Fail2ban: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
mNo edit summary |
||
| Line 1: | Line 1: | ||
=== | === Installing === | ||
{{ | {{Root|emerge fail2ban}} | ||
{{ | {{Root|/etc/init.d/iptables save}} | ||
{{ | {{Root|rc-update add iptables default}} | ||
{{ | {{Root|rc-update add fail2ban default}} | ||
{{Kernel|Kernel .config| | {{Kernel|Kernel .config| | ||
| Line 31: | Line 25: | ||
}} | }} | ||
{{File|/etc/ssh/sshd_config| | |||
{{ | |||
<pre> | <pre> | ||
SyslogFacility AUTH | SyslogFacility AUTH | ||
| Line 39: | Line 32: | ||
}} | }} | ||
{{File|/etc/syslog-ng/syslog-ng.conf| | |||
{{ | |||
<pre> | <pre> | ||
destination authlog { file("/var/log/auth.log"); }; | destination authlog { file("/var/log/auth.log"); }; | ||
| Line 51: | Line 43: | ||
}} | }} | ||
{{ | {{Root|touch /var/log/auth.log}} | ||
{{ | {{Root|chmod 600 /var/log/auth.log}} | ||
{{ | {{Root|/etc/init.d/syslog-ng restart}} | ||
{{ | {{File|/etc/fail2ban.conf| | ||
<pre> | <pre> | ||
maxfailures = 3 | maxfailures = 3 | ||
| Line 76: | Line 68: | ||
=== fail2ban installieren === | === fail2ban installieren === | ||
{{ | {{Root|emerge fail2ban}} | ||
{{ | {{Root|/etc/init.d/iptables save}} | ||
{{ | {{Root|rc-update add iptables default}} | ||
{{ | {{Root|rc-update add fail2ban default}} | ||
{{ | {{Kernel|Kernel .config| | ||
<pre> | <pre> | ||
Networking | Networking | ||
| Line 107: | Line 93: | ||
}} | }} | ||
{{File|/etc/ssh/sshd_config| | |||
{{ | |||
<pre> | <pre> | ||
SyslogFacility AUTH | SyslogFacility AUTH | ||
| Line 115: | Line 100: | ||
}} | }} | ||
{{File|/etc/syslog-ng/syslog-ng.conf| | |||
{{ | |||
<pre> | <pre> | ||
destination authlog { file("/var/log/sshd.log"); }; | destination authlog { file("/var/log/sshd.log"); }; | ||
| Line 127: | Line 111: | ||
}} | }} | ||
{{ | {{Root|touch /var/log/sshd.log}} | ||
{{ | {{Root|chmod 600 /var/log/sshd.log}} | ||
{{Root|/etc/init.d/syslog-ng restart}} | |||
{{ | {{File|/etc/fail2ban/jail.conf| | ||
<pre> | <pre> | ||
[ssh-iptables] | [ssh-iptables] | ||
| Line 149: | Line 132: | ||
}} | }} | ||
{{ | {{Root|/etc/init.d/fail2ban start}} | ||
[[Kategorie:Programme]] | [[Kategorie:Programme]] | ||
Revision as of 17:53, 13 January 2011
Installing
# emerge fail2ban
# /etc/init.d/iptables save
# rc-update add iptables default
# rc-update add fail2ban default
| Linux Kernel Configuration: Kernel .config |
Networking Networking options ---> [*] Network packet filtering (replaces ipchains) ---> Core Netfilter Configuration ---> <*> Netfilter Xtables support (required for ip_tables) IP: Netfilter Configuration ---> <*> IP tables support (required for filtering/masq/NAT) optional noch: IPv6: Netfilter Configuration (EXPERIMENTAL) ---> <*> IP6 tables support (required for filtering/masq/NAT) |
File: /etc/ssh/sshd_config
SyslogFacility AUTH LogLevel INFO
File: /etc/syslog-ng/syslog-ng.conf
destination authlog { file("/var/log/auth.log"); };
filter f_authpriv { facility(auth, authpriv); };
filter f_failed { match("failed"); };
filter f_denied { match("denied"); };
log { source(src); filter(f_authpriv); destination(authlog); };
# touch /var/log/auth.log
# chmod 600 /var/log/auth.log
# /etc/init.d/syslog-ng restart
File: /etc/fail2ban.conf
maxfailures = 3 [MAIL] enabled = true host = mailrelay/localhost to = logs@domain.de [SSH] enabled = true logfile = /var/log/auth.log
fail2ban installieren
# emerge fail2ban
# /etc/init.d/iptables save
# rc-update add iptables default
# rc-update add fail2ban default
| Linux Kernel Configuration: Kernel .config |
Networking Networking options ---> [*] Network packet filtering (replaces ipchains) ---> Core Netfilter Configuration ---> <*> Netfilter Xtables support (required for ip_tables) IP: Netfilter Configuration ---> <*> IP tables support (required for filtering/masq/NAT) optional noch: IPv6: Netfilter Configuration (EXPERIMENTAL) ---> <*> IP6 tables support (required for filtering/masq/NAT) |
File: /etc/ssh/sshd_config
SyslogFacility AUTH LogLevel INFO
File: /etc/syslog-ng/syslog-ng.conf
destination authlog { file("/var/log/sshd.log"); };
filter f_authpriv { facility(auth, authpriv); };
filter f_failed { match("failed"); };
filter f_denied { match("denied"); };
log { source(src); filter(f_authpriv); destination(authlog); };
# touch /var/log/sshd.log
# chmod 600 /var/log/sshd.log
# /etc/init.d/syslog-ng restart
File: /etc/fail2ban/jail.conf
[ssh-iptables]
enabled = true
filter = sshd
action = iptables[name=SSH, port=ssh, protocol=tcp]
mail-whois[name=SSH, dest=yourmail@mail.com]
logpath = /var/log/sshd.log
maxretry = 3
bantime = 600
# /etc/init.d/fail2ban start