Hello friends, Today we will see how to protect your server using Fail2ban.

Introduction

When we connect to our server through SSH, then there is a risk of compromising our server ,since SSH itself is a service that is exposed to internet . If you pay attention to application logs for these services, you will often see repeated, systematic login attempts that represent brute force attacks by users and bots alike. So, Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks.

Installation

Use apt to install the package, apt-get update

apt-get install fail2ban

Configure Fail2ban

Default Fail2ban configuration file is jail.conf(inside /etc/fail2ban), but this file is modified by package updates , so we won’t change this file instead we will create its copy as jail.local (within the same directory) and then modify that file.

Few important blocks inside jail.local :

[DEFAULT]

ignoreip = 127.0.0.1/8
bantime  = 600
findtime = 600
maxretry = 3
destemail = root@localhost
sendername = Fail2Ban
mta = sendmail
action = $(action_)s

The ignoreip setting configures the source addresses that fail2ban ignores. By default, it is configured to not ban any traffic coming from the local machine. You could add additional addresses to ignore by adding a [DEFAULT] section with an ignoreip setting under it to the jail.local file. You can add additional addresses by appending them to the end of the directive, separated by a space.

The bantime parameter sets length of time that a client will be banned when they have failed to authenticate correctly. This is measured in seconds. By default, this is set to 600 seconds, or 10 minutes.

The next two parameters that you want to pay attention to are findtime and maxretry. These work together to establish the conditions under which a client is found to be an illegitimate user that should be banned.

The maxretry variable sets the number of tries a client has to authenticate within a window of time defined by findtime, before being banned. With the default settings, the fail2ban service will ban a client that unsuccessfully attempts to log in 3 times within a 10 minute window.

You will want to evaluate the destemail, sendername, and mta settings if you wish to configure email alerts. The destemail parameter sets the email address that should receive ban messages. The sendername sets the value of the “From” field in the email. The mta parameter configures what mail service will be used to send mail.

This parameter configures the action that fail2ban takes when it wants to institute a ban. The value action_ is defined in the file shortly before this parameter. The default action is to simply configure the firewall to reject traffic from the offending host until the ban time elapses.

If you would like to configure email alerts, add or uncomment the action item to the jail.local file and change its value from action_ to action_mw. If you want the email to include the relevant log lines, you can change it to action_mwl. Make sure you have the appropriate mail settings configured if you choose to use mail alerts.

Individual Jail Settings

Each of these sections can be enabled by uncommenting the header in jail.local and changing the enabled line to be "true":
[jail_to_enable]
. . .
enabled = true
. . .

For eg:

Look, for the SSH service , It is by defalut enabled, here we can set the port (our SSH port). If you want to override any values, you can do so by adding the appropriate service’s section to jail.local and modifying its values.

Some other settings that are set here are the filter that will be used to decide whether a line in a log indicates a failed authentication and the logpath which tells fail2ban where the logs for that particular service are located.

The filter value is actually a reference to a file located in the /etc/fail2ban/filter.d directory, with its .conf extension removed. These files contain the regular expressions that determine whether a line in the log is a failed authentication attempt .

If you want to use , other that iptables firewall, like UFW , then change banaction(inside ssh block) from iptables-multiport to ufw-ssh.

You then configure fail2ban to use ufw in (one .conf file for each service)

/etc/fail2ban/action.d/ufw-ssh.conf

And the syntax is:

[Definition]
actionstart =
actionstop =
actioncheck =
actionban = ufw insert 1 deny from <ip> to any app OpenSSH
actionunban = ufw delete deny from <ip> to any app OpenSSH

Note: You configure fail2ban to use ufw and to insert new rules FIRST using the “insert 1” syntax. The delete will find the rule regardless of order.

You can check your UFW firewall status using ufw status numbered

Lets look into another example: For instance, pretend that we are serving a website using Nginx and realize that a password-protected portion of our site is getting slammed with login attempts. We can tell fail2ban to use the nginx-http-auth.conf file to check for this condition within the /var/log/nginx/error.log file.

This is actually already set up in a section called [nginx-http-auth] in our /etc/fail2ban/jail.local file. We would just need to uncomment the section in the jail.local file and flip the enabled parameter to protect our service.

Now , Stop the fail2ban service for a moment so that we can establish a base firewall without the rules it adds.

Establish a Base Firewall

When this finished , we will now implement a default firewall(either UFW or iptables), in our case its iptables.

We’re going to tell it to allow established connections, traffic generated by the server itself, traffic destined for our SSH and web server ports. We will drop all other traffic. We can set this basic firewall up by typing:

sudo iptables -A INPUT -i lo -j ACCEPT sudo iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT sudo iptables -A INPUT -p tcp -m multiport --dports 80,443 -j ACCEPT sudo iptables -A INPUT -j DROP

These commands will implement the above policy. We can see our current firewall rules by typing:

sudo iptables -S

You can save the firewalls so that they survive a reboot by typing:

sudo dpkg-reconfigure iptables-persistent

Afterwards, you can restart fail2ban to implement the wrapping rules:

sudo service fail2ban start

Testing the Banning Policies

Try to SSH into fail2ban server , with non-existent user name .

For Eg.

ssh blah@fail2ban_server_IP

Now from another server , ssh into the fail2ban server, and look for the new banned ip inside iptables using :

sudo iptables -S

You will see inside the output, somewhat like:

-A fail2ban-ssh -s 203.0.113.14/32 -j REJECT --reject-with icmp-port-unreachable

This is all for fail2ban. Fail2ban is very easy to set up, and is a great way to protect any kind of service that uses authentication.