def handleKnocks(output, config): dropPrivileges() logFile = LogFile('/var/log/kern.log') portOpener = PortOpener(output, config.getDelay()) knockWatcher = KnockWatcher(config, logFile, portOpener) knockWatcher.tailAndProcess()
def handleKnocks(output, profiles, config): # dropPrivileges() # set logFile to location of iptable logs #logFile = LogFile('/var/log/kern.log') logFile = LogFile('/var/log/messages') portOpener = PortOpener(output, config.getDelay()) knockWatcher = KnockWatcher(config, logFile, profiles, portOpener) knockWatcher.tailAndProcess()
def handleKnocks(output, profiles, config): dropPrivileges() # Attempt to determine logging source here (since it shouldn't require # elevated privileges to verify this information) based on the system # init process if initprocname == "systemd": from knockknock.LogJournald import JournalReader logSource = JournalReader() elif initprocname in ["init", "preinit"]: from knockknock.LogFile import LogFile logSource = LogFile('/var/log/kern.log') else: print "Failed to find logging source for your init system. Exiting" sys.exit(3) portOpener = PortOpener(output, config.getDelay()) knockWatcher = KnockWatcher(config, logSource, profiles, portOpener) knockWatcher.tailAndProcess()
def handleFirewall(input, config): portOpener = PortOpener(input, config.getDelay()) portOpener.waitForRequests()