CrowdSec is an open-source and lightweight software that allows you to detect peers with malevolent behaviors and block them from accessing your systems at various levels (infrastructural, system, applicative). To achieve this, CrowdSec reads logs from different sources (files, streams ...) to parse, normalize and enrich them before matching them to threats patterns called scenarios.
ns8-crowdsec installs the LAPI (local api) on the node, composed of agent (to read logs) and a list of collections to parse them (scenarios, parsers...), the notifications can be sent by email. When crowdsec detects an IP which is abusing it triggers an alert and then a decision (ban) to block the IP with a bouncer (iptable with IPSET). The bouncer is installed on the node however it could be installed to another Linux machine.
https://docs.crowdsec.net/docs/intro
You can install only one crowdsec instance on the node, other crowdsec instance will conflict with crowdsec1 and fail to start
Instantiate the module with:
add-module ghcr.io/nethserver/crowdsec:latest 1
The output of the command will return the instance name. Output example:
{"module_id": "crowdsec1", "image_name": "crowdsec", "image_url": "ghcr.io/nethserver/crowdsec:latest"}
ns8-crowdsec detects changes in the event smarthost-changed and adapt to the new settings to send email when the alerts or decisions come.
First of all, you need to set the smarthost credentials in the Settings > Smarthost
panel of the cluster-admin UI
then trigger the action configure-module (see below)
Let's assume that the crowdsec instance is named crowdsec1
. Once installed the container is up, nothing is needed, customisation can be done :
- by editing a file inside /var/lib/nethserver/crowdsec1/state/crowdsec_config where all config files are stored
- by editing a file inside the container use the wrapper with the name of the container :
podman exec -ti crowdsec1 bash
then restart the container : systemctl restart crowdsec1
You can also modify settings with the configure-module action
api-cli run configure-module --agent module/crowdsec1 --data - <<EOF
{
"helo_host": "foo.domain.com",
"receiver_emails": ["user@domain.com","user@domain.org"],
"bantime": "1",
"dyn_bantime": true,
"whitelists":["10.10.10.0/8","1.2.3.4","foo.com","foo.foo.org","12123564.org"],
"enable_online_api": true,
"ban_local_network": false
}
EOF
bantime
: set the ban time in minutesdyn_bantime
: enable a dynamic ban_time ((number of ban +1) *4) (same unit as ban_time)receiver_emails
: all emails account you want to notice when decisions or alert comehelo_host
: set a fully qualified domain name to use the relevant helo with postfix.(could be empty""
)whitelists
: whitelist domain, ip or network to crowdsec, no ban will occurs for that listenable_online_api
: enable/disable to push signals and receive bad IPs from crowdsec hub (true/false default is true)ban_local_network
: enable/disable to ban on private IP address range
Display the configuration
api-cli run get-configuration --agent module/crowdsec1 | jq
By default whitelist is enabled to never ban IP on the local network, for test purpose you could disable it
runagent -m crowdsec1 cscli parsers remove crowdsecurity/whitelists
systemctl restart crowdsec1
Crowdsec come with a cli tool, available within the application environment. Get a shell with:
runagent -m crowdsec1 bash -l
Then run the tool as
cscli --help
-
help on a specific command:
cscli <command> --help
-
get a glance :
cscli metrics
-
see the state of installed bouncers :
cscli bouncers list
-
see the active decisions(ban):
cscli decisions list
-
see the alerts (discovered IP):
cscli alerts list
-
see the details of an alert:
cscli alerts inspect <alert_ID> -d
-
see installed collections :
cscli collections list
orcscli collections list --all
-
upgrade collections (a systemd timer does upgrade the collection every 15 days):
cscli hub update && cscli hub upgrade
-
ban manually an IP:
cscli decision add -i 1.2.3.4
-
unban an IP
cscli decision delete -i 1.2.3.4
-
ban a network
cscli decision add -r 1.2.3.0/24
-
unban a network
cscli decision delete -r 1.2.3.0/24
-
unban from a scenario
cscli decisions delete -s crowdsecurity/ssh-bfcscli
-
unban all decisions
cscli decisions delete --all
-
inspect a collection:
cscli collections inspect crowdsecurity/sshd
-
inspect a scenario:
cscli scenarios inspect crowdsecurity/ssh-bf
-
inspect a parser:
cscli parsers inspect crowdsecurity/sshd-logs
You can see the metrics of crowdsec at https://app.crowdsec.net/, for this purpose you need to create a login for a single user or an organization in the website, then in the top right menu click in enroll an instance
and retrieve the keys, then enroll your container and restart it.
runagent -m crowdsec1 cscli console enroll <key>
systemctl restart crowdsec1
you can force the enrollment with another key
runagent -m crowdsec1 cscli console enroll --overwrite <key>
systemctl restart crowdsec1
Once done you need to accept inside the website the Instance enroll request
To uninstall the instance:
remove-module --no-preserve crowdsec1
Previous to the version 1.0.6 the bouncer was installed on the host following a repository method, after this version the bouncer is shipped in a full container.
With the upgrade the service crowdsec-firewall-bouncer
has been stopped but not removed from the host. For a full cleaning you can
-
remove firewalld permanent sets:
firewall-cmd --permanent --delete-ipset=crowdsec-blacklists firewall-cmd --permanent --delete-ipset=crowdsec6-blacklists
-
remove the bouncer on rocky linux
dnf remove -y crowdsec-firewall-bouncer-iptables rm -rvf /etc/yum.repos.d/crowdsec_crowdsec.repo /etc/crowdsec /usr/local/sbin/cscli
-
remove the bouncer on debian
apt-get -y remove crowdsec-firewall-bouncer-iptables rm -rvf /etc/apt/sources.list.d/crowdsec_crowdsec.list /etc/crowdsec /usr/local/sbin/cscli
Test the module using the test-module.sh
script:
./test-module.sh <NODE_ADDR> ghcr.io/nethserver/crowdsec:latest
The tests are made using Robot Framework
Translated with Weblate.
To setup the translation process:
- add GitHub Weblate app to your repository
- add your repository to hosted.weblate.org or ask a NethServer developer to add it to ns8 Weblate project