egress-auditor will monitor new outbound connections and generate appropriate iptables rules (or logs, or ... depending on output plugin).
Connections can be detected using several methods.
The goal is to audit what connections your system need to establish outside, and this tool can help in several scenarios:
-
audit egress connections and automatically display required iptables rules to allow these connections;
-
when rules are in place, log all egress connections just before they are dropped by the chain (explicitly or by the default policy) and send alerts based on loki queries for instance
-
let only connections be established if they are initiated by specific processes (TDB, requires nfqueue)
This is early alpha stuff.
# add an iptable rules on OUTPUT to send new connections to NFLOG
sudo iptables -I OUTPUT -m state --state NEW -p tcp -j NFLOG --nflog-group 100
go build .
# start egress-auditor using the nflog input and the same group id used in iptables
sudo ./egress-auditor -i nflog -I nflog:group:100 -o iptables -O iptables:verbose:2
egress-auditor is running... press ctrl-c to stop
new TCP connection 192.168.1.229:60166 -> 146.148.13.123:443(https) by curl
^C # <- Ctrl+C pressed here
# [nflog] Line generated for curl running as ubuntu with command "curl https://www.devops.works"
# [nflog] Parent of this process was bash running as ubuntu
iptables -I OUTPUT -d 146.148.13.123 -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment "curl"
If you use nftables
, you can set-up nflog target like so:
nft insert rule filter output ct state new log group 100 accept
nft insert rule ip6 filter output ct state new log group 100 accept
See -h
for help, and -l
for the list of input/output plugins.
In a nutshell, inputs are added using -i
, outputs using -o
.
If a plugin needs an option, they are passed using -I
for inputs and -O
for
outputs. For those options, the required format is
pluginame:optionname:optionvalue
.
For instance, to set verbosity to 2 for the iptables output plugin, the proper invocation is:
... -O iptables:verbose:2
Of course, this implies the iptables output module has been loaded using -o iptables
in the same CLI.
The -R
option can be used to hide egress-auditor
and it's arguments from
ps
output. This allows for more sneaky auditing, preventing someone to spot
the program too easily and kill it.
For instance, when running:
sudo ./egress-auditor -R '[loop25]' ...
a call to ps auwx | grep egress | grep -v grep
won't return any results,
since the process has been renamed to [loop25]
(and hangs out with its other
loop kernel-threads friends).
go build .
If you're lazy and do not want to type sudo
when running egress-auditor
,
you can give it some capabilities:
sudo setcap 'cap_net_admin=+ep' ./egress-auditor
If you want to play with egress captured logs in loki, you can start a docker-compose stack in the _misc directory, then point egress-auditor at loki.
cd _misc
docker-compose up -d
cd ..
sudo iptables -I OUTPUT -m state --state NEW -p tcp -j NFLOG --nflog-group 100
sudo ./egress-auditor -i nflog -I nflog:group:100 -o loki -O loki:url:http://127.0.0.1:3100 -O loki:labels:test=true,lokirules=yes,fizz=buzz
Then :
- login with
admin:admin
, - create a datasource with type 'Loki' and
URL
http://loki:3100
- click save and test, and got to the Explore panel to start playing, using
this query for instance:
sum by (process) (rate({destport="443"} [1m]))
Please note that loging to a remote Loki server might generate log lines for Loki itself. You might want to prevent this trafic to be matched in the NFLOG rule.
Run egress-auditor -l
to get an up to date list and their options.
- nflog: captures using nflog iptable target
- nfqueue (+ auto-allow using process filters)
- pcap (device + file, no proc info for the latter)
- ebpf
- iptables
- loki
- json (file + stdout)
- supports only TCP for now
- when using nflog, originating process might not be found for really short lived connections
- UDP
- PTR lookups on destination ?
- pass down a logger to prevent logging mess
-C
: how many cnx to capture before bailing out-t
: duration to capture before exiting-debug
MIT
Contributions welcome.