.TH abck 1 TundraWare .SH NAME abck \- Process intrusion attempts found in the system log. .SH SYNOPSIS abck [-dems] .SH DESCRIPTION \'abck\' is part of the \'abmgmt\' toolkit. It reads through /var/log/messages looking for evidence of an intrusion attempt. Upon finding such a record, \'abck\' qualifies it against information supplied by the user on the command line to determine if the record is to be processed. \'abck\' determines whether the record contains the name or IP address of the source of the attack. If it finds an IP address, it will attempt to reverse the address into a name. If it cannot find a legitimate reverse, it will try to find the authority responsible for that addess. Each matching record is presented to the user. The user can do a \'whois \' lookup on the record, pick or edit an domain name that will be notified about the attack attempt, or skip the record entirely. As \'abnot\' runs, each processed record that the user does not skip is written to an output shell script called \'ABUSERS\'. When \'abck\' has finished, the user can then run this script (\'sh ABUSERS\') to actually notify the responsible domains of the intrusion attempts. \'ABUSERS\' calls another script, \'abnot\' to actually send the notification email. .SH OPTIONS .TP .B -d # Only go back # days in the log. .TP .B -e string Only process attack records which do not contain \'string\'. .TP .B -m string Only process attack records if they contain \'string\'. .TP .B -s Don't actually process the matching records, just display them. .SH RECORD PROCESSING Each time the record of an intrusion attempt is found which matches the command line-selected constraints, it is presented to the user for disposition. A typical prompt looks like this: .nf Log Record: Matching log entry found in /var/log/messages Who Gets Message For: <nag.fleabag.horseplay.edu>? [horseplay.edu] .fi Pressing \'Enter\' accepts the default notification destination of \'horseplay.edu\', a corresponding command is written to \'ABUSERS\', and \'abck\' moves on to the next log entry. The user can also issue a number of commands at the prompt to do further lookups on the attacker or modify the domain to be notified. .TP .B l Move left one subdomain in the default destination. .TP .B r Move right one subdomain in the default destination. \'abck\' will prevent the user from doing this beyond the point there are less than two domains showing. (A user can enter a destination with only one level of domain manually. This is useful for testing because it allows \'localhost\' to be entered as the point of notification.) .TP .B s Skip this record entirely. .TP .B w Run a \'whois\' lookup on the address/name found in the original log entry. This is helpful when reverse lookups fail and may provide further information about the origin of the attack. .TP .B Any other string Replace the current default destination with this string. .SH OTHER You must have a reasonably current copy of 'python' installed for \'abck\' to operate. Also, the \'dig\' and \'whois\' programs must be on the system in a directory somewhere in $PATH. .SH BUGS AND MISFEATURES None known as of this release. .SH COPYRIGHT AND LICENSING abck is Copyright(c) 2001, TundraWare Inc. For terms of use, see the ABMGMT-License.txt file in the program distribution. If you install abck on a FreeBSD system using the 'ports' mechanism, you will also find this file in /usr/local/share/doc/abmgmt. .SH AUTHOR .nf Tim Daneliuk tundra@tundraware.com