Create 20th Feb. 2013
By Eiji Hamano
1. Dwonload fail2ban-sdist-0.8.5.tar.gz
url is https://github.com/fail2ban/fail2ban/tags
Crick "tar.gz" of "September 24, 2011 sdist/0.8.5".
like as
2. Recompress and Compile
Upload "fail2ban-sdist-0.8.5.tar.gz" to /tmp directry.
Then do following ;
> mkdir /usr/share/fail2ban
> cd /tmp ;
> mv fail2ban-sdist-0.8.5.tar.gz /usr/share/fail2ban/
> cd /usr/share/fail2ban/
> tar -zxvPpf fail2ban-sdist-0.8.5.tar.gz
> cd fail2ban-sdist-0.8.5/
> ./setup.py install
If you success, the message come as;
>> Please do not forget to update your configuration files.
>> They are in /etc/fail2ban/.
So, let's define the fail2ban!
> cd /etc/fail2ban
> cp jail.conf jail.conf@org ## backup original
Modify "jail.conf" or you can upload a completely new one.
But you must modify "dest=you@example.com" fields.
--------------- new "jail.conf" start --------------------------------
[DEFAULT]
# "bantime" is the number of seconds that a host is banned.
# "findtime" is ; A host is banned if it has generated "maxretry"
# during the last "findtime" seconds.
ignoreip = 127.0.0.1/8
bantime = 600
findtime = 600
maxretry = 3
backend = auto
[ssh-iptables]
enabled = true
filter = sshd
action = iptables[name=SSH, port=ssh, protocol=tcp]
sendmail-whois[name=SSH, dest=you@example.com, sender=fail2ban ]
logpath = /var/log/secure
maxretry = 4
bantime = 10800
findtime = 600
[proftpd-iptables]
enabled = true
filter = proftpd
action = iptables[name=ProFTPD, port=ftp, protocol=tcp]
sendmail-whois[name=ProFTPD, dest=you@example.com, sender=fail2ban ]
logpath = /var/log/secure
maxretry = 5
bantime = 1800
findtime = 600
[dovecot]
enabled = true
filter = dovecot
action = iptables-multiport[name=DOVECOT, port="imap,imaps,pop3,pop3s", protocol=tcp]
sendmail-whois[name=DOVECOT, dest=you@example.com, sender=fail2ban ]
logpath = /var/log/secure
maxretry = 5
bantime = 1800
findtime = 600
--------------- new "jail.conf" enf --------------------------------
3. Go
Then you can start fail2ban!!
> /usr/bin/fail2ban-client start
And if you want to stop
> /usr/bin/fail2ban-client stop
Probably you must be surprised by receiving emails from fail2ban.
The emails will tell you many attacks out of your machine.
4. More
In this case, we did not modify "filters" of fail2ban.
The filters reside on /etc/fail2ban/filter.d/xxxx.conf.
Followings are filters of this case.
/etc/fail2ban/filter.d/sshd.conf
/etc/fail2ban/filter.d/proftpd.conf
/etc/fail2ban/filter.d/dovecot.conf
In this case, we used original filters.
If you want to perform Fail2ban more precisely,
you might have to make [BlueOnyx:00596] to reference.
But I'm not sure, it's too old. Jeff might tell you advice.
@
FIN
|