New packages: - secubox-threat-analyst: AI-powered threat analysis with CrowdSec integration - luci-app-threat-analyst: LuCI dashboard for threat intelligence - secubox-dns-guard: DNS security monitoring and blocking - secubox-mcp-server: Model Context Protocol server for AI assistant integration Enhancements: - dns-provider: Add DynDNS support (dyndns, get, update, domains commands) - gandi.sh: Full DynDNS with WAN IP detection and record updates - luci-app-dnsguard: Upgrade to v1.1.0 with improved dashboard Infrastructure: - BIND9 DNS setup for secubox.in with CAA records - Wildcard SSL certificates via DNS-01 challenge - HAProxy config fixes for secubox.in subdomains - Mail server setup with Roundcube webmail Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
56 lines
1.6 KiB
Plaintext
56 lines
1.6 KiB
Plaintext
config threat-analyst 'main'
|
|
option enabled '1'
|
|
option interval '300'
|
|
option localai_url 'http://127.0.0.1:8081'
|
|
option localai_model 'tinyllama-1.1b-chat-v1.0.Q4_K_M'
|
|
|
|
# Auto-apply generated rules (0=queue for approval, 1=auto-apply)
|
|
option auto_apply_mitmproxy '1'
|
|
option auto_apply_crowdsec '0'
|
|
option auto_apply_waf '0'
|
|
|
|
# Minimum confidence score (0-100) to generate rules
|
|
option min_confidence '70'
|
|
|
|
# Maximum rules to generate per cycle
|
|
option max_rules_per_cycle '5'
|
|
|
|
# Data sources to monitor
|
|
config source 'crowdsec'
|
|
option enabled '1'
|
|
option type 'crowdsec'
|
|
option path '/var/log/crowdsec.log'
|
|
|
|
config source 'mitmproxy'
|
|
option enabled '1'
|
|
option type 'mitmproxy'
|
|
option path '/srv/mitmproxy/threats.log'
|
|
|
|
config source 'netifyd'
|
|
option enabled '1'
|
|
option type 'netifyd'
|
|
option path '/var/run/netifyd/status.json'
|
|
|
|
# Output targets for generated rules
|
|
config target 'mitmproxy_filters'
|
|
option enabled '1'
|
|
option type 'mitmproxy'
|
|
option output_path '/etc/mitmproxy/ai_filters.py'
|
|
option reload_cmd '/etc/init.d/mitmproxy reload'
|
|
|
|
config target 'crowdsec_scenarios'
|
|
option enabled '1'
|
|
option type 'crowdsec'
|
|
option output_path '/etc/crowdsec/scenarios/ai-generated.yaml'
|
|
option reload_cmd 'cscli hub update && cscli scenarios install /etc/crowdsec/scenarios/ai-generated.yaml --force'
|
|
|
|
config target 'waf_rules'
|
|
option enabled '1'
|
|
option type 'waf'
|
|
option output_path '/etc/mitmproxy/waf_ai_rules.json'
|
|
option reload_cmd '/etc/init.d/mitmproxy reload'
|
|
|
|
# Queue for pending rules (approval workflow)
|
|
config queue 'pending'
|
|
option path '/var/lib/threat-analyst/pending_rules.json'
|