NAME dbtarpit - extension for Linux iptables distributed as perl module IPTables::IPv4::DBTarpit SYNOPSIS dbtarpit [options]... DESCRIPTION and OPERATION There is no perl module for "dbtarpit". This is a documentation shell. See the IPTables::IPv4::DBTarpit::Tools manpage to manipulate and examine the "dbtarpit" database(s). "dbtarpit" is a C daemon that uses libipq (the Linux iptables userspace packet queuing library) to examine packets that match a filter criteria and tarpit those connections whose IP addresses are found in its database. Currently it is only supported on Linux with iptables, however the database library and Tools will build and install on any os that supports Perl. The "dbtarpit" database is implemented using the Berkeley DB database found in all Linux distributions. "dbtarpit" is configured for concurrent use of the database, allowing similtaneous access and update of the database by other applications. "dbtarpit" checks the packet IP address against its tarpit database for a match. If a match is found the tarpit database is updated with the most recent connection attempt time, the packet is dropped, and the connection tarpitted. Optionally, packet IP addresses that are not found in the tarpit database are logged in the archive database with the most recent connect time for later examination by other applications. When used to defend against denial of service attacks, the tarpit is highly effective because it eliminates the traffic from the attacking site by stopping the transmission of data packets at the remote IP stack. To defend against denial of service attacks for protocols other than TCP/IP, DBTarpit can optionally be configured to drop packets for any connection found in the tarpit database. See the -X switch description below. INSTALLATION To build the "dbtarpit" daemon and tools, type the following: perl Makefile.PL make make test make install On some platforms it appears that ldconfig fails to link the new library. To do so manually, type: ldconfig -n /usr/local/lib To restore the default directory configurations type: rm config.db Adjust the permissions for "dbtarpit" and its installation directories. This is not done automatically since it may involve system directories. In the iptables configuration file, place the filter for "dbtarpit" as the first entry in the INPUT chain. do not insert other entries ahead of this rule. i.e. IPTABLES = "/usr/local/spamcannibal/bin/iptables" ANYWHERE = "0/0" ... $IPTABLES -A INPUT -p tcp -s $ANYWHERE --dport 10025 -j QUEUE This rule will send tcp packets destined for port 10025 from anywhere to the "dbtarpit" daemon. If the IP address of the packet is not found in the database, the packet is returned to the chain untouched. If the IP address is found in the database, the packet is dropped and the connection tarpitted. If the traffic that you wish to inspect and tarpit always comes in on a specific interface, you can modify the rule so that only packets from that interface are inspected. INET_IFACE="eth0" # or your internet interface ... $IPTABLES -A INPUT -p tcp -i $INET_IFACE --dport 10025 -j QUEUE If the target host is not the host that will process the connection, i.e. you are using NAT on a dual-homed bastion host, then the following rules would apply. i.e. TARGET = "1.2.3.4" LAN_IFACE = "eth1" $IPTABLES -t nat -p tcp --dport 10025 -j DNAT --to $TARGET If the incoming IP address is virtual (i.e. eth0:n) then simply add the virtual IP address -d $VIRTUAL_DEST_IP to the above rule. and in the FORWARD chain $IPTABLES $IPTABLES -A FORWARD -p tcp -o $LAN_IFACE \ --dport 10025 -d $TARGET -j QUEUE $IPTABLES $IPTABLES -A FORWARD -p tcp -o $LAN_IFACE \ --dport 10025 -d $TARGET -j ACCEPT WARNING: if the dbtarpit daemon is not running, packets destined for port 10025 (or whatever you select) are silently dropped by IPTABLES. The Berkeley DB environment and database file will be created automatically, however you may wish to use IPTables::IPv4::DBTables::Tools. Adjust the permissions of these files so that they are accessible by the various applications that will be using the information in the databases. Pay particular attention to the permissions on the files. Because the "tarpit" daemon has only concurrent access to the database, applications should not write applications which use db->cursor