S+( \([\S.]+\))?: bad zone transfer request: '\S+/IN': non-authoritative zone \(NOTAUTH\)\s*$                 

# DEV Notes:                                                                                                                                                                    
# Trying to generalize the                                                                                                                                                      
#          structure which is general to capture general patterns in log                                                                                                        
#          lines to cover different configurations/distributions                                                                                                                
#..........                                                                                                                                                                     
# (\.\d+)? is a really ugly catch of the microseconds not captured in the date detector                                                                                         
  #                                                                                                                                                                               
# Author: Yaroslav Halchenko 

请注意作者关于“在日期检测器中未捕捉到微秒的非常丑陋的捕捉”的评论 您可以尝试一下(当然是在针对您自己的版本进行健全性检查之后),看看它是否有效。顺便问一下,你的发行版是什么?

关于linux - Fail2ban named-refused failregex 语法,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/35270383/

相关文章:

linux - 如果不做某事,则使用 IF 查看目录是否存在

c++ - C++ 代码的段错误(核心转储)

c - 外部驱动器上写入的文件丢失

security - 如何使用 iptable 阻止来自外部网络的网络流量?

linux - 双连接以太网+ppp

r - 在应用结果上设置名称

python - celery 错误 : result. 获取超时

c++ - 在 https 协议(protocol)的情况下,是否可以使用 libpcap 查看 header /数据包中的内容

assert - Microsoft Z3 命名断言