HOWTO Setup fail2ban: Difference between revisions

From Research
Jump to navigation Jump to search
No edit summary
Line 7: Line 7:
So, the flexibility and integration with iptables is a major benefit.
So, the flexibility and integration with iptables is a major benefit.


emerge -v fail2ban
==Installing fail2ban==
emerge -v fail2ban
  emacs -nw /etc/fail2ban/jail.conf
  emacs -nw /etc/fail2ban/jail.conf


==Configuring fail2ban==
scroll to section "[ssh-iptables]" and enable it and find the line that says:
scroll to section "[ssh-iptables]" and enable it and find the line that says:


Line 23: Line 25:
Comment out the "mail-whois" actions.
Comment out the "mail-whois" actions.


==Running fail2ban==
  root@hostname ~
  root@hostname ~
  # /etc/init.d/fail2ban start
  # /etc/init.d/fail2ban start
Line 31: Line 34:
  * fail2ban added to runlevel default
  * fail2ban added to runlevel default


==Monitoring and Verifying fail2ban==
Check the log file:
Check the log file:
  # tail /var/log/fail2ban.log
  # tail /var/log/fail2ban.log

Revision as of 18:32, 22 January 2008

What fail2ban does

Fail2ban parses logfiles, and finds repeated-failures for various services. Once a specified number of failures within a given time is reached, the fail2ban makes an iptables-entry for you, banning (blocking) that IP-address. After a configurable length of time, the IP-address is unblocked.

Why we want fail2ban

One alternative is denyhosts, which requires tcpwrappers, and makes entries in your /etc/hosts.deny file. The problem is that regular-expressions are not supplied to filter more than SSH, and denyhosts can only scan a single log-file. One advantage of denyhosts is that it doesn't require iptables.
Our Gentoo systems use syslog-ng, with separate (from /var/log/messages) SSH auth.log file. Often, we supply vsftpd connectivity for users, which uses another separate log-file. We may also add other services.
So, the flexibility and integration with iptables is a major benefit.

Installing fail2ban

emerge -v fail2ban
emacs -nw /etc/fail2ban/jail.conf

Configuring fail2ban

scroll to section "[ssh-iptables]" and enable it and find the line that says:

logpath = /var/log/sshd.log

and change it to (Gentoo):

logpath = /var/log/auth.log
###backend = auto
backend = gamin

Comment out the "mail-whois" actions.

Running fail2ban

root@hostname ~
# /etc/init.d/fail2ban start
* Starting fail2ban
root@hostname ~
# rc-update add fail2ban default
* fail2ban added to runlevel default

Monitoring and Verifying fail2ban

Check the log file:

# tail /var/log/fail2ban.log

and

# tail -f /var/log/fail2ban.log

Check Iptables:

# iptables -L

Example output, for a web-server (port 80 open), with SSH and FTP services too:

Chain INPUT (policy DROP)
target     prot opt source               destination         
fail2ban-VSFTPD  tcp  --  anywhere             anywhere            tcp dpt:ftp 
fail2ban-SSH  tcp  --  anywhere             anywhere            tcp dpt:ssh 
ACCEPT     all  --  anywhere             anywhere            
DROP       all  --  anywhere             anywhere            state INVALID 
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
ACCEPT     tcp  --  anywhere             anywhere            state NEW tcp dpt:ftp-data 
ACCEPT     tcp  --  anywhere             anywhere            state NEW tcp dpt:ftp 
ACCEPT     tcp  --  anywhere             anywhere            state NEW tcp dpt:ssh 
ACCEPT     tcp  --  anywhere             anywhere            state NEW tcp dpt:http

Chain FORWARD (policy DROP)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 

Chain fail2ban-SSH (1 references)
target     prot opt source               destination         
DROP       all  --  sr-01504.iat.sfu.ca  anywhere            
RETURN     all  --  anywhere             anywhere            

Chain fail2ban-VSFTPD (1 references)
target     prot opt source               destination         
RETURN     all  --  anywhere             anywhere