Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Could you support custom IP reporting? #37

Closed
devnulli opened this issue Dec 28, 2020 · 15 comments
Closed

Could you support custom IP reporting? #37

devnulli opened this issue Dec 28, 2020 · 15 comments
Assignees
Labels
wontfix thats right but wont be fixed in the forseeable future

Comments

@devnulli
Copy link
Owner

Could you even potentially support custom IP reporting? Possibly EvlWatcher could scan the local database for entries that have been added from other services, like WebAPI that has detection if IP is trying to brute it's way, it could add entries into the database table, then EvlWatcher could occasionally scan that table for increases in the count of the trouble IP and act on it?

By the way, I just found your solution. Sucks regarding the Windows Defender, I had to allow the setup program to get it installed and even just to allow the file to remain to do the MD5 scan on it. I'm hoping to test this more and send some money your way for your hard work. I always saw the Failed Audit entries in the event log for RDP and didn't know what to do, thought of writing my own, but look you did it! 👍

Originally posted by @snblackout in #36 (comment)

@devnulli devnulli self-assigned this Dec 28, 2020
@devnulli devnulli added the enhancement thats a planned enhancement label Dec 28, 2020
@devnulli
Copy link
Owner Author

@snblackout i moved this issue here

@devnulli
Copy link
Owner Author

i've got a question about the custom reporting, yea, i can add that no problem, but it would be nicer if the webapi would just dump events to the eventlog. if that was the case, it would just be a new task in the config.xml . if thats not possible, i guess i could add additional sources like databases or even apis.

about that windows defender - you're right it really sucks. ill have to sign it.

@devnulli devnulli added this to the v 2.1 (Jan 2021) milestone Dec 28, 2020
@snblackout
Copy link

@devnulli I just started using this and did not know that you could customize the config.xml to read in custom event logs. I will take a look at that for sure and see if I can make something work. Thanks!

@devnulli devnulli added the waiting this issue is blocked and is waiting for a reply or clarification by the issuer (or be closed in 1m) label Dec 28, 2020
@devnulli devnulli removed this from the v 2.1 (Jan 2021) milestone Dec 28, 2020
@devnulli
Copy link
Owner Author

devnulli commented Dec 28, 2020

Im glad you like it. Let me know if you still need custom reporting after youre finished. You can use the console App to Test your custom Task

@devnulli
Copy link
Owner Author

devnulli commented Jan 2, 2021

hey, @snblackout, did it work?

greetings, Mike

@snblackout
Copy link

snblackout commented Jan 6, 2021

Hello @devnulli I haven't tried it yet, but it is on my list. Sorry can't get to it that quickly with other things pending.

I do have a question though, I was looking through the config, and there is settings that suggest an IP could become perma-banned automatically. I have a server, which is in the AWS realm of IP block, that is really getting hammered and it's a long list of IP that are temp banned, but I haven't seen any of them move to perma-banned yet. Is am I ok assuming something may not be working to autoban?

@devnulli
Copy link
Owner Author

devnulli commented Jan 8, 2021

Hi, I will test that. I think that it works, and you don't get perma bans because the IPs are so diverse. But I will add the count to the log entries so you can better reflect what happens on your servers.
Also, it only counts during one session, so when the service restarts or the server reboots, the counts are reset.

Also, when you are really highly hammered, its recommendable that you dont use permanent bans, because they will grow very fast and never be removed. Normally, it's just fine to ban attackers temporarily.

@snblackout
Copy link

The restarting of the service could be it then, because I was reading on here of a memory leak so people were restarting the service daily to prevent that.

Yeah having some reporting in the logs or some way to track a certain IP better over time would be better. I'm ok with temporary bans, just seeing the list being so huge and none of them getting perma banned made me question after seeing in the config that if a IP keeps repeating this because of brute force, just perma ban it.

@devnulli
Copy link
Owner Author

devnulli commented Jan 9, 2021

the memory leak has already been fixed, there is no need to restart anymore. the other thing will be added in a new issue. this issue about custom ip reporting will also remain open (at least for a while)

@snblackout
Copy link

Oh, great, I'll remove my restart task then. Thanks!

@snblackout
Copy link

Just realized that's the beta, which I don't have installed, only the latest release. So the memory leak isn't in the latest official release?

@shimuldn
Copy link
Collaborator

@snblackout
Copy link

Thank you @shimuldn

After 16 days of it running on the AWS server, and seeing IP ranges starting with 185.* in the hundreds on entries it seemed, those have finally fallen off. My guess is those were coming from a particular individuals hacking attempt and realized the timeouts were happening from the firewall block and may have backed off for now or toned it down to see if an opportunity would arise again. Now this server is matching other servers I'm monitoring for the amount of temp banned IPs at one given time.

@devnulli
Copy link
Owner Author

@snblackout can i close that, or do you still need custom IP reporting?

@snblackout
Copy link

@devnulli You can close it. I have yet to dive into the config. Sorry for delay.

@devnulli devnulli added wontfix thats right but wont be fixed in the forseeable future and removed waiting this issue is blocked and is waiting for a reply or clarification by the issuer (or be closed in 1m) labels Feb 4, 2021
@devnulli devnulli removed the enhancement thats a planned enhancement label Jun 3, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
wontfix thats right but wont be fixed in the forseeable future
Projects
None yet
Development

No branches or pull requests

3 participants