Fail2Ban¶
Intrusion Prevention System.
Installation¶
sudo apt install fail2ban
Grundkonfiguration¶
sudo nano /etc/fail2ban/jail.local
[DEFAULT]
bantime = 3600
findtime = 600
maxretry = 3
backend = systemd
destemail = admin@example.com
sender = fail2ban@example.com
mta = sendmail
protocol = tcp
chain = INPUT
action = %(action_mwl)s
SSH-Jail¶
[sshd]
enabled = true
port = ssh
filter = sshd
logpath = /var/log/auth.log
maxretry = 3
bantime = 3600
Nginx-Jails¶
[nginx-http-auth]
enabled = true
filter = nginx-http-auth
logpath = /var/log/nginx/error.log
maxretry = 3
bantime = 3600
[nginx-limit-req]
enabled = true
filter = nginx-limit-req
logpath = /var/log/nginx/error.log
maxretry = 3
bantime = 3600
Postfix-Jails¶
[postfix]
enabled = true
filter = postfix
logpath = /var/log/mail.log
maxretry = 5
bantime = 3600
[sasl]
enabled = true
filter = postfix-sasl
logpath = /var/log/mail.log
maxretry = 3
bantime = 3600
Service starten¶
sudo systemctl restart fail2ban
sudo systemctl enable fail2ban
Status prüfen¶
sudo fail2ban-client status
sudo fail2ban-client status sshd
Zurück zur Sicherheits-Übersicht