Hardening your server security with Fail2Ban
I was recently checking the access logs from some linux servers I maintain and I was very surprised by the ssh login attempts those servers were facing. My servers have password access disabled by default, so only previously registered ssh keys are allowed to login. But even then, the amount of login attempts was disturbing. Around 500 attempts a day. I had to do something about it.
Talking to my coworkers about it, one of them suggested a tool called Fail2Ban. It runs a background service that monitors the log files on your server and based on suspicious activities, like unsuccessful login attempts, it blocks access from those bad actors by updating firewall rules to reject any connection for their IP addresses.
My first thought was “I should be careful because I could ban myself and lose access to my server permanently”. So I started the installation process very carefully. Fortunately, the default configuration only blocks the IP access for 10 minutes, so worst case I would have a few minutes to have coffee. I also started the process in a “trashable” server, so if something goes wrong, I could just throw it away and start anew.
We will customize those settings for a more robust strategy later on here on this post.
Let’s get started. The first step is to install Fail2Ban on your server (Ubuntu):
# Update dependencies apt update && apt upgrade -y # install fail2ban apt install fail2ban
Fail2Ban comes with a pretty solid default configuration, but since our goal is to customize it to our needs, they recommend us to copy the default configuration file with the
.local extension. The reason for this is that if we update Fail2Ban, the original configuration file will get changed and we will lose our custom configuration.
Put those bad actors in jail
The configuration files are located at
/etc/fail2ban, so lets go ahead and create a local copy of those files:
# Copy fail2ban default configuration cp /etc/fail2ban/fail2ban.conf /etc/fail2ban/fail2ban.local # Copy fail2ban jail configuration cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
Fail2Ban uses the concept of
jails to monitor specific services like nginx, ssh, apache and even your custom application logs like Node.js or Java apps. Each jail specifies a configuration for a specific application or service running on your server. By default, the
sshd jail is active.
Avoid banning specific IP Addresses
To prevent specific IP addresses of being banned, you can create an allow-list in the
fail2ban.local file. Go ahead and edit the following line with your IP Addresses using space (and/or comma) as a separator:
# allow IP addresses from your VPN or other servers here ignoreip = 127.0.0.1/8 ::1 YOU_IP_ADDRESS_HERE
Now that we have Fail2Ban installed and pre-configured by default, lets start the service:
systemctl start fail2ban
As soon as you start Fail2Ban, you might already see some bad actors blocked. First lets check which jails are active with the following command:
fail2ban-client status # You should see something like this as output: Status |- Number of jail: 1 `- Jail list: sshd
Ok, so we have Fail2Ban up and running, lets check the
sshd jail with the following command:
fail2ban-client status sshd # You should see something like this as output Status for the jail: sshd |- Filter | |- Currently failed: 10 | |- Total failed: 511 | `- File list: /var/log/auth.log `- Actions |- Currently banned: 9 |- Total banned: 77 `- Banned IP list: 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124
In my case, I could immediately see the benefit of Fail2Ban. after a few minutes, I had already several IP addresses banned.
Lets lookup our IP table to see if those IP addresses match with the following command:
iptables -n -L # You should see something like this as output Chain f2b-sshd (1 references) target prot opt source destination REJECT all -- 126.96.36.199 0.0.0.0/0 reject-with icmp-port-unreachable REJECT all -- 188.8.131.52 0.0.0.0/0 reject-with icmp-port-unreachable REJECT all -- 184.108.40.206 0.0.0.0/0 reject-with icmp-port-unreachable REJECT all -- 220.127.116.11 0.0.0.0/0 reject-with icmp-port-unreachable REJECT all -- 18.104.22.168 0.0.0.0/0 reject-with icmp-port-unreachable
That is great. Fail2Ban is updating our IP filter rules which will prevent connections from those bad actors.
Changing the defaults
The default configuration blocks those IP addresses for 600 seconds (10 minutes). This is a pretty good start, but we can do better. Ideally, if some of those IP addresses are attempting to connect every 10 minutes, we could block them for a greater timespan or even permanently.
One thing to consider is that if we block IPs permanently, we can potentially increase our IP table lookup time, which means that connecting to our server can become very slow since this list of blocked IPs can grow indefinitely.
To help us with that, Fail2Ban comes with
recidive which is a jail for its own logs. It works like that:
- It looks into Fail2Ban own logs for banned IP addresses from other jails.
- If those IP addresses are found in the logs more than 5 times in the current day, it blocks them for 1 week.
That sounds like a good strategy. Our IP table won’t grow very large (in theory) because in 1 week it will rollback and allow those IP addresses to connect again. If they act in bad faith again, they will be blocked and the cycle repeats.
So let’s go ahead and activate
recidive. Edit the file
/etc/fail2ban/jail.local (I am using nano, but feel free to use a different text editor). Look for the following code:
# Jail for more extended banning of persistent abusers # