feat(modules): Deploy fail2ban

This commit is contained in:
Tom Hubrecht 2023-11-28 20:29:25 +01:00
parent f3ab09fe4e
commit fa799c9dda
5 changed files with 101 additions and 2 deletions

View file

@ -4,6 +4,7 @@ lib.extra.mkConfig {
enabledModules = [ enabledModules = [
# List of modules to enable # List of modules to enable
"dgn-dns" "dgn-dns"
"dgn-fail2ban"
"dgn-web" "dgn-web"
]; ];
@ -22,5 +23,12 @@ lib.extra.mkConfig {
"zammad" "zammad"
]; ];
extraConfig = {
dgn-fail2ban.jails = lib.extra.enableAttrs' "enabled" [
"sshd-bruteforce"
"sshd-timeout"
];
};
root = ./.; root = ./.;
} }

View file

@ -40,6 +40,7 @@
"dgn-acme" "dgn-acme"
"dgn-console" "dgn-console"
"dgn-dns" "dgn-dns"
"dgn-fail2ban"
"dgn-hardware" "dgn-hardware"
"dgn-network" "dgn-network"
"dgn-secrets" "dgn-secrets"

View file

@ -50,7 +50,8 @@ in {
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
dgn-fail2ban.jails = builtins.mapAttrs (_: j: j // { enabled = mkDefault false; }) dgn-fail2ban.jails =
builtins.mapAttrs (_: j: j // { enabled = mkDefault false; })
(import ./jails.nix { }); (import ./jails.nix { });
services.fail2ban = { services.fail2ban = {
@ -60,7 +61,7 @@ in {
ignoreIP = [ ignoreIP = [
"10.0.0.0/8" "10.0.0.0/8"
"125.199.0.0/16" "129.199.0.0/16"
"172.16.0.0/12" "172.16.0.0/12"
"192.168.0.0/16" "192.168.0.0/16"
"100.64.0.0/10" "100.64.0.0/10"

View file

@ -0,0 +1,82 @@
# Copyright Tom Hubrecht, (2023)
#
# Tom Hubrecht <tom@hubrecht.ovh>
#
# This software is a computer program whose purpose is to configure
# machines and servers with NixOS.
#
# This software is governed by the CeCILL license under French law and
# abiding by the rules of distribution of free software. You can use,
# modify and/ or redistribute the software under the terms of the CeCILL
# license as circulated by CEA, CNRS and INRIA at the following URL
# "http://www.cecill.info".
#
# As a counterpart to the access to the source code and rights to copy,
# modify and redistribute granted by the license, users are provided only
# with a limited warranty and the software's author, the holder of the
# economic rights, and the successive licensors have only limited
# liability.
#
# In this respect, the user's attention is drawn to the risks associated
# with loading, using, modifying and/or developing or reproducing the
# software by the user in light of its specific status of free software,
# that may mean that it is complicated to manipulate, and that also
# therefore means that it is reserved for developers and experienced
# professionals having in-depth computer knowledge. Users are therefore
# encouraged to load and test the software's suitability as regards their
# requirements in conditions enabling the security of their systems and/or
# data to be ensured and, more generally, to use and operate it in the
# same conditions as regards security.
#
# The fact that you are presently reading this means that you have had
# knowledge of the CeCILL license and that you accept its terms.
_: {
nginx-spam = {
filter.Definition.failregex = ''
^<HOST>.*GET.*(matrix/server|\.php|admin|wp\-).* HTTP/\d.\d\" 404.*$'';
settings = {
logpath = "/var/log/nginx/access.log";
backend = "auto";
maxretry = 500;
findtime = 60;
};
};
postfix-bruteforce = {
filter.Definition = {
failregex = "warning: [\\w\\.\\-]+\\[<HOST>\\]: SASL LOGIN authentication failed.*$";
journalmatch = "_SYSTEMD_UNIT=postfix.service";
};
settings = {
findtime = 600;
maxretry = 1;
};
};
sshd-bruteforce = {
filter.Definition = {
failregex = "pam_unix\\(sshd:auth\\): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=<ADDR>.*$";
journalmatch = "_SYSTEMD_UNIT=sshd.service";
};
settings = {
findtime = 600;
maxretry = 1;
};
};
sshd-timeout = {
filter.Definition = {
failregex = "fatal: Timeout before authentication for <ADDR>.*$";
journalmatch = "_SYSTEMD_UNIT=sshd.service";
};
settings = {
findtime = 600;
maxretry = 1;
};
};
}

View file

@ -134,5 +134,12 @@
id = 252318; id = 252318;
hash = "sha256-lI5WYFlxKvava9e+eTI8ZGogIb3uPOLAWFrkxbSlCXI="; hash = "sha256-lI5WYFlxKvava9e+eTI8ZGogIb3uPOLAWFrkxbSlCXI=";
} }
# nixos/fail2ban: RFC42-ize
{
id = 201907;
hash = "sha256-bkf37QTFgbnSz3s8QPm5Z+6rWVVOlDtISTR7FACEwMM=";
excludes = [ "nixos/doc/manual/" ];
}
]; ];
} }