1
1
mirror of https://gitlab.archlinux.org/archlinux/infrastructure.git synced 2025-01-18 08:06:16 +01:00
infrastructure/docs/fail2ban.md
Giancarlo Razzolini 871898d340
docs/fail2ban: Remove mentions of apollo and orion
Removed any mentions of apollo and also orion, since it was decommissioned a long
time ago.
2020-12-29 07:17:41 -03:00

1.1 KiB

fail2ban

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks.

By default all our servers playbook should include the fail2ban role which enables the sshd jail by default through groups_vars. The default /etc/fail2ban/jail.local configuration whitelists all the servers in hosts, take note that when adding a new postfix relayhost the fail2ban role has to be run on the postfix server to update the whitelist.

Jails

Fail2ban can provide multiple jails for different services, to check the status of for example the sshd jail:

fail2ban-client status sshd

To unblock an IP Address:

fail2ban-client set sshd unbanip 8.8.8.8

sshd

The sshd jail should be enabled for every host we have, to block brute force ssh attacks.

postfix

The postfix jail not enabled on any server. Adding it to a host:

Add fail2ban_jails dict with postfix: true to the host's host_vars.

dovecot

The dovecot jail is enabled for our mail server, blocking failed logins. Adding it to a host:

Add fail2ban_jails dict with dovecot: true to the host's host_vars.