comparison xml/syslog2iptables.in @ 12:c2a2e35a85ac

final documentation, rpm builds properly
author carl
date Sat, 17 Dec 2005 16:17:09 -0800
parents a9b52f657f08
children 2a7161b03b94
comparison
equal deleted inserted replaced
11:a9b52f657f08 12:c2a2e35a85ac
1 <reference> 1 <reference>
2 <title>@PACKAGE@</title> 2 <title>@PACKAGE@</title>
3 <partintro> 3 <partintro>
4 <title>Packages</title> 4 <title>Packages</title>
5 <para>The various source and binary packages are available at <ulink 5 <para>The various source and binary packages are available at <ulink
6 url="http://www.five-ten-sg.com/syslog2iptables/packages">http://www.five-ten-sg.com/syslog2iptables/packages</ulink> 6 url="http://www.five-ten-sg.com/@PACKAGE@/packages">http://www.five-ten-sg.com/@PACKAGE@/packages</ulink>
7 </para> 7 The most recent documentation is available at <ulink
8 <para>The most recent documentation is available at <ulink 8 url="http://www.five-ten-sg.com/@PACKAGE@/">http://www.five-ten-sg.com/@PACKAGE@/</ulink>
9 url="http://www.five-ten-sg.com/syslog2iptables/">http://www.five-ten-sg.com/syslog2iptables/</ulink>
10 </para> 9 </para>
11 </partintro> 10 </partintro>
12 11
13 <refentry id="@PACKAGE@.1"> 12 <refentry id="@PACKAGE@.1">
14 <refentryinfo> 13 <refentryinfo>
35 </cmdsynopsis> 34 </cmdsynopsis>
36 </refsynopsisdiv> 35 </refsynopsisdiv>
37 36
38 <refsect1 id='description.1'> 37 <refsect1 id='description.1'>
39 <title>Description</title> 38 <title>Description</title>
40 <para><command>@PACKAGE@</command> is a simple adaptive firewall. It 39
41 maintains the INPUT chain of the <citerefentry> 40 <para><command>@PACKAGE@</command> is a simple adaptive firewall. It
42 <refentrytitle>iptables</refentrytitle> <manvolnum>1</manvolnum> 41 maintains the INPUT chain of the <citerefentry>
43 </citerefentry> firewall set based on syslog entries. These syslog 42 <refentrytitle>iptables</refentrytitle> <manvolnum>1</manvolnum>
44 entries are typically generated by your hardware firewall, but they 43 </citerefentry> firewall set based on syslog entries. These syslog
45 could come from any source. Any syslog entry that contains a host name 44 entries are typically generated by your hardware firewall, but they
46 or ip address can be used as input to this package.</para> 45 could come from any source. Any syslog entry that contains a host name
47 46 or ip address can be used as input to this package.</para>
48 <para>The <citerefentry> <refentrytitle>@PACKAGE@.conf</refentrytitle> 47
49 <manvolnum>5</manvolnum> </citerefentry> file specifies the syslog files 48 <para>The <citerefentry> <refentrytitle>@PACKAGE@.conf</refentrytitle>
50 to be monitored, and the regular expressions (<citerefentry> 49 <manvolnum>5</manvolnum> </citerefentry> file specifies the syslog files
51 <refentrytitle>regex</refentrytitle> <manvolnum>7</manvolnum> 50 to be monitored, and the regular expressions (<citerefentry>
52 </citerefentry>) to be applied to new lines in those files. Each 51 <refentrytitle>regex</refentrytitle> <manvolnum>7</manvolnum>
53 regular expression needs an index to specify the matching substring that 52 </citerefentry>) to be applied to new lines in those files. Each
54 contains either an ip address or host name, and a bucket count which is 53 regular expression needs an index to specify the matching substring that
55 added to the leaky bucket for that ip address when a matching line is 54 contains either an ip address or host name, and a bucket count which is
56 read from that syslog file.</para> 55 added to the leaky bucket for that ip address when a matching line is
57 56 read from that syslog file.</para>
58 <para>Each ip address has an associated leaky bucket, which leaks one 57
59 token per second. Once the bucket contains more than a configurable 58 <para>Each ip address has an associated leaky bucket, which leaks one
60 number of tokens, that ip address is added to the INPUT chain with a 59 token per second. Once the bucket contains more than a configurable
61 DROP target. When the bucket is drained to zero, that ip address is 60 threshold number of tokens, that ip address is added to the INPUT chain
62 removed from the INPUT chain.</para> 61 with a DROP target. When the bucket is drained to zero, that ip address
62 is removed from the INPUT chain.</para>
63
64 <para>The discussion has focused on syslog files, but any ascii text
65 file can be used, so long as some other process appends lines to that
66 file, and those lines containing hostname or ip addresses can be matched
67 with some regular expression.</para>
68
69 <para>Considering syslog files in particular, these are normally rotated
70 via logrotate. <command>@PACKAGE@</command> properly detects and
71 handles this case by closing the old file, and reopening the newly
72 created file.</para>
63 </refsect1> 73 </refsect1>
64 74
65 <refsect1 id='options.1'> 75 <refsect1 id='options.1'>
66 <title>Options</title> 76 <title>Options</title>
67 <variablelist> 77 <variablelist>
93 <refsect1> 103 <refsect1>
94 <title>Configuration</title> 104 <title>Configuration</title>
95 <para> 105 <para>
96 The configuration file is documented in <citerefentry> 106 The configuration file is documented in <citerefentry>
97 <refentrytitle>@PACKAGE@.conf</refentrytitle> <manvolnum>5</manvolnum> 107 <refentrytitle>@PACKAGE@.conf</refentrytitle> <manvolnum>5</manvolnum>
98 </citerefentry>. 108 </citerefentry>. Any change to the config file will cause it to be
109 reloaded within three minutes.
99 </para> 110 </para>
100 </refsect1> 111 </refsect1>
101 112
102 <refsect1> 113 <refsect1>
103 <title>Copyright</title> 114 <title>Copyright</title>