class EL_HACKER_INTERCEPT_SERVLET

(source code)

Client examples: TEST_HACKER_INTERCEPT_SERVLET

description

Intercept hacking attempts, returning 404 file not found message as plaintext and creating firewall rule blocking IP address. The ban is temporary and lasts for the number of days specified by {EL_HACKER_INTERCEPT_CONFIG}.ban_rule_duration.

notes

This servlet communicates with the Bash script below to add firewall rules for HTTP and HTTPS ports. The script must be running as root to invoke ufw command.

To install the script for testing type:

sudo cp --update $EIFFEL_LOOP/Bash_library/network/run_service_ip_address_blocking.sh /usr/local/bin

The configuration file for EL_SERVICE_CONFIGURATION needs an entry like the following to invoke the script:

service_configuration:
   screen_list:
      # Scripts
      item:
         name = "IP address blocking"; history_count = 200; sudo = true
         bash_command:
            """
               run_service_ip_address_blocking.sh myching.software
            """
note
	description: "[
		Intercept hacking attempts, returning 404 file not found message as plaintext
		and creating firewall rule blocking IP address. The ban is temporary and lasts for
		the number of days specified by ${EL_HACKER_INTERCEPT_CONFIG}.ban_rule_duration.
	]"
	notes: "See end of class"

	author: "Finnian Reilly"
	copyright: "Copyright (c) 2001-2022 Finnian Reilly"
	contact: "finnian at eiffel hyphen loop dot com"

	license: "MIT license (See: en.wikipedia.org/wiki/MIT_License)"
	date: "2024-09-23 8:00:12 GMT (Monday 23rd September 2024)"
	revision: "33"

class
	EL_HACKER_INTERCEPT_SERVLET

inherit
	FCGI_HTTP_SERVLET
		rename
			make as make_servlet
		redefine
			service
		end

	EL_MODULE_DIRECTORY; EL_MODULE_EXECUTION_ENVIRONMENT; EL_MODULE_FILE; EL_MODULE_FILE_SYSTEM

	EL_MODULE_GEOLOCATION

	EL_STRING_8_CONSTANTS

	EL_SHARED_SERVICE_PORT

create
	make

feature {NONE} -- Initialization

	make (a_service: EL_HACKER_INTERCEPT_SERVICE)
		do
			make_servlet (a_service)
			create date.make_now
			create rule_buffer.make (50)

			monitored_logs := new_monitored_logs

			block_ip_path := a_service.config.server_socket_path.parent + "block-ip.txt"
			create file_mutex.make (block_ip_path.with_new_extension ("lock"))

			if not block_ip_path.exists then
				File.write_text (block_ip_path, "block:0.0.0.0:80%N") -- ignored by script
			end
			filter_table := a_service.config.filter_table

			if attached a_service.Firewall_status_data_path as path and then path.exists then
				firewall_status_table := new_stored_status_table (path)
				log_firewall_summary ("Retrieved blocks")
			else
				create firewall_status_table.make (70)
			end
			create day_list.make (a_service.config.ban_rule_duration + 1)
			fill_day_list
		end

feature -- Access

	firewall_status_table: EL_HASH_TABLE [NATURAL_64, NATURAL]
		-- map IP number to compact form of `EL_FIREWALL_STATUS' data

feature -- Basic operations

	serve
		local
			ip_number: NATURAL
		do
			log.enter_no_header ("serve")

			check_todays_logs

			ip_number := request_remote_address_32

			check_ip_address (ip_number, Service_port.HTTP)

			response.send_error (
				Http_status.not_found, once "File not found", Text_type.plain, {EL_ENCODING_TYPE}.Latin_1
			)

			update_day_list

			if service.is_blocking_script_operational then
				if script_alert_sent then
					script_alert_sent := False
				end
				update_firewall

			elseif not script_alert_sent then
			-- accummulates rules in `rule_buffer' until such time as
			-- run_service_ip_address_blocking.sh is relaunched
				service.send_blocking_script_alert
				script_alert_sent := True
			end

