2012-05-17 04:51:24 +02:00
|
|
|
{ config, pkgs, ... }:
|
|
|
|
|
|
|
|
with pkgs.lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
|
2012-05-17 20:19:48 +02:00
|
|
|
cfg = config.services.fail2ban;
|
|
|
|
|
|
|
|
fail2banConf = pkgs.writeText "fail2ban.conf" cfg.daemonConfig;
|
2012-05-17 04:51:24 +02:00
|
|
|
|
|
|
|
jailConf = pkgs.writeText "jail.conf"
|
2012-05-17 20:19:48 +02:00
|
|
|
(concatStringsSep "\n" (attrValues (flip mapAttrs cfg.jails (name: def:
|
2013-10-15 18:36:45 +02:00
|
|
|
optionalString (def != "")
|
2012-05-17 20:19:48 +02:00
|
|
|
''
|
|
|
|
[${name}]
|
|
|
|
${def}
|
|
|
|
''))));
|
2012-05-17 04:51:24 +02:00
|
|
|
|
|
|
|
in
|
2012-05-17 20:19:48 +02:00
|
|
|
|
2012-05-17 04:51:24 +02:00
|
|
|
{
|
|
|
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
2012-05-17 20:19:48 +02:00
|
|
|
services.fail2ban = {
|
|
|
|
|
|
|
|
daemonConfig = mkOption {
|
|
|
|
default =
|
|
|
|
''
|
|
|
|
[Definition]
|
|
|
|
loglevel = 3
|
|
|
|
logtarget = SYSLOG
|
2013-10-15 18:36:45 +02:00
|
|
|
socket = /run/fail2ban/fail2ban.sock
|
|
|
|
pidfile = /run/fail2ban/fail2ban.pid
|
2012-05-17 20:19:48 +02:00
|
|
|
'';
|
|
|
|
type = types.string;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
The contents of Fail2ban's main configuration file. It's
|
|
|
|
generally not necessary to change it.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
jails = mkOption {
|
|
|
|
default = { };
|
|
|
|
example =
|
|
|
|
{ "apache-nohome-iptables" =
|
|
|
|
''
|
|
|
|
# Block an IP address if it accesses a non-existent
|
|
|
|
# home directory more than 5 times in 10 minutes,
|
|
|
|
# since that indicates that it's scanning.
|
|
|
|
filter = apache-nohome
|
|
|
|
action = iptables-multiport[name=HTTP, port="http,https"]
|
|
|
|
logpath = /var/log/httpd/error_log*
|
|
|
|
findtime = 600
|
|
|
|
bantime = 600
|
|
|
|
maxretry = 5
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
type = types.attrsOf types.string;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
The configuration of each Fail2ban “jail”. A jail
|
|
|
|
consists of an action (such as blocking a port using
|
|
|
|
<command>iptables</command>) that is triggered when a
|
|
|
|
filter applied to a log file triggers more than a certain
|
|
|
|
number of times in a certain time period. Actions are
|
|
|
|
defined in <filename>/etc/fail2ban/action.d</filename>,
|
|
|
|
while filters are defined in
|
|
|
|
<filename>/etc/fail2ban/filter.d</filename>.
|
|
|
|
'';
|
|
|
|
};
|
2013-10-15 18:36:45 +02:00
|
|
|
|
2012-05-17 20:19:48 +02:00
|
|
|
};
|
|
|
|
|
2012-05-17 04:51:24 +02:00
|
|
|
};
|
|
|
|
|
2013-10-15 18:36:45 +02:00
|
|
|
|
2012-05-17 04:51:24 +02:00
|
|
|
###### implementation
|
|
|
|
|
|
|
|
config = {
|
|
|
|
|
|
|
|
environment.systemPackages = [ pkgs.fail2ban ];
|
|
|
|
|
2013-10-15 18:36:45 +02:00
|
|
|
environment.etc."fail2ban/fail2ban.conf".source = fail2banConf;
|
|
|
|
environment.etc."fail2ban/jail.conf".source = jailConf;
|
|
|
|
environment.etc."fail2ban/action.d".source = "${pkgs.fail2ban}/etc/fail2ban/action.d/*.conf";
|
|
|
|
environment.etc."fail2ban/filter.d".source = "${pkgs.fail2ban}/etc/fail2ban/filter.d/*.conf";
|
2013-07-31 11:22:32 +02:00
|
|
|
|
2013-07-25 15:40:20 +02:00
|
|
|
systemd.services.fail2ban =
|
2012-05-17 04:51:24 +02:00
|
|
|
{ description = "Fail2ban intrusion prevention system";
|
2013-07-25 15:40:20 +02:00
|
|
|
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
after = [ "network.target" ];
|
2013-10-15 18:36:45 +02:00
|
|
|
|
2013-07-31 11:22:32 +02:00
|
|
|
restartTriggers = [ fail2banConf jailConf ];
|
2012-05-17 04:51:24 +02:00
|
|
|
path = [ pkgs.fail2ban pkgs.iptables ];
|
2013-10-15 18:36:45 +02:00
|
|
|
|
|
|
|
preStart =
|
|
|
|
''
|
|
|
|
mkdir -p /run/fail2ban -m 0755
|
|
|
|
'';
|
|
|
|
|
2013-07-25 15:48:00 +02:00
|
|
|
serviceConfig =
|
|
|
|
{ ExecStart = "${pkgs.fail2ban}/bin/fail2ban-server -f";
|
|
|
|
ReadOnlyDirectories = "/";
|
2013-12-11 21:14:17 +01:00
|
|
|
ReadWriteDirectories = "/run /var/tmp";
|
2013-10-15 18:36:45 +02:00
|
|
|
CapabilityBoundingSet = "CAP_DAC_READ_SEARCH CAP_NET_ADMIN CAP_NET_RAW";
|
2013-07-25 15:48:00 +02:00
|
|
|
};
|
2012-05-17 04:51:24 +02:00
|
|
|
|
|
|
|
postStart =
|
|
|
|
''
|
2013-10-15 18:36:45 +02:00
|
|
|
# Wait for the server to start listening.
|
|
|
|
for ((n = 0; n < 20; n++)); do
|
|
|
|
if fail2ban-client ping; then break; fi
|
|
|
|
sleep 0.5
|
|
|
|
done
|
|
|
|
|
|
|
|
# Reload its configuration.
|
2012-05-17 04:51:24 +02:00
|
|
|
fail2ban-client reload
|
|
|
|
'';
|
|
|
|
};
|
2012-05-17 20:19:48 +02:00
|
|
|
|
|
|
|
# Add some reasonable default jails. The special "DEFAULT" jail
|
|
|
|
# sets default values for all other jails.
|
|
|
|
services.fail2ban.jails.DEFAULT =
|
|
|
|
''
|
|
|
|
ignoreip = 127.0.0.1/8
|
|
|
|
bantime = 600
|
|
|
|
findtime = 600
|
|
|
|
maxretry = 3
|
|
|
|
backend = auto
|
|
|
|
'';
|
|
|
|
|
|
|
|
# Block SSH if there are too many failing connection attempts.
|
2013-10-15 18:36:45 +02:00
|
|
|
services.fail2ban.jails.ssh-iptables =
|
2012-05-17 20:19:48 +02:00
|
|
|
''
|
|
|
|
filter = sshd
|
|
|
|
action = iptables[name=SSH, port=ssh, protocol=tcp]
|
|
|
|
logpath = /var/log/warn
|
|
|
|
maxretry = 5
|
|
|
|
'';
|
2013-10-15 18:36:45 +02:00
|
|
|
|
2012-05-17 04:51:24 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
}
|