- Change analytics addon to write threats to /data/threats.log (bind-mounted to host) - Add CrowdSec acquisition config to read from /srv/mitmproxy/threats.log - Add parser for mitmproxy JSON threat logs with source_ip in Meta - Add scenarios for web attacks, scanners, SSRF, and CVE exploits - Update RPCD to read alerts from host-visible path without lxc-attach This enables automatic IP banning when mitmproxy detects: - SQL injection, XSS, command injection (capacity: 3, ban: 15m) - Path traversal, XXE, LDAP injection, Log4Shell - Aggressive web scanning (capacity: 10, ban: 10m) - SSRF attempts from external IPs (capacity: 5, ban: 10m) - Known CVE exploits (immediate trigger, ban: 30m) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
11 lines
342 B
YAML
11 lines
342 B
YAML
# CrowdSec acquisition for mitmproxy threat logs
|
|
# Monitors threats detected by SecuBox mitmproxy analytics addon
|
|
# The analytics addon runs inside LXC container and writes to /data/threats.log
|
|
# which is bind-mounted to /srv/mitmproxy/threats.log on the host
|
|
|
|
source: file
|
|
filenames:
|
|
- /srv/mitmproxy/threats.log
|
|
labels:
|
|
type: mitmproxy
|