		-- While geo-location is being looked up for address, (which can take a second or two)
		-- a firewall rule is being added in time for next intrusion from same address

			log.put_labeled_string ("Located", Geolocation.for_number (ip_number))
			log.put_new_line

			log.exit_no_trailer
		end

	store_status_table (path: FILE_PATH)
		do
			log_firewall_summary ("Storing blocks")
			new_firewall_status_list.store_as (path)
		end

feature -- Status query

	script_alert_sent: BOOLEAN
		-- `True' if alert was sent after `service.is_blocking_script_operational' became false

feature {NONE} -- Factory

	new_firewall_status_list: ECD_STORABLE_ARRAYED_LIST [EL_ADDRESS_FIREWALL_STATUS]
		do
			create Result.make (firewall_status_table.count)
			across firewall_status_table as table loop
				Result.extend (create {EL_ADDRESS_FIREWALL_STATUS}.make (table.item, table.key))
			end
		end

	new_monitored_logs: ARRAY [EL_TODAYS_LOG_ENTRIES]
		do
			Result := <<
				create {EL_TODAYS_AUTHORIZATION_LOG}.make,
				create {EL_TODAYS_SENDMAIL_LOG}.make
			>>
		end

	new_redeemed_ip_list (first_date: INTEGER): EL_ARRAYED_MAP_LIST [NATURAL, NATURAL_64]
		-- map redeemed IP number to firewall status
		do
			create Result.make (firewall_status_table.count // day_list.count)
			across firewall_status_table as table loop
				if shared_status (table.item).compact_date = first_date then
					Result.extend (table.key, table.item)
				end
			end
		end

	new_stored_status_table (path: FILE_PATH): like firewall_status_table
		local
			status_list: ECD_STORABLE_ARRAYED_LIST [EL_ADDRESS_FIREWALL_STATUS]
		do
			create status_list.make_from_file (path)
			create Result.make (status_list.count)
			across status_list as list loop
				Result.extend (list.item.compact_status, list.item.ip4_number)
			end
		end

feature {NONE} -- Implementation

	allow (redeemed_ip_list: like new_redeemed_ip_list)
		do
			if attached redeemed_ip_list as list then
				from list.start until list.after loop
					if attached Ip_address.to_string (list.item_key) as ip_4_address then
						lio.put_labeled_string ("Allowing", ip_4_address)
						lio.put_new_line
						across shared_status (list.item_value).blocked_ports as port loop
							put_rule (Command.allow, list.item_key, port.item)
						end
					end
					list.forth
				end
			end
		end

	check_ip_address (ip_number: NATURAL; port: NATURAL_16)
		local
			put_block_rule: BOOLEAN
		do
			if attached Firewall_status as status then
				if firewall_status_table.has_key (ip_number) then
					status.set_from_compact (firewall_status_table.found_item)
				else
					status.reset
					status.set_date (day_list.last)
					firewall_status_table.extend (status.compact_status, ip_number)
				end
				if port = Service_port.HTTP then
					if status.http_blocked then
						log_status (ip_number, port, True)
						status.allow (port) -- Try again to set firewall rule

					elseif filter_table.is_hacker_probe (request.relative_path_info.as_lower) then
						put_block_rule := True
					end
				else -- is mail spammer or ssh hacker
					if status.is_blocked (port) then
						log_status (ip_number, port, True)
					else
						put_block_rule := True
					end
				end
				if put_block_rule then
					log_status (ip_number, port, False)
					Service_port.related (port).do_all (agent put_rule (Command.block, ip_number, ?))
					status.block (port)
				end
				if status.count > 1 then
					log_multi_status (ip_number, status)
				end
			-- update table entry
				firewall_status_table [ip_number] := status.compact_status
			end
		end

	check_todays_logs
		-- check mail.log and auth.log for hacker intrusions
		local
			port: NATURAL_16
		do
			across monitored_logs as list loop
				if attached {EL_TODAYS_SENDMAIL_LOG} list.item then
					port := Service_port.SMTP

				elseif attached {EL_TODAYS_AUTHORIZATION_LOG} list.item then
					port := Service_port.SSH
				else
					port := 0
				end
				if port.to_boolean then
					list.item.update_hacker_ip_list
					across list.item.new_hacker_ip_list as address loop
						check_ip_address (address.item, port)
					end
				end
			end
		end

	day_now: INTEGER
		do
			date.make_now
			Result := date.ordered_compact_date
		end

	fill_day_list
		local
			day_set: EL_HASH_SET [INTEGER]; max_day_count: INTEGER
		do
			day_list.wipe_out

			max_day_count := day_list.capacity - 1
			create day_set.make_equal (day_list.capacity)
			day_set.put (date.ordered_compact_date) -- todays

			if firewall_status_table.count > 0 then

			-- Restore `day_list' state
				if attached Firewall_status as status then
					across firewall_status_table as table loop
						status.set_from_compact (table.item)
						day_set.put (status.compact_date)
					end
				end
			end
			if attached day_set.to_list as set_list then
				set_list.sort (True)
				if set_list.count > max_day_count then
					set_list.remove_head (set_list.count - max_day_count)
				end
				day_list.append (set_list)
			end
		end

