Gnucomo-0.0.8: September 4th 2003
$Log: gcm_daemon.php,v $
- Revision 1.20 2005-06-04 07:15:16 arjen
+ Revision 1.26 2011-03-24 09:46:36 arjen
+ Resolve a hostname before adding to the abuses.
+
+ Revision 1.25 2007/12/12 09:06:21 arjen
+ Added a new script gcm_maintenance.php to cleanup the database
+ and check referential integrity. Purging old log entries is
+ removed from the gcm_daemon script.
+
+ Revision 1.24 2007/11/17 09:34:07 arjen
+ Cleaned up some leftovers
+
+ Revision 1.23 2007/11/03 10:31:12 arjen
+ Added the class definition for a filesystem parameter.
+ New issue type: 'property out of range'.
+
+ Revision 1.22 2007/10/23 11:23:52 arjen
+ Record the date when adding the number of abuses for an IP address
+ in the abuse list.
+
+ Revision 1.21 2007/01/11 13:47:41 arjen
+ Log_adv and derived tables removed.
+ Create notifications from log entries with pattern matching.
+
+ Revision 1.20 2005/06/04 07:15:16 arjen
Added pattern check on log entries with the service_pattern table.
Revision 1.19 2004/01/10 20:04:12 arjen
*/
-// $Id: gcm_daemon.php,v 1.20 2005-06-04 07:15:16 arjen Exp $
+// $Id: gcm_daemon.php,v 1.26 2011-03-24 09:46:36 arjen Exp $
ini_set('include_path', '.:./classes:../phpclasses');
ini_set('html_errors', 'false');
-define("BATCHSIZE", 200);
+define("BATCHSIZE", 50000);
//Tell the log that we're up.
define_syslog_variables();
require_once "gnucomo_config.php";
require_once "db.class.php";
-require_once "gnucomo.process_log.php";
// Set the standard variables //
$project_name = "gnucomo"; // name of the entire project
$app_name = "gcm_daemon"; // name of the application running
$developrelease = "FALSE"; // Indicates if special debug settings are needed
-$db_version = 48; // The db_version indicates what the level of
+$db_version = 54; // The db_version indicates what the level of
// the database should be. If the database is
// old an update will be generated.
$gcmd_version = 5; // This value indicates the active version of
die ("Couldn't initialize database version.\n");
}
-// If there is a new gcm_daemon_version the logrecords that couldn't be
-// understood can be reprocessed. For this reason processed is now changed
-// to false again for not recognized records.
+// The gcm_daemon version is maintained in the database to enable
+// automatic update actions.
$local_sql = "SELECT setting_value FROM db_value
WHERE setting = 'gcm_daemon_version'";
{
if ($dbms->db_result_row[0] < $gcmd_version)
{
- //Reactive log-records that weren't understood earlier.
-
- $local_sql = "UPDATE log SET processed = false
- WHERE logid NOT IN (SELECT DISTINCT logid FROM log_adv)";
- $dbms->query($local_sql);
//Update de gcm_daemon version in the database
$local_sql = "UPDATE db_value SET setting_value = '".$gcmd_version;
do
{
- //At this place we start processing new log-lines
-
echo "Processing logs...\n";
process_log ();
service_check();
- find_notifications();
- mail_notifications();
+ //mail_notifications();
// Gather the statistics for each object
echo "Last processed logid = $last_log \n";
//Query the log-table
+ $log_limit = $last_log + BATCHSIZE;
$local_sql = "SELECT * FROM log WHERE logid > CAST(".$last_log." AS BIGINT)
- ORDER BY logid LIMIT " . BATCHSIZE;
+ AND logid <= $log_limit ORDER BY logid";
$dbms->query($local_sql);
//Update the log-statistics in the object-table
$local_object_os = "";
$local_object_os_version = "";
- while ($local_counter < $dbms->num_rows())
- {
-
- $local_return_row = $dbms->fetch_row();
- if ($local_return_row == 'TRUE')
- {
- // Work on active rows
- $local_log_id = $dbms->db_result_row[0];
-
- $local_sql_findobject = "SELECT os, os_version FROM object
- WHERE objectid = '".$dbms->db_result_row[1]."'";
- $local_findobject_db->query($local_sql_findobject);
- $local_findobject_result = $local_findobject_db->fetch_row();
- if ($local_findobject_result == 'TRUE')
- {
-
- // Now work on the OS again
- $local_object_os = $local_findobject_db->db_result_row[0];
- if ($local_object_os == "")
- {
- $local_object_os = "Linux";
- $local_object_os_version = "Unknown assuming Linux";
- }
- else
- {
- $local_object_os_version = $local_findobject_db->db_result_row[1];
- }
- }
-
- switch (strtolower($local_object_os))
- {
- case "linux":
- $local_process_return = linux_log ();
- break;
- default:
- syslog (LOG_INFO, "Couldn't find suitable OS for processing the logline");
- break;
- }
-
- if ($local_process_return != 'TRUE')
- {
- $local_process_return = 'FALSE';
- }
-
- }
- else
- {
-
- break;
-
- }
- $local_counter++;
- }
-
- // Check for spam and other abuses.