operations these can block dameon access for normal put and sync operations. Instead, use repetitive read-by-record-number operations to gain sequential access to the data. Lastly, copy rc.dbtarpit to your startup directory so it is executed immediately following rc.iptables at boot up as: rc.dbtarpit start Read the rc.dbtarpit documentation, first by typing: perdoc -U ./rc.dbtarpit and then by looking at the comments at the beginning of the file. See the IPTables::IPv4::DBTarpit::SiteConfig manpage to find out how to pass the DBTarpit configuration information directly to your perl scripts. DEPENDENCIES libdbtarpit 0.0.0 (included with this distribution) Berkeley DB 2.6.4 or better http://www.sleepycat.com/ LIBNET 1.0 or better http://www.packetfactory.net/libnet Linux kernel with iptables (libipq) Network packet filtering (replaces ipchains) (CONFIG_NETFILTER) [Y/n/?] y It is recommended that you not use connection tracking since each tarpitted connection will consume resources. If the tarpit is run on a linux box used as a firewall, then this is unavoidable. connection tracking (required for masq/NAT) (CONFIG_IP_NF_CONNTRACK) [Y/m/n/?] n Userspace queueing via NETLINK (EXPERIMENTAL) (CONFIG_IP_NF_QUEUE) [Y/m/n/?] y or m ---------------------------------------- COMMENT: Our firewall runs with... connection tracking (required for masq/NAT) (CONFIG_IP_NF_CONNTRACK) [Y/m/n/?] Y I've seen as many as several thousand threads in the tarpit with affecting performance on an aging 486 with not much memory. This doesn't seem to be a big deal, but I've seen it mentioned by those with better insight into potential problems than me. OPTIONS - short version Options: -a : Allow all connections -b : Log bandwidth usage to syslog -d : Do NOT detach process. -D : Print packet debug info (like tcpdump) in/out -k : Do not respond to SYN/ACKs (Note 1) -l : Log activity to syslog (Note 2) -o : Output to stdout instead of syslog (Note 3) -O : Same as -o w/time output in seconds since epoch -p maxrate : "Persist" state capture connect attempts (Note 4) -P : Persist mode capture only. -R : Soft restart - Wait while recapturing active connects -t datasize : Set connection throttling size in bytes (default 10) -T : Test mode - Prints out debug info but DOES NOT RUN -u fifoname : Log to fifo (Note 5) -v : Verbosely log activity to syslog (Note 2) -V : Print version information and exit -x : Disable IP capture, just drop connection -X : Drop non-TCP/IP connections found in database -L : tarpit Localhost addresses 127.x.x.x (normally disabled) -r /path : Alternate DB root directory (default "/var/run/dbtarpit) -f filename : Alternate primary DB file name (default "tarpit") -s filename : Optional "connected IP's" database name -h : Print this help information -? : Print this help information Note 1: By default, dbtarpit responds to an inbound SYN/ACK with an RST The -k option eliminates this behavior. Note 2: 'kill -USR1 ' to toggle logging on and off. If logging was not enabled at start this sets the '-l' flag If logging (-l | -v) are set this saves the value and turns off logging If logging is presently toggled off it restores the saved level (-l | -v) Note 3: This sends log information to stdout rather than to syslog. This option also implies and sets the -d option (Do NOT detach process). Silently ignored if '-u' is already present. Note 4: dbtarpit will permanently capture connect attempts within the limit of the maximum data rate specified (in bytes/sec). Note 5: Logs tarpit activity to a fifo in the DB root directory. This option clears the '-o','-O', and '-d' flags. You still must use the (-l | -v) to set the log level. If you wish to use the '-d' flag, it must be explicitly set after the '-u' option is invoked on the command line. '-u' logging uses the same format as the '-O' flag. OPTIONS - long version * -a This will allow all connections. Connections are still added to the optional "connected IP's", but no connections are tarpitted or dropped. * -b This will send an update on the current bandwidth being consumed by the -p option to the log every minute. If you're interested... (Note: it only works if you have -p enabled.) * -d Some people want to run "dbtarpit" under the control of another process. This keeps "dbtarpit" from detaching and running as a daemon. * -D Print