File: arpalert.8

package info (click to toggle)
arpalert 2.0.12-4
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 3,560 kB
  • sloc: ansic: 4,456; sh: 517; makefile: 116; perl: 35
file content (312 lines) | stat: -rw-r--r-- 9,890 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
.\"
.\" Copyright (c) 2005-2010 Thierry FOURNIER
.\" $Id: arpalert.8 690 2008-03-31 18:36:43Z  $
.\"
.TH ARPALERT 8 2006-05-09 "" "arp traffic monitoring"
.SH NAME
arpalert \- ARP traffic monitoring
.SH DESCRIPTION
Arpalert uses ARP protocol monitoring to prevent unauthorized connections on the local network. 
If an illegal connection is detected, a program or script could be launched, which could be used to send an alert message, for example.
.SH COMMAND LINE
.TP
\fB\-f config_file\fR
Specify the config file.
.TP
\fB\-i interface\fR 
Comma separated network interfaces listen to.
.TP
\fB\-p pid_file\fR
Use this pid file. this file containis a pid number of the arpalert session. If the file exist and his locked, the daemon do not run.
.TP
\fB\-e exec_script\fR
Script launched when an alert is send.
.TP
\fB\-D log_level\fR
The level logged. The levels are between 0 (emergency) and 7 (debug). If 3 is selected all levels bitween 0 and 3 are logged.
.TP
\fB\-l leases_file\fR
This file contain a dump of the mac address in memory (see config file).
.TP
\fB\-m module file\fR
Specify a module file to load
.TP
\fB\-d\fR
Run as daemon.
.TP
\fB\-F\fR
Run in foreground.
.TP
\fB\-v\fR
Watch on screen all the option selected (the options specified in config file and the default options)
.TP
\fB\-h\fR
The help command line.
.TP
\fB\-w\fR
Debug option: print a dump of packets captured.
.TP
\fB\-P\fR
Set the interface in promiscuous mode (don't set this if only the arp analyse is used).
.TP
\fB\-V\fR
Print version and quit.
.\"
.\" CONFIG FILE
.\"
.SH CONFIGURATION FILE
The config file contains 3 types of data: integer, string and boolean. The boolean type can take values 'oui', 'true', 'yes', '1'
for the true values or 'non', 'no', 'false', '0' for the falses values.
.TP
\fBuser\fR = arpalert
Use privileges separation with this user
.TP
\fBumask\fR = 177
Uses this umask for file creation.
.TP
\fBchroot dir\fR = /home/thierry/arp_test/
Use this directory for program jail
.br
If this option is commented out, the program does not use chroot.
.br
The program read the config file and open the syslog socket before the chroot:
.br
The kill \-HUP does not work with chroot.
.br
If the syslog program is restarted, the socket change and the arpalert syslog system can't be connect to the new socket:
the logs with syslog are disabled. Prefere to use the log file.
.br
The file paths are relative to the chroot dir (except the config file)
.TP
\fBlog file\fR = /var/log/arpalert.log
The program log into this file
.br
If this option is commented out, the internal system log is not used.
.br
The internal system logs can be used in same time that syslog.
.TP
\fBlog level\fR = 6
The level logged. The levels are between 0 (emergency) and 7 (debug). If 3 is selected all levels between 0 and 3 are logged.
.TP
\fBuse syslog\fR = true
If this option is false, the syslog system is disabled
.TP
\fBmaclist file\fR = /etc/arpalert/maclist.allow
White list
.TP
\fBmaclist alert file\fR = /etc/arpalert/maclist.deny
Black list
.TP
\fBmaclist leases file\fR = /var/lib/arpalert/arpalert.leases
Dump file
.TP
\fBdump inter\fR = 5
Minimum time to wait between two leases dump
.TP
\fBauth request file\fR = /etc/arpalert/authrq.conf
List of authorized request
.TP
\fBlock file\fR = /var/run/arpalert.pid
pid file
.TP
\fBdump packet\fR = false
Only for debugging: this dump packet received on standard output. The syntax "\fBdump paquet\fR" is also avalaible, but is deprecated
.TP
\fBdaemon\fR = false
If is set to true, run the program as daemon
.TP
\fBinterface\fR = ""
Comma separated network interfaces leisten to. If this value is not specified, the soft select the first interface.
.TP
\fBcatch only arp\fR = TRUE
Configure the network for catch only arp request.
The detection type "new_mac" is deactived.
This mode is used for CPU saving if Arpalert is running on a router
.TP
\fBmod on detect\fR = ""
Module file loaded by arpalert. This module is launched on each valid alert.
