NoNox Intrusion Detection and Response, version 1.17a of Nov. 12, 2007 | |
New stuff! We now have a startup/shutdown script courtesy of Matt Mankins... and the whole set of source, scripts and docs has been packed into a tar file to simplify download and distribution. To distinguish this from the previous release, it's been labeled version 1.17a. |
|
Summary NoNox watches log files for events such as "failed password". When such a pattern is seen several times within a specified time period (for example, 4 failed login attempts within 10 minutes) from the same source, NoNox can execute a command to mitigate the behavior, notify someone, or make a record of the event (or all these things). The patterns, time limits, files to monitor, and commands that can be triggered are all user-specified, so NoNox can be used to detect many kinds of events and to respond in a variety of ways. I use NoNox to monitor for password-scanning attacks, and to block attacking hosts at the firewall in real-time. The supplied configuration file shows how to detect repeated failed logins and (if iptables is installed and running) how to add a new rule that instantly blocks a malicious host that's trying to break in. | |
Software GZipped Tar file: nonox-1.17a.tgz v1.17a 2007-11-12 (28 KB) Release notes |
Documentation NoNox Documentation Pattern/Action library |
License![]() This software is licensed under the CC-GNU GPL. | |
No warranty This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. | |
Background Similar Projects / Why do this? Purpose Simply put, NoNox watches log files for events such as "failed password". When such a pattern is seen several times within a specified time period (for example, 4 failed login attempts within 10 minutes) from the same source, NoNox can execute a command to mitigate the behavior, notify someone, or make a record of the event (or all these things). The patterns, time limits, files to monitor, and commands that can be triggered are all user-specified, so NoNox can be used to detect many kinds of events and to respond in a variety of ways. Example of a failed-login entry from /var/log/secure: A regular expression that matches this log entry and captures the IP address in its second group is: In practice, NoNox could follow ("tail") new entries to /var/log/secure, looking for a match of the above line. Should too many failed login attempts originate at one IP address within a few minutes, NoNox could execute a command to add the attacking host to a firewall's "drop" list, instantly cutting off the attacker's access to the machine. Risks of using NoNox Risks of using any real-time automated intrusion detection+response system Requirements To-do list Contact Information The author of NoNox is Jim Youll, jim@cr-labs.comChallenge/Response, LLC creates security and privacy software to support safe, private e-commerce transactions and to detect and reduce online fraud. |