-
- // abuse_check($last_log);
-
match_log_patterns($last_log);
// Register that the logrecords have been processed.
UpdateStatistic($objectid, 'logs', $cnt->count);
}
-// Check for spam and other abuses in the log_adv tables.
-
-function abuse_check($logstart)
-{
-return; // This function is obsolete
- global $dbms;
-
- // notification: 'abuses exceeded'.
-
- $noqueue_res = $dbms->query("select logid, source_ip from log_adv_daemon_email
- where event='NOQUEUE' and logid > " . $logstart);
- echo "NOQUEUE abuses:\n\n";
- for ($row = 0; $row < $dbms->num_rows($noqueue_res); $row++)
- {
- $noqueue = $dbms->fetch_object($noqueue_res, $row);
- if ($noqueue->source_ip != '')
- {
- $obj = $dbms->fetch_object(
- $dbms->query("SELECT objectid FROM log WHERE logid = '" . $noqueue->logid . "'"),0);
- record_abuse(0, $obj->objectid, $noqueue->source_ip, 2);
-
- // TODO: Create notification
- }
- }
- $dbms->Free($noqueue_res);
-
- $noqueue_res = $dbms->query("select logid, source_ip, relay from log_adv_daemon_email
- where event='SPAM' and logid > " . $logstart);
- echo "SPAM abuses:\n\n";
- for ($row = 0; $row < $dbms->num_rows($noqueue_res); $row++)
- {
- $noqueue = $dbms->fetch_object($noqueue_res, $row);
- $source = $noqueue->source_ip;
- if ($source == '')
- {
- $source = $noqueue->relay;
- }
- if ($source != '')
- {
- $obj = $dbms->fetch_object(
- $dbms->query("SELECT objectid FROM log WHERE logid = '" . $noqueue->logid . "'"),0);
- record_abuse(0, $obj->objectid, $source, 1);
-
- // TODO: Create notification
- }
- }
- $dbms->Free($noqueue_res);
-
- echo "HTTP abuses:\n\n";
- $abuse_res = $dbms->query("select logid, objectid, rawdata from log
- where servicecode='httpd' and logid > " . $logstart);
- for ($row = 0; $row < $dbms->num_rows($abuse_res); $row++)
- {
- $source = '';
- $abuse = $dbms->fetch_object($abuse_res, $row);
- if (ereg("\[error\] \[client ([0-9.]+)\] request failed: URI too long", $abuse->rawdata, $parts))
- {
- echo $abuse->rawdata . "\n";
- echo "Abuse on object " . $abuse->objectid . " from IP address " . $parts[1] . "\n";
- $source = $parts[1];
- }
- if (ereg("\[error\] \[client ([0-9.]+)\] File does not exist: .+/MSADC",
- $abuse->rawdata, $parts))
- {
- echo $abuse->rawdata . "\n";
- echo "Abuse on object " . $abuse->objectid . " from IP address " . $parts[1] . "\n";
- $source = $parts[1];
- }
- if ($source != '')
- {
- record_abuse(0, $abuse->objectid, $source, 2);
-
- // TODO: Create notification
- }
- }
- $dbms->Free($abuse_res);
-}
-
function match_log_patterns($logstart)
{
global $dbms;
$notifications = array();
- // notification: 'abuses exceeded'.