This system avoids a costly fork/exec
.TP
\fBmod config\fR = ""
This chain is transferred to the init function of module loaded
.TP
\fBaction on detect\fR = ""
Script launched on each detection. Parameters are: 
.br
 - \fBmac address of requestor\fR,
.br
 - \fBip of requestor\fR,
.br
 - \fBsupp. parm.\fR,
.br
 - \fBethernet device listening on\fR
.br
 - \fBtype of alert\fR,
.br
 - optional: \fBethernet vendor\fR
.IP
type of alert:
.br
\fB0:\fR IP change
.br
\fB1:\fR Mac address already detected but not in white list
.br
\fB2:\fR Mac address in black list
.br
\fB3:\fR New mac address
.br
\fB4:\fR Unauthorized arp request
.br
\fB5:\fR Abusive number of arp request detected
.br
\fB6:\fR Ethernet mac address different from arp mac address
.br
\fB7:\fR Flood detected
.br
\fB8:\fR New mac address without ip address
.TP
\fBexecution timeout\fR = 10
Script execution timeout (seconds)
.TP
\fBmax alert\fR = 20
Maximun simultaneous lanched script
.TP
\fBdump black list\fR = false
Dump the black listed mac address in leases file
.TP
\fBdump white list\fR = false
Dump the white listed mac address in leases file
.TP
\fBdump new address\fR = true
Dump the new mac address in leases file
.TP
\fBmac timeout\fR = 259200
After this time a mac address is removed from memory (seconds) (default 1 month)
.TP
\fBmax entry\fR = 1000000
After this limit the memory hash is cleaned (protect to arp flood)
.TP
\fBanti flood interval\fR = 10
This sends only one mismatch alert in this time (in seconds)
.TP
\fBanti flood global\fR = 50
If the number of arp request in seconds exceeds this value, all alerts are ignored for
"anti flood interval" time
.TP
\fBmac vendor file\fR = ""
This file contain the association from mac address to vendor name. This file can be
downloaded here: http://standards.ieee.org/regauth/oui/oui.txt
.TP
\fBlog mac vendor\fR = false
Log vendor name
.TP
\fBalert mac vendor\fR = false
Give vendor name to script
.TP
\fBmod mac vendor\fR = false
Give vendor name to module
.TP
\fBlog referenced address\fR, \fBalert on referenced address\fR, \fBmod on referenced address\fR = false
Log/launch script/call module if the address is referenced in hash but is not in white list
.TP
\fBlog deny address\fR, \fBalert on deny address\fR, \fBmod on deny address\fR = true
Log/launch script/call module if the mac address is in black list
.TP
\fBlog new address\fR, \fBalert on new address\fR, \fBmod on new address\fR = true
Log/launch script/call module if the address isn't referenced
.TP
\fBlog mac change\fR, \fBalert on mac change\fR, \fBmod on mac change\fR = true
Log/launch script/call module if the mac address is different from the last arp request with the same ip address
.TP
\fBlog ip change\fR, \fBalert on ip change\fR, \fBmod on ip change\fR = true
Log/launch script/call module if the ip address is different from the last arp request with the same mac address
.TP
\fBlog unauth request\fR, \fBalert on unauth request\fR, \fBmod on unauth request\fR = true
Unauthorized arp request: launch if the request is not authorized in auth file
.TP
\fBignore unknown sender\fR = true
Don't analyse arp request for unknown hosts (not in white list)
.TP
\fBignore self test\fR = true
Ignore ARP self test generated by windows dhcp for unauthorized request detection
.TP
\fBignore me\fR = true
Ignore arp request with mac addresse of the listing interfaces for the authorizations checks
.TP
\fBunauth ignore time method\fR = 2
Select suspend time method:
.br
1: ignore all unauth alerts during "anti flood interval" time
.br
2: ignore only tuple (mac address, ip address) during "anti flood interval" time
.TP
\fBlog request abus\fR, \fBalert on request abus\fR, \fBmod on request abus\fR = true
Log/launch script/call module if the number of request per seconds are > "max request"
.TP
\fBmax request\fR = 1000000
Maximun request authorized by second
.TP
\fBlog mac error\fR, \fBalert on mac error\fR, \fBmod on mac error\fR = true
Log/launch script/call module if the ethernet mac address is different than the arp mac address (only for requestor)
.TP
\fBlog flood\fR = true, \fBalert on flood\fR = true, \fBmod on flood\fR = true
Log/launch script/call module if have too many arp request per seconds
.TP
\fBlog expire mac address\fR = true, \fBalert on expire mac address\fR = true, \fBmod on expire mac address\fR = true
Log/launch script/call module if the ethernet mac address expire
.TP
\fBexpire authorized mac addresses\fR = true
Allow authorized mac addresses to expire
.\"
.\" CONFIG FILE
.\"
.SH DATA FILES FORMATS
.TP
\fB/etc/arpalert/maclist.allow\fR and \fB/etc/arpalert/maclist.deny\fR:
All the line with # as a \fBfirst\fR caracter are ignored
.br
The data on this file take this form
.br
<MAC_ADRESS> <IP_ADDRESS> <DEVICE> [<FLAG> <FLAG> <FLAG> ...]
.br
The available flags are:
.br
\fBip_change:\fR Ignore ip change alert for this mac address
.br
\fBblack_listed:\fR Ignore black list alerts for this mac address
.br
\fBunauth_rq:\fR Ignore unauthorized requests for this mac address
.br
\fBrq_abus:\fR Ignore request abuse for this mac address
.br
\fBmac_error:\fR Ignore mac error for this mac address
.br
\fBmac_change:\fR Ignore mac change for this mac address
.br
\fBmac_expire:\fR Never expire this mac address. Useful if the option "expire authorized mac addresses" is used
.TP
\fB/etc/arpalert/authrq.conf\fR:
All the words after # character are ignored
.br
All the blank characters are ignored
.br
The authorisations list for one mac address begins by the mac address into brackets
.br
All the next values are ip hosts addresses or ip networks addresses (with /xx notion)
.br
[<MAC_ADRESS> <DEVICE>] <IP_ADRESS>
.br
<IP_ADRESS>/<BITS>
.br
.\"
.\" CONFIG FILE
.\"
.SH FILES
\fBsbin/arpalert\fR: binary file
.br
\fBetc/arpalert/arpalert.conf\fR: default config file
.br
\fBvar/run/arpalert.pid\fR: pid file
.br
\fBvar/state/arpalert.leases\fR: leases file
.br