Alan Orth
0605f70f2e
This is active banning of IPs that are brute forcing login attempts to SSH, versus the passive banning of 10,000 abusive IPs from the abuseipdb.com blacklist. For now I am banning IPs that fail to log in successfully more than twelve times in a one-hour period, but these settings might change, and I can override them at the group and host level if needed. Currently this works for CentOS 7, Ubuntu 16.04, and Ubuntu 18.04, with minor differences in the systemd configuration due to older versions on some distributions. You can see the status of the jail like this: # fail2ban-client status sshd Status for the jail: sshd |- Filter | |- Currently failed: 0 | |- Total failed: 0 | `- Journal matches: _SYSTEMD_UNIT=sshd.service + _COMM=sshd `- Actions |- Currently banned: 1 |- Total banned: 1 `- Banned IP list: 106.13.112.20 You can unban IPs like this: # fail2ban-client set sshd unbanip 106.13.112.20
40 lines
1.2 KiB
YAML
40 lines
1.2 KiB
YAML
---
|
|
|
|
- block:
|
|
- name: Set Ubuntu firewall packages
|
|
set_fact:
|
|
ubuntu_firewall_packages:
|
|
- firewalld
|
|
- tidy
|
|
- fail2ban
|
|
- python3-systemd # for fail2ban systemd backend
|
|
|
|
- name: Install firewalld and deps
|
|
when: ansible_distribution_version is version_compare('15.04', '>=')
|
|
apt: pkg={{ ubuntu_firewall_packages }} state=present
|
|
|
|
- name: Copy firewalld public zone file
|
|
when: ansible_distribution_version is version_compare('15.04', '>=')
|
|
template: src=public.xml.j2 dest=/etc/firewalld/zones/public.xml owner=root mode=0600
|
|
|
|
- name: Format public.xml firewalld zone file
|
|
when: ansible_distribution_version is version_compare('15.04', '>=')
|
|
command: tidy -xml -iq -m -w 0 /etc/firewalld/zones/public.xml
|
|
notify:
|
|
- restart firewalld
|
|
|
|
- name: Copy ipsets of abusive IPs
|
|
when: ansible_distribution_major_version is version_compare('15.04', '>=')
|
|
copy: src={{ item }} dest=/etc/firewalld/ipsets/{{ item }} owner=root group=root mode=0600
|
|
loop:
|
|
- abusers-ipv4.xml
|
|
- abusers-ipv6.xml
|
|
notify:
|
|
- restart firewalld
|
|
|
|
- include_tasks: fail2ban.yml
|
|
when: ansible_distribution_version is version_compare('15.04', '>=')
|
|
tags: firewall
|
|
|
|
# vim: set sw=2 ts=2:
|