Skip to content

Release 2.2.0-beta1

Pre-release
Pre-release
Compare
Choose a tag to compare
@neilcook neilcook released this 18 Sep 16:26
· 514 commits to master since this release
v2.2.0-beta1
3bb9a7e

Release Notes for OX Abuse Shield 2.2.0-beta1

New Features

  • Lookup individual GeoIP2 values (Unsigned Integer, String,
    Double/Float and Boolean)
  • Add session_id to wforce LoginTuple
  • The Report API is now deployable via proper packaging, systemd and gunicorn
  • Custom GET Endpoints supporting non-JSON return values
  • New Kibana Reports and Dashboard to view effectiveness of wforce
    policy
  • New "type" field added to built-in webhooks
  • Built-in whitelists added in addition to built-in blacklists
  • New checkBlacklist and checkWhitelist functions in Lua
  • Built-in black/whitelisting can be disabled and checked from Lua
    instead
  • Thread names support
  • Built-In Blacklist and Whitelist return messages are configurable
  • Support TCP Keepalive

Bug Fixes/Changes

  • Fix typo in wforce.conf.example blackistLogin->blacklistLogin
  • Python3 support throughout wforce (regression tests and deployment)
  • Uses "bytes" instead of "string" in replication, which avoids
    protobuf errors for non-UTF-8 StatsDB keys or values.
  • Remove ctpl from wforce
  • Sibling threads now use explicit std::queue instead of ctpl
  • Only connect to TCP siblings when necessary (not on startup) to
    prevent delays on startup.
  • Updated logstash.conf file for ELK integration

Lookup Individual GeoIP2 Values

Previously the GeoIP2 support was limited to retrieving City and
County DB information, with a fixed set of fields returned. However
this meant that other DBs (e.g. ISPs, Anonymizers etc.) could not be
queried, as well as additional fields in City or Country DBs.

Now there are four new Lua functions to query arbitrary fields in the
Maxmind DBs:

  • lookupStringValue
  • lookupDoubleValue
  • lookupUIntValue
  • lookupBoolValue

For example:

local citydb = getGeoIP2DB("City")
local city_name = citydb:lookupStringValue(newCA(ip_address), {"city", "names", "en"})
local city_lat = citydb:lookupDoubleValue(newCA(ip_address), {"location", "latitude"})
local city_long = citydb:lookupDoubleValue(newCA(ip_address), {"location", "longitude"})
local accuracy = citydb:lookupUIntValue(newCA(ip_address), {"location", "accuracy_radius"})
local eu = citydb:lookupBoolValue(newCA(ip_address), {"country", "is_in_european_union"})

Add session_id to wforce LoginTuple

It can be useful for wforce to recognise when multiple logins belong
to the same session. Therefore a new field "session_id" is added to
the LoginTuple table, which allows a session id to be passed to
wforce. This field is optional, so if empty it should be ignored. For
example:

local session_id = lt.session_id

Deployable Report API

Previously the Report API was supplied as an experimental feature,
which was supplied as a Flask application, but without support for running
in production, packaging etc.

Now the Report API is fully deployable; it is packaged in a new
package "wforce-report-api", and can be started/stopped via
systemd. For example:

systemctl enable wforce-report-api
systemctl start wforce-report-api

The Report API is still a Flash application, which runs under
gunicorn, and the configuration and deployment settings are
configurable.

Report API configuration is via:

/etc/wforce-report-api/wforce-report-api-instance.conf

Gunicorn configuration is via:

/etc/wforce-report-api/wforce-report-api-web.conf

It is recommended to run Gunicorn behind an nginx proxy in a
production deployment.

Custom GET Endpoints

The existing Custom Endpoint functionality is based only on POST
commands, and requires return values to be json-encoded. This presents
problems with more limited clients such as firewalls or other network
equipment, which only support HTTP GET, and cannot parse json-encoded
return values.

The Custom GET endpoints solve this issue by allowing endpoints to be
created which are based on HTTP GET, and which return data using
the text/plain content type.

Custom GET endpoints do not take any parameters, so there is no way to
pass data to the endpoints.

For example the following function uses the new getIPBlacklist()
functionality to return a text version of the IP blacklist:

function returnTextBlacklist()
    local ipbl = getIPBlacklist()
    local ret_table = {}
    for i,j in pairs(ipbl)
    do
        for k,v in pairs(j)
        do
            if k == "ip"
            then
                table.insert(ret_table, v)
            end
        end
    end
    local s =  table.concat(ret_table, "\n") .. "\n"
    unblacklistIP(newCA("1.2.3.4"))
    return s
end

setCustomGetEndpoint("textBlacklist", returnTextBlacklist)

New Kibana Reports and Dashboard

New Kibana Reports and Dashboard have been added to the
kibana_saved_objects.json file. These reports are based on "allow"
webhooks sent to elasticsearch.

New "type" field added to built-in webhooks

The built-in webhooks add a "type" field to the webhook json to make
it easier to search for specific webhook types in elasticsearch. The
type field can have the following values:

  • wforce_report
  • wforce_allow
  • wforce_reset
  • wforce_expireblwl
  • wforce_addblwl
  • wforce_delblwl

Built-in Whitelists

In addition to the built-in blacklists there are now built-in
whitelists. Entries can be added and deleted from the built-in
whitelists using either the REST API or using Lua commands.

For example using the REST API:

curl -XPOST --data '{ "ip":"1.2.3.4" }' -u user:pass http://localhost:8084/?command=addWLEntry

For example using Lua:

whitelistIP(lt.remote, 3600, "This is the reason why it is blacklisted")

New checkBlacklist and checkWhitelist functions in Lua

New functions to check the built-in black and whitelists are available
from Lua:

  • checkBlacklistIP
  • checkBlacklistLogin
  • checkBlacklistIPLogin
  • checkWhitelistIP
  • checkWhitelistLogin
  • checkWhitelistIPLogin

See the wforce.conf man page for more details.

Built-in Black/Whitelisting can be disabled

The built-in black/whitelisting functionality can be disabled so that
the checks can instead be performed from Lua. This is achieved with
the following Lua commands:

disableBuiltinBlacklists()
disableBuiltinWhitelists()

Thread Names Support

Every thread type in wforce is now named, so that top -H for example
will show individual thread names. This can be very useful for
diagnosing when particular threads are CPU-bound and could benefit
from increasing the size of the thread pool for example.

Built-In Blacklist return messages are configurable

The following new functions enable the return messages for built-in blacklists to be configured:

  • setBlacklistIPRetMsg
  • setBlacklistLoginRetMsg
  • setBlackistIPLoginRetMsg

See the wforce.conf man page for more details.

Support TCP Keepalive

The wforce daemon previously did not enable TCP keepalive on
accepted sockets. The TCP keepalive socketoption is now enabled for
all sockets.