	log_firewall_summary (label: STRING)
		local
			http_count, smtp_count, ssh_count: INTEGER
		do
			if attached Firewall_status as status then
				across Firewall_status_table as table loop
					status.set_from_compact (table.item)
					http_count := http_count + status.http_blocked.to_integer
					smtp_count := smtp_count + status.smtp_blocked.to_integer
					ssh_count := ssh_count + status.ssh_blocked.to_integer
				end
			end
			log.put_labeled_substitution (label, "HTTP = %S; SMTP = %S; SSH = %S", [http_count, smtp_count, ssh_count])
			log.put_new_line_x2
		end

	log_multi_status (ip_number: NATURAL; status: like Firewall_status)
		local
			ip_4_address: STRING; name_list: EL_STRING_8_LIST
		do
			ip_4_address := IP_address.to_string (ip_number)
			create name_list.make (3)
			across status.blocked_ports as port loop
				name_list.extend (Service_port.name (port.item))
			end
			log.put_labeled_substitution (
				"Multi-port attack", "%S {%S}", [ip_4_address, name_list.joined_with_string (", ")]
			)
			log.put_new_line
		end

	log_status (ip_number: NATURAL; port: NATURAL_16; is_blocked: BOOLEAN)
		local
			ip_4_address, name: STRING
		do
			ip_4_address := IP_address.to_string (ip_number)
			name := Service_port.name (port)
			if is_blocked then
				log.put_labeled_string ("Is blocked on port " + name, ip_4_address)
			else
				log.put_labeled_string ("Blocking on port " + name, ip_4_address)
			end
			log.put_new_line
		end

	put_rule (a_command: STRING; address: NATURAL_32; a_port: NATURAL_16)
		do
			if attached rule_buffer as buffer then
				across Service_port.related (a_port) as port loop
					buffer.append (a_command)
					buffer.append_character (':')
					IP_address.append_to_string (address, buffer)
					buffer.append_character (':')
					buffer.append_natural_16 (port.item)
				-- New line at end of all rules necessary for Bash "while read line; do" loop to work
					buffer.append_character ('%N')
				end
			end
		end

	request_remote_address_32: NATURAL
		do
			Result := request.remote_address_32
		end

	shared_status (compact_status: NATURAL_64): like Firewall_status
		do
			Result := Firewall_status
			Result.set_from_compact (compact_status)
		end

	update_day_list
		-- redeem any ip addresses older than `config.ban_rule_duration' days
		local
			first_date, l_day_now: INTEGER
		do
			l_day_now := day_now
			if l_day_now > day_list.last then
				day_list.extend (l_day_now)
			end
			if day_list.full then
			-- allow previously blocked ip address > config.ban_rule_duration
				first_date := day_list.first
				day_list.remove_head (1)
				if attached new_redeemed_ip_list (first_date) as list then
					list.to_array.do_all (agent firewall_status_table.remove)
					allow (list)
				end
			end
		end

	update_firewall
		-- update firewall rules using script at location `block_ip_path'
		require
			ends_with_new_line: rule_buffer.count > 0 implies rule_buffer [rule_buffer.count] = '%N'
		do
			if rule_buffer.count > 0 then
				file_mutex.try_until_locked (50)
				File.write_text (block_ip_path, rule_buffer)
				file_mutex.unlock
			end
			rule_buffer.wipe_out
		end

feature {NONE} -- Internal attributes

	block_ip_path: FILE_PATH
		-- path to list of commands that is monitored by Bash script for changes

	date: DATE

	day_list: EL_ARRAYED_LIST [INTEGER]

	file_mutex: EL_NAMED_FILE_LOCK
		-- file_mutex for writing to `block_ip_path' so that script reading file must wait to process

	filter_table: EL_URL_FILTER_TABLE

	monitored_logs: ARRAY [EL_TODAYS_LOG_ENTRIES]

	rule_buffer: STRING

	service: EL_HACKER_INTERCEPT_SERVICE

feature {NONE} -- Constants

	Command: TUPLE [allow, block: STRING]
		-- commands with new line character
		once
			Result := ["allow", "block"]
		end

	Firewall_status: EL_FIREWALL_STATUS
		once
			create Result
		end

note
	notes: "[
		This servlet communicates with the Bash script below to add firewall rules
		for HTTP and HTTPS ports. The script must be running as root to invoke ufw command.
		
		To install the script for testing type:
		
			sudo cp --update $EIFFEL_LOOP/Bash_library/network/run_service_ip_address_blocking.sh /usr/local/bin

		The configuration file for ${EL_SERVICE_CONFIGURATION} needs an entry like the following to invoke
		the script:

			service_configuration:
				screen_list:
					# Scripts
					item:
						name = "IP address blocking"; history_count = 200; sudo = true
						bash_command:
							"""
								run_service_ip_address_blocking.sh myching.software
							"""

	]"

end