-
- $noqueue_res = $dbms->query("select logid, objectid, servicecode, rawdata from log where logid > " . $logstart
- . " order by logid limit " . BATCHSIZE);
+ $log_limit = $logstart + BATCHSIZE;
+ $noqueue_res = $dbms->query("select logid, objectid, servicecode, rawdata from log
+ where logid > $logstart and logid <= $log_limit
+ order by logid");
for ($row = 0; $row < $dbms->num_rows($noqueue_res); $row++)
{
$logentry = $dbms->fetch_object($noqueue_res, $row);
- echo "\n----------\n" . $logentry->rawdata . "\n----------\n";
+ //echo "\n----------\n" . $logentry->rawdata . "\n----------\n";
$service = $logentry->servicecode;
$pattern_res = $dbms->query("select * from service_pattern where service='$service'
OR service='ANY' order by rank");
for ($patnr = 0; !$match_found && $patnr < $dbms->num_rows($pattern_res); $patnr++)
{
$srv_pat = $dbms->fetch_object($pattern_res, $patnr);
+ //echo " Checking with pattern " . $srv_pat->pattern . "\n";
if (ereg($srv_pat->pattern, $logentry->rawdata, $matches))
{
// Scan the argument for '$n' expressions and expand
$srv_pat->argument = expand_arguments($srv_pat->argument, $matches);
- echo " " . $srv_pat->pattern . " matches.\n";
- echo " Matched string: " . $matches[0] . "\n";
- echo " Action = " . $srv_pat->action . "(" . $srv_pat->argument . ")\n\n";
+ //echo " " . $srv_pat->pattern . " matches.\n";
+ //echo " Matched string: " . $matches[0] . "\n";
+ //echo " Action = " . $srv_pat->action . "(" . $srv_pat->argument . ")\n\n";
$match_found = true;
switch ($srv_pat->action)
$notif = $srv_pat->argument;
if (!isset($notifications[$logentry->objectid][$notif]))
{
- echo "Creating notification $notif for object " . $logentry->objectid . ".\n";
+ //echo "Creating notification $notif for object " . $logentry->objectid . ".\n";
$remark = "Notification generated from Gnucomo pattern match.";
$notifications[$logentry->objectid][$notif] =
$dbms->new_notification($logentry->objectid, $notif, $remark);
}
if (isset($notifications[$logentry->objectid][$notif]))
{
- echo "Notification $notif for object " . $logentry->objectid . " already created.\n";
+ //echo "Notification $notif for object " . $logentry->objectid . " already created.\n";
$insertion = "INSERT INTO log_notification (notificationid, logid) VALUES ('";
$insertion .= $notifications[$logentry->objectid][$notif] . "', '";
$insertion .= $logentry->logid . "')";
break;
case "abuse":
- if (record_abuse($logentry->logid, $logentry->objectid, $srv_pat->argument, 1) >= 6)
+ //echo "Recording abuse for address ", $srv_pat->argument, "\n Log entry:\n ";
+ //echo $logentry->rawdata, "\n Pattern:\n ", $srv_pat->pattern, "\n\n";
+
+ if (record_abuse($logentry->logid, $logentry->objectid, $srv_pat->argument, 1) >= 32)
{
- $source_ip = $srv_pat->argument;
+ $source_ip = gethostbyname($srv_pat->argument);
$notif = 'abuses exceeded';
if (!isset($notifications[$logentry->objectid][$notif][$source_ip]))
{
echo "Creating notification $notif for object " . $logentry->objectid . ".\n";
$remark = "Abuses from IP address $source_ip exceeded the limit.";
- $notifications[$logentry->objectid][$notif][$source_ip] =
- $dbms->new_notification($logentry->objectid, $notif, $remark);
+ $notifid = $dbms->new_notification($logentry->objectid, $notif, $remark);
+ $notifications[$logentry->objectid][$notif][$source_ip] = $notifid;
+
+ // Add log entries from previously detected abuses
+
+ echo " Add log entries from previously detected abuses\n";
+ $abuses = $dbms->query("SELECT logid FROM log_abuse WHERE objectid = '" .
