Re: [ubuntu-uk] fail2ban custom iptables rules

2010-06-10 Thread Chris Rowson
 Hi Chris,

 It certainly is. Attached are samples of my iptables-restore and fail2ban
 configs for hardy-based servers.

Hi Tyler,

Thanks for taking the time to share your config, I really appreciate it! :-)

Thanks,

Chris

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.ubuntu.com/UKTeam/


[ubuntu-uk] fail2ban custom iptables rules

2010-06-09 Thread Chris Rowson
Hi folks,

I've been experimenting with using fail2ban to protect Internet facing servers.

I was wondering if it is possible to implement your own iptables rules
alongside fail2ban. For instance, I'd probably want to set up an
iptables rule that drops any inbound traffic not going to ICMP, HTTP,
HTTPS or SSH.

Does anyone know if it's possible to use your own rules alongside fail2ban?

Cheers,

Chris

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.ubuntu.com/UKTeam/


Re: [ubuntu-uk] fail2ban custom iptables rules

2010-06-09 Thread Tyler J. Wagner
Hi Chris,

It certainly is. Attached are samples of my iptables-restore and fail2ban  
configs for hardy-based servers. My iptables config creates the fail2ban-ssh 
chain, so I've changed the iptables-multiport fail2ban action so that it 
doesn't. And I prefer that fail2ban only block NEW ssh sessions, not all 
existing, when it blocks an IP (good when I'm logged in and another staff 
person screws up logging in 5 times).

Regards,
Tyler

On Wednesday 09 June 2010 23:57:47 Chris Rowson wrote:
 Hi folks,
 
 I've been experimenting with using fail2ban to protect Internet facing
  servers.
 
 I was wondering if it is possible to implement your own iptables rules
 alongside fail2ban. For instance, I'd probably want to set up an
 iptables rule that drops any inbound traffic not going to ICMP, HTTP,
 HTTPS or SSH.
 
 Does anyone know if it's possible to use your own rules alongside fail2ban?
 
 Cheers,
 
 Chris
 
-- 
Political language - and with variations this is true of all political
parties, from Conservatives to Anarchists - is designed to make lies
sound truthful and murder respectable, and to give an appearance of
solidity to pure wind.
   -- George Orwell
# Fail2Ban configuration file
#
# 2008-07-31 tyler - modified for Talia use.
#   Talia firewalls already have fail2ban chains and call them in the
#   appropriate order.

[Definition]

# Option:  actionstart
# Notes.:  command executed once at the start of Fail2Ban.
# Values:  CMD
#
#   not needed because our local firewall setup ensures chain exists
#actionstart = iptables -A fail2ban-name -j RETURN
actionstart = 

# Option:  actionstop
# Notes.:  command executed once at the end of Fail2Ban
# Values:  CMD
#
actionstop = iptables -F fail2ban-name

# Option:  actioncheck
# Notes.:  command executed once before each actionban command
# Values:  CMD
#not needed because our local firewall setup ensures sane environment
#
actioncheck = 

# Option:  actionban
# Notes.:  command executed when banning an IP. Take care that the
#  command is executed with Fail2Ban user rights.
# Tags:ip  IP address
#  failures  number of failures
#  time  unix timestamp of the ban time
# Values:  CMD
#
actionban = iptables -I fail2ban-name 1 -s ip -j DROP

# Option:  actionunban
# Notes.:  command executed when unbanning an IP. Take care that the
#  command is executed with Fail2Ban user rights.
# Tags:ip  IP address
#  failures  number of failures
#  time  unix timestamp of the ban time
# Values:  CMD
#
actionunban = iptables -D fail2ban-name -s ip -j DROP

[Init]

# Defaut name of the chain
#
name = default

# Option:  port
# Notes.:  specifies port to monitor
# Values:  [ NUM | STRING ]  Default:
#
port = ssh

# Option:  protocol
# Notes.:  internally used by config reader for interpolations.
# Values:  [ tcp | udp | icmp | all ] Default: tcp
#
protocol = tcp

# 2008-07-24 tyler - customised Fail2Ban jail configuration file
#
# Changes here override defaults in jail.conf.  However, that file
# may be replaced during upgrade.

[DEFAULT]
ignoreip = 127.0.0.1/8
bantime  = 600
maxretry = 6
banaction = iptables-multiport
protocol = tcp
action = %(action_)s

# All servers ban SSH.

[ssh]
enabled = true
port = ssh
filter = sshd
logpath = /var/log/auth.log


# Enable the following on public mail servers only.
# Covers both POP/IMAP and webmail cracking.
# For web mail failures

[pam-generic]
enabled = false
filter = pam-generic
port = http,https
logpath = /var/log/auth.log

[courierauth]
enabled = false
port = smtp,ssmtp,imap2,imap3,imaps,pop3,pop3s
filter = courierlogin
logpath = /var/log/mail.log
# Generated by hand
*filter
:FORWARD ACCEPT [0:0]
:INPUT DROP [0:0]
:OUTPUT ACCEPT [0:0]
:fail2ban-ssh - [0:0]
# Accept all loopback traffic
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp ! --syn -m state --state NEW -j DROP
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j fail2ban-ssh
-A INPUT -p tcp -m tcp -m multiport -j ACCEPT --dports 22,25,80,443,465,587,993,995
COMMIT
# Completed on Fri May 5 10:23:01 BST 2006
-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.ubuntu.com/UKTeam/