ossec-blacklist/blacklist.sh

98 lines
3.5 KiB
Bash
Raw Normal View History

2014-10-01 11:46:26 +00:00
#!/bin/sh
# IP blacklisting script for Linux servers
# Pawel Krawczyk https://keybase.io/kravietz
#
# This script should be installed as /etc/cron.daily/blacklist
# Emerging Threats lists offensive IPs such as botnet command servers
urls="http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt"
# Blocklist.de collects reports from fail2ban probes, listing password brute-forces, scanners and other offenders
urls="$urls https://www.blocklist.de/downloads/export-ips_all.txt"
blocklist_chain_name=blocklists
2014-10-02 10:11:35 +00:00
if [ -z "$(which ipset)" ]; then
2014-10-01 11:46:26 +00:00
echo "Cannot find ipset"
echo "Run \"apt-get install ipset\" or \"yum install ipset\""
exit 1
fi
2014-10-02 10:11:35 +00:00
if [ -z "$(which curl)" ]; then
2014-10-02 10:09:25 +00:00
echo "Cannot find curl"
echo "Run \"apt-get install curl\" or \"yum install curl\""
exit 1
fi
2014-10-01 11:46:26 +00:00
# create main blocklists chain
if ! iptables -L | grep -q "Chain ${blocklist_chain_name}"; then
iptables -N ${blocklist_chain_name}
fi
2014-10-01 11:46:26 +00:00
# inject references to blocklist in the beginning of input and forward chains
2014-12-23 12:20:16 +00:00
if ! iptables -L INPUT | grep -q ${blocklist_chain_name}; then
iptables -I INPUT 1 -j ${blocklist_chain_name}
2014-10-01 11:46:26 +00:00
fi
2014-12-23 12:20:16 +00:00
if ! iptables -L FORWARD | grep -q ${blocklist_chain_name}; then
iptables -I FORWARD 1 -j ${blocklist_chain_name}
2014-10-01 11:46:26 +00:00
fi
2014-12-23 12:20:16 +00:00
# flush the chain referencing blacklists, they will be restored in a second
2014-10-01 11:46:26 +00:00
iptables -F ${blocklist_chain_name}
2014-12-23 12:20:16 +00:00
# create the "manual" blacklist set
set_name="manual-blacklist"
if ! ipset list | grep -q "Name: ${set_name}"; then
ipset create "${set_name}" hash:net
fi
iptables -A ${blocklist_chain_name} -m set --match-set "${set_name}" src,dst -m limit --limit 10/minute -j LOG --log-prefix "BLOCK ${set_name} "
iptables -A ${blocklist_chain_name} -m set --match-set "${set_name}" src,dst -j DROP
2014-10-01 11:46:26 +00:00
2014-12-23 12:20:16 +00:00
# now process the dynamic blacklists
2014-10-01 11:46:26 +00:00
for url in $urls; do
# initialize temp files
2014-11-26 10:25:03 +00:00
unsorted_blocklist=$(mktemp)
sorted_blocklist=$(mktemp)
new_set_file=$(mktemp)
# download the blocklist
2014-10-01 11:46:26 +00:00
set_name=$(basename $url)
curl -s --compressed -k "$url" >"${unsorted_blocklist}"
sort -u <"${unsorted_blocklist}" | egrep "^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$" >"${sorted_blocklist}"
# calculate performance parameters for the new set
2014-12-31 17:39:05 +00:00
tmp_set_name="tmp_${RANDOM}"
2014-11-26 10:25:03 +00:00
new_list_size=$(wc -l "${sorted_blocklist}" | awk '{print $1;}' )
hash_size=$(expr $new_list_size / 2)
2014-12-31 17:34:16 +00:00
if ! ipset -q list ${set_name} >/dev/null ; then
ipset create ${set_name} hash:net family inet
fi
# start writing new set file
2014-11-26 10:21:19 +00:00
echo "create ${tmp_set_name} hash:net family inet hashsize ${hash_size} maxelem ${new_list_size}" >>"${new_set_file}"
# convert list of IPs to ipset statements
2014-10-01 11:46:26 +00:00
while read line; do
2014-11-26 10:21:19 +00:00
echo "add ${tmp_set_name} ${line}" >>"${new_set_file}"
done <"$sorted_blocklist"
2014-12-31 17:39:05 +00:00
# replace old set with the new, temp one - this guarantees an atomic update
echo "swap ${tmp_set_name} ${set_name}" >>"${new_set_file}"
# clear old set (now under temp name)
echo "destroy ${tmp_set_name}" >>"${new_set_file}"
# actually execute the set update
ipset -! -q restore < "${new_set_file}"
2014-10-01 11:46:26 +00:00
iptables -A ${blocklist_chain_name} -m set --match-set "${set_name}" src,dst -m limit --limit 10/minute -j LOG --log-prefix "BLOCK ${set_name} "
iptables -A ${blocklist_chain_name} -m set --match-set "${set_name}" src,dst -j DROP
# clean up temp files
2014-11-26 10:27:09 +00:00
rm "${unsorted_blocklist}" "${sorted_blocklist}" "${new_set_file}"
2014-10-01 11:46:26 +00:00
done
2014-11-13 11:28:42 +00:00