Fail2ban: diferència entre les revisions

De WikiMar
Salta a la navegació Salta a la cerca
Cap resum de modificació
Línia 1: Línia 1:
==Install common==
After installing fail2ban configure:
cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
vi /etc/fail2ban/jail.local
Add: "enable=true" under each of the services installed. SSH, Apache, Nginx, Vsftp, etc.
Add the ,23 besides the ssh port for the ssh. See section below.
==Install Fail2ban on Ubuntu==
==Install Fail2ban on Ubuntu==
  apt-get install fail2ban
  apt-get install fail2ban
Línia 29: Línia 40:
             ^%(__prefix_line)sDid not receive identification string from <HOST>\s*$
             ^%(__prefix_line)sDid not receive identification string from <HOST>\s*$
</pre>
</pre>
Add the ,23 besides the ssh port in the /etc/fail2ban/jail.local
[sshd]
port    = ssh,23


https://github.com/fail2ban/fail2ban/issues/1284
https://github.com/fail2ban/fail2ban/issues/1284

Revisió del 01:03, 1 abr 2016

Install common

After installing fail2ban configure:

cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
vi /etc/fail2ban/jail.local

Add: "enable=true" under each of the services installed. SSH, Apache, Nginx, Vsftp, etc.

Add the ,23 besides the ssh port for the ssh. See section below.


Install Fail2ban on Ubuntu

apt-get install fail2ban
sudo service fail2ban restart
sudo update-rc.d fail2ban enable


Install Fail2ban on CentOS/Fedora

Instead of installing with yum install fail2ban, use:

yum install fail2ban-server fail2ban-systemd
systemctl enable fail2ban
systemctl restart fail2ban

The packet fail2ban also installs the Firewalld, which blocks by default all traffic after restarting the server.


Info: http://pkgs.org/centos-7/puias-unsupported-x86_64/fail2ban-server-0.9.2-1.sdl7.noarch.rpm.html

Enable mail

 yum install fail2ban-sendmail

Fail2ban when ssh in telnet port

This are no failures in sense of authentication (because login does not take place).

But if you will that yet, just copy /etc/fail2ban/filter.d/sshd.conf into /etc/fail2ban/filter.d/sshd.local and add following to the failregex:

            ^%(__prefix_line)sBad protocol version identification '.*' from <HOST> port \d+\s*$
            ^%(__prefix_line)sDid not receive identification string from <HOST>\s*$


Add the ,23 besides the ssh port in the /etc/fail2ban/jail.local

[sshd]
port    = ssh,23


https://github.com/fail2ban/fail2ban/issues/1284