Interesting.

I decided to check out your website, so I went to rohms.com, but there is 
nothing there.

Wayne Sallee
wa...@waynesallee.com
http://www.WayneSallee.com


-------- Original Message --------
*Subject: *  [Fail2ban-users] Fwd: Re: When to decide that fail2ban is not a 
good solution
*From: *     Mike <t...@rohms.com>
*To: *         Fail2ban-users <fail2ban-users@lists.sourceforge.net>
*CC: *
*Date: *      2019-9-23  12:50 PM

I'm working on a system that I hope to share with users of this mailing list soon.   What I've done is create an iptables top level blacklist, a special ipset list that sits underneath fail2ban. I've used this system to block 90% of the hack/probe attempts.

This is not new.  Other people here have been doing this as well, but the difference is I'm trying to create the smallest blacklist possible - not using a GEO-IP database which may have tens of thousands of IP addresses.  I've been going over my logs identifying the largest blocks where attacks are coming from and compiling my own list.

Using iptables and ipset, I create a blacklist of Class A and Class B IP address space - in my case, my servers are in the USA.  I don't have any clients overseas that need to login to my systems.  So I create an IPTABLES command that blocks all ports open to login: 20,21,22,110,143,587,989,990,993,994,995,4190,3659, and I apply an IPSET blocklist to that to log and then drop packets originating from a small set of class A/B IP space.   My blacklist basically limits the lion's share of IP space in China, Korea, Indonesia, Russia, Africa, Brasil, and various other areas.   I also choose to block cloud hosting providers that I don't do business with that are known to host a lot of compromised servers, such as Digital Ocean, OVH, and others.

The end result is that fail2ban has a LOT less work to do.  I filter out the big blocks and leave it to do the rest.  Server memory usage is much less and the systems run even better.

If anybody is interested in my code, let me know - I'm still working on it but plan to put it up on Github to share.  It will consist of a set of shell scripts to set iptables, and then another set of shell scripts to add different regions, ISPs, etc., to the blacklist.

What's cool about this blacklist, is it doesn't interfere with mail.  It just restricts ports where people can login.  If you disable smtp auth on port 25, you can shield your system from the lion's share of login attacks.

If anybody wants a list of my blocked netspace, let me know. Right now I have 1075 entries in ipset, only using 10k of memory.  And it stops 90+% of my system probes.

- Mike



If you have thousands of blocked IP address, fail2ban's ipset action is 
desirable.

Some attacks initiate tens of connections at the same time so that although 
fail2ban
bans the address, your system has to handle all of them because they have 
already
connected.�  You can mitigate this by limiting the number of connections within 
a
certain time frame.�  Look into iptable's rate limiting.
ACCEPT .... multiport dports 25,465,587 limit: up to 10/min burst 4 mode srcip 
/* mail - unknown */
followed by a DROP of those ports.

Another approach is to limit the addresses allowed to connect with iptable's 
GeoIP.
For example, only allow SSH connects from your country.�  Or conversely, drop 
all traffic
from known bad countries.

You could block one or more entire subnets (93.184.216.0/24) in iptables.


_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users



_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to