add fail2ban scripts

This commit is contained in:
RaineAllDay
2026-03-18 04:22:42 -06:00
parent 968fd69eb1
commit c3d9c52129
4 changed files with 115 additions and 1 deletions

View File

@@ -0,0 +1,52 @@
# /etc/fail2ban/jail.d/etc-prs.conf
# Fail2ban configuration for ETC PRS server
#
# Install:
# sudo cp scripts/fail2ban/nginx-scan.conf /etc/fail2ban/filter.d/nginx-scan.conf
# sudo cp scripts/fail2ban/etc-prs.conf /etc/fail2ban/jail.d/etc-prs.conf
# sudo systemctl restart fail2ban
# sudo fail2ban-client status nginx-scan
[DEFAULT]
# Ban IPs using UFW (already configured on this server)
banaction = ufw
[nginx-scan]
enabled = true
port = http,https
filter = nginx-scan
logpath = /var/log/nginx/access.log
# Ban if 20 errors in 60 seconds
maxretry = 20
findtime = 60
# Ban for 1 hour
bantime = 3600
[nginx-badbots]
enabled = true
port = http,https
filter = nginx-badbots
logpath = /var/log/nginx/access.log
maxretry = 2
findtime = 86400
bantime = 86400
[nginx-noscript]
enabled = true
port = http,https
filter = nginx-noscript
logpath = /var/log/nginx/access.log
maxretry = 6
findtime = 60
bantime = 3600
[sshd]
enabled = true
port = ssh
filter = sshd
logpath = /var/log/auth.log
maxretry = 5
findtime = 60
bantime = 3600

View File

@@ -0,0 +1,54 @@
#!/usr/bin/env bash
# =============================================================================
# ETC PRS — Install & configure fail2ban
# Usage: sudo bash scripts/fail2ban/install.sh
# =============================================================================
set -euo pipefail
RED='\033[0;31m'; GREEN='\033[0;32m'; CYAN='\033[0;36m'; BOLD='\033[1m'; RESET='\033[0m'
info() { echo -e "${CYAN}$*${RESET}"; }
success() { echo -e "${GREEN}$*${RESET}"; }
error() { echo -e "${RED}$*${RESET}"; exit 1; }
[[ $EUID -ne 0 ]] && error "Run as root: sudo bash scripts/fail2ban/install.sh"
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
# ── Install fail2ban ──────────────────────────────────────────────────────────
info "Installing fail2ban…"
apt-get install -y -qq fail2ban
# ── Copy filter and jail config ───────────────────────────────────────────────
info "Installing filter: nginx-scan…"
cp "$SCRIPT_DIR/nginx-scan.conf" /etc/fail2ban/filter.d/nginx-scan.conf
info "Installing jail config…"
cp "$SCRIPT_DIR/etc-prs.conf" /etc/fail2ban/jail.d/etc-prs.conf
# ── Ensure Nginx is logging in combined format ────────────────────────────────
# fail2ban reads /var/log/nginx/access.log — verify it exists
if [[ ! -f /var/log/nginx/access.log ]]; then
error "Nginx access log not found at /var/log/nginx/access.log — is Nginx running?"
fi
success "Nginx access log found"
# ── Enable and restart fail2ban ───────────────────────────────────────────────
info "Enabling fail2ban service…"
systemctl enable fail2ban
systemctl restart fail2ban
sleep 2
# ── Verify ────────────────────────────────────────────────────────────────────
success "fail2ban installed and running"
echo ""
echo -e "${BOLD}Active jails:${RESET}"
fail2ban-client status
echo ""
echo -e "${BOLD}Useful commands:${RESET}"
echo -e " ${CYAN}sudo fail2ban-client status nginx-scan${RESET} — show banned IPs"
echo -e " ${CYAN}sudo fail2ban-client set nginx-scan unbanip <IP>${RESET} — unban an IP"
echo -e " ${CYAN}sudo tail -f /var/log/fail2ban.log${RESET} — live ban log"
echo ""

View File

@@ -0,0 +1,8 @@
[Definition]
# Match lines from nginx access log with 4xx/5xx responses
# Nginx combined log format:
# 1.2.3.4 - - [18/Mar/2026:09:45:00 +0000] "GET /backend/config/default.yml HTTP/1.1" 404 ...
failregex = ^<HOST> .+ "(GET|POST|HEAD|PUT|DELETE|OPTIONS|PATCH) .+ HTTP/\d\.\d" 40[0-9] .+$
^<HOST> .+ "(GET|POST|HEAD|PUT|DELETE|OPTIONS|PATCH) .+ HTTP/\d\.\d" 5[0-9]{2} .+$
ignoreregex =

View File

@@ -644,4 +644,4 @@
{/each} {/each}
</div> </div>
{/if} {/if}
</div> </div>