+ $logentry->objectid . "' AND source = '$source_ip'");
+ for ($abusenr = 0; $abusenr < $dbms->num_rows($abuses); $abusenr++)
+ {
+ $log_abuse = $dbms->fetch_object($abuses, $abusenr);
+ if ($log_abuse->logid != $logentry->logid)
+ {
+ $insertion = "INSERT INTO log_notification (notificationid, logid) VALUES ('";
+ $insertion .= $notifid . "', '";
+ $insertion .= $log_abuse->logid . "')";
+ $dbms->query($insertion);
+ }
+ }
}
if (isset($notifications[$logentry->objectid][$notif][$source_ip]))
{
- echo "Notification $notif for object " . $logentry->objectid . " already created.\n";
+ //echo "Notification $notif for object " . $logentry->objectid . " already created.\n";
$insertion = "INSERT INTO log_notification (notificationid, logid) VALUES ('";
$insertion .= $notifications[$logentry->objectid][$notif][$source_ip] . "', '";
$insertion .= $logentry->logid . "')";
}
}
break;
+ case "forgive":
+ record_abuse($logentry->logid, $logentry->objectid, $srv_pat->argument, -4);
+ break;
default:
echo "Error: unrecognized action in service pattern: " . $srv_pat->action . "\n";
break;
}
else
{
- echo " " . $srv_pat->pattern . " does not match.\n";
+ // echo " " . $srv_pat->pattern . " does not match.\n";
}
}
$abuse_points = $points;
$ipaddress = gethostbyname($sourceip);
- echo " IP address for $sourceip is $ipaddress.\n";
+ //echo " IP address for $sourceip is $ipaddress.\n";
$sourceip = $ipaddress;
$abres = $dbms->query("SELECT * FROM object_abuse WHERE objectid='$objectid' AND source='$sourceip'");
- if (pg_numrows($abres) == 0)
+ if (pg_numrows($abres) == 0 && $points > 0)
{
- echo "$sourceip is new.\n";
- $dbms->query("INSERT INTO object_abuse VALUES ('$objectid', '$sourceip', '$points')");
+ //echo "$sourceip is new.\n";
+ $dbms->query("INSERT INTO object_abuse VALUES ('$objectid', '$sourceip', '$points', '', NOW())");
+ $dbms->query("INSERT INTO log_abuse VALUES ('$logid', '$objectid', '$sourceip')");
}
- else
+ else if (pg_numrows($abres) != 0)
{
$abuse = $dbms->fetch_object($abres, 0);
if ($abuse->status == '' || $abuse->status == 'dropped')
{
$abuse_points = $abuse->nr_abuses + $points;
- echo $sourceip . " will get " . $abuse_points . " abuse points, ";
- echo "Status was " . $abuse->status . "\n";
+ if ($abuse_points < 0)
+ {
+ $abuse_points = 0;
+ }
+ //echo $sourceip . " will get " . $abuse_points . " abuse points, ";
+ //echo "Status was " . $abuse->status . "\n";
$dbms->query("UPDATE object_abuse SET nr_abuses='$abuse_points'" .
- " WHERE objectid='$objectid' AND source='$sourceip'");
+ ", last_change=NOW() WHERE objectid='$objectid' AND source='$sourceip'");
- $dbms->query("INSERT INTO log_abuse VALUES ('$logid', '$objectid', '$sourceip')");
- if ($abuse_points >= 6)
+ if ($points > 0)
+ {
+ $dbms->query("INSERT INTO log_abuse VALUES ('$logid', '$objectid', '$sourceip')");
+ }
+ if ($abuse_points >= 32)
{
- echo " BLOCK IP adrress $sourceip on the firewall.\n";
+ //echo " BLOCK IP adrress $sourceip on the firewall.\n";
$dbms->query("UPDATE object_abuse SET status='dropped'" .
" WHERE objectid='$objectid' AND source='$sourceip'");
}
VALUES ('log_servicecheck', '0')");
}
+ echo "Running service check from log id $last_log.\n";
// Query the log-table
+ $log_limit = $last_log + BATCHSIZE;
$qry = "SELECT logid, objectid, servicecode FROM log
- WHERE logid > CAST(".$last_log." AS BIGINT) ORDER BY logid LIMIT " . BATCHSIZE;
+ WHERE logid > CAST(".$last_log." AS BIGINT) AND logid <= $log_limit
+ ORDER BY logid";
$log_res = $dbms->query($qry);
//$log_res = $dbms->query("SELECT logid, objectid, servicecode,rawdata FROM log");
$dbms->query($qry);
}
-function find_notifications ()
-{
-
-/*
- * Do something with notification checks.
- *
- * INPUT : NONE
- * OUTPUT : NONE
- */
-
- global $dbms;
-
- // Find checks that have to be executed.
- $local_sql = "select * from notification_check where
- age(last_execution) > time_between_executions";
- $dbms->query($local_sql);
-
- for ($i=0; $i<$dbms->num_rows(); $i++)
- {
- // A check has been found that has to be executed
- $dbms->fetch_row();
- }
-}
-
/*
* find open notifications and send an email to the object's users.
*/