packet debug information similar to "tcpdump -n -S -v -x -t port 10025" Incoming packet (iph + tcph) with flags info flags= 02 urg ack : psh rst syn fin 4500 003c 3dde 4000 4006 7825 c0a8 01be c0a8 01aa da1b 2729 3da6 4ba0 0000 0000 a002 16d0 71b5 0000 0204 05b4 0402 080a Outgoing packet 4500 0028 adfa 0000 ff06 891c c0a8 01aa c0a8 01be 2729 da1b 708f 808f 3da6 4ba1 5012 000a af64 0000 0000 60f7 ffbf 44f7 Note: the incoming packet always has the flags at the top, the outgoing one never does. * -k By default, "dbtarpit" will respond to a SYN/ACK packet with a RST. This is nice behavior, because it makes it difficult for people to use your IP addresses to "spoof". If you DON'T want this behavior, use the "-k" option to disable it. * -l Logs the IP addresses of hosts that are tarpitted. * -o This gives you the option to have "dbtarpit" log information go to stdout instead of the syslog. This option also sets "-d", HOWEVER, "-o" is silently ignored if "-u" is already present. * -O The same as the "-o" option, but formats the time stamp as the number of seconds since 00:00:00, Jan 1, 1970, make it easier for other "logfile analysis" programs to parse it. "-O" is silently ignored if "-u" is already present. * -p maxrate If you specify this flag and a maximum bandwidth, several things will happen. First of all, this forces data throttling to 5 bytes (see the "-t" option above). Then, when a connection is attempted, "dbtarpit" will force the connection into what is known as "persist" state. In persist state, the connection will NEVER time out. You'll literally hang onto the connecting thread until you stop or they stop. Running unchecked, this could have a very BAD effect on your bandwidth, so "dbtarpit" will make every effort to only allow this process to take up the maximum bandwidth that you specify (in bytes/second). If it can't capture a connection, "dbtarpit" will still tarpit it. Note: It'll stay pretty NEAR your MAXBW number. * -P Persist mode capture only. This tries to limit bandwidth by only persist capturing. When we're at full bandwidth, standard tarpitting won't happen, but because the same "conversation" that leads to persist capture also has the side-effect of tarpitting, when we're below our set bandwidth, it's not really in effect. * -R "Soft Restart" mode. What this does is to hold off on any new captures for 5 minutes, to let things settle and to get the bandwidth calculations going correctly. * -t datasize This option sets the TCP window advertisement to limit the amount of data sent by the scanner. The number of data bytes to allow per packet is passed as a parameter. (Default 10) * -T This prints a bunch of diagnostic information an exits. * -u fifoname Log to a fifo in the DB root directory (default '/var/run/dbtarpit'). Do not use with the -o and -O flags, these flags are silently ignored if "-u" is already present on the command line. Use the "-l" and "-v" flags to set the desired level of log activity. If you wish to use the "-d" flag to not detach the daemon, it must be explicitly specified after the "-u" option on the command line. All tarpit activity is logged to the domain socket. * -v Logs verbosely. It logs IPs "captured", IPs "tarpitted", and logs all activity from the "tarpitted" hosts. * -V Print version information and exit. * -x Disable tarpitting, just drop the incoming packet. This option also sets "-x" * -X Drop non-TCP/IP connections found in tarpit database, log address if not found (DoS defense mode). * -L Enable tarpiting of Localhost addresses 127.x.x.x (normally disabled). These addresses are normally used for administrative purposes. * -r /path Set the database root aka path to db environment home (default: /var/run/dbtarpit) * -f filename Set the primary database name (default: tarpit) * -s filename Set the secondary database name (default: archive) * -h Print the "short" help information and exit. * -? Print the "short" help information and exit. DATABASE CONFIGURATION FILE [optional] Usually used to increase database cache size. Most of the configuration information that can be specified to DB_ENV methods can also be specified using a configuration file. If an environment home directory has been specified (done by default or with the -r option to "dbtarpit") any file named DB_CONFIG in the database home directory will be read for lines of the format NAME VALUE. One or more whitespace characters are used to delimit the two parts of the line, and trailing whitespace characters are discarded. All empty lines or lines whose first character is a whitespace or hash (#) character will be ignored. Each line must specify both the NAME and the VALUE of the pair. The specific NAME VALUE pairs are documented in the Berkeley DB manual for the corresponding methods. See: http://www.sleepycat.com/docs/ref/env/db_config.html DATABASE FORMAT dbtarpit and IPTables::IPv4::DBTarpit::Tools use the Berkeley DB database. The database is of type BTREE, opened for concurrent access and sequential record access. Both of the database files have identical format. Files: tarpit, archive Key: 32 bit packed network address as produced by inet_aton Data: 32 bit unsigned integer, number of seconds since 1-1-70 Database creation hints for 'C' api: * environment flags * u_int32_t eflags = DB_CREATE | DB_INIT_CDB | DB_INIT_MPOOL; * db flags * u_int32_t dflags = DB_CREATE; u_int32_t info = DB_RECNUM; DBTYPE type = DB_BTREE; int mode = 0664; environment and database open statements vary depending on the version of BerkeleyDB used. See the code in bdb.c for specifics. Database creation hints for Perl api: my %env = ( -Home => $self->{dbhome}, -Flags => DB_CREATE | DB_INIT_CDB | DB_INIT_MPOOL, ); $self->{"_db_${db}"} = new BerkeleyDB::Btree -Filename => $self->{dbfilename}, -Flags => DB_CREATE, -Property => DB_RECNUM, -Env => $self->{env} or die "Cannot open database $db: $! $BerkeleyDB::Error\n" ; NOTE: (in BIG LETTERS!) Berkeley DB provides a "1" based numbering system for record numbers. i.e. the first record number is "1". By contrast, perl-BerkeleyDB is a "0" based numbering system with the first record number in the same database designated as "0". This means that a database read and written with the 'C' api will have its record numbers begin with "1" while the same database accessed with perl-BerkeleyDB will have record numbers starting with "0". TOOLS There are three other modules that come with this bundle. Briefly their purpose is as follows: * IPTables::IPv4::DBTarpit::Tools The Tools module provides an easy interface to the database used by the DBTarpit daemon. Build applications that access the database(s) using this module. * IPTables::IPv4::DBTarpit::SiteConfig The SiteConfig module reports the configuration of the DBTarpit bundle at installation time for use in modules that need to know where various components may be either at build or run time. * IPTables::IPv4::DBTarpit::Inst Inst is a small module that provide a set of methods to carry on a dialog with the installer of a module and generate a config file and Makefile text based on the config file. See inst/dialog.pl in this package (it is a bit atypical) or inst/dialog.pl for any of the SpamCannibal modules (typical). For detailed information, please read the man pages for these modules. APPLICATIONS ... aahhh! now you come to the fun part. See the Mail::SpamCannibal manpage Used with "dbtarpit", it "eats" the spammer for lunch. In less graphic terms, SpamCannibal is a set of tools that helps you identify the originating mail server for the spam message and add the offender's IP address to the tarpit. There are "trolling" tools to allow you to check the DNSBL databases for hits against "dbtarpit's" archive database and a host of other goodies to help make life difficult for spammers. I'm sure you can think of many other applications, but this one is on the top of my list. ACKNOWLEDGEMENTS There are many contributors to this project. Major code snippets came from the work of: ipt_TARPIT.c by Aaron Hopkins http://ftp.die.net/pub/linux-kernel-tarpit/ipt_TARPIT.c LaBrea by Tom Liston http://www.hackbusters.net/LaBrea/ and... and interesting email from Cody Hatch about using a tarpit to trap spammers. http://mail.nl.linux.org/offtopic/2002-10/msg00000.html AUTHOR Michael Robinton COPYRIGHT AND LICENCE Copyright 2003 - 2014, Michael Robinton This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. SEE ALSO the IPTables::IPv4::DBTarpit::Tools manpage, the IPTables::IPv4::DBTarpit::Inst manpage, the IPTables::IPv4::DBTarpit::SiteConfig manpage, the libdbtarpit manpage, the dbtarpit manpage and for manual db administration, the utility bdbutil.pl