Feature Request For Centrally Handling All Authentication Failures

Proposal/FeatureRequest For Centrally Handling All Authentication Failures For Banning And/Or Executing A Script

Each AuthFailure should be sent to an AuthFailureSystem similar to the firewall, but much simpler:

add error-source=serviceId error-category=... error-code=... action=ban ban-duration=...
add error-source=serviceId error-category=... error-code=... action=exec-user-script script-name=... script-params="x $y z"
add error-source=serviceId error-category=... error-code=... action=hangup
...

Properties should have also:

  • releated-count: number of auth failures in this session

Should work the same for both MAC and IP (L2 and L3+). Ie. banning via srcMAC as well via srcIP should be possible.

Putting these rules under under a new root item “/security” would be very appropriate.

Of course user needs a list of the possible errors for all of the services like ssh, ftp, telnet, l2tp, pptp, vpn, …
For the user: no more parsing the logs via a lame script :slight_smile:

This new RouterOS (and SwOS) security feature could become industrywide the “Mother Of Internet Security (MOIS)” and boost MikroTik sales into the sky! :slight_smile:

Further related ideas/features to add into this concept welcome.

This is were Splunk or other Syslog tools does it work. I have added various view to show different types of error logs. See my signature.

But I agree that Splunk has a long way to clean up its logging system. Look at this post:
http://forum.mikrotik.com/t/logging-prefix-is-a-mess-sup-105353-sup-144261-waiting-for-mt-to-support-rfc-5424/111067/1
I have sent this to MT Support.

Yes, something built-in would be good to have. While some services are better kept private, something like VPN has to be publicly accessible (*) and botnets trying to break in are annoying.

(*) Some private VPN can be protected with port knocking, but explaning required additional steps to regular users could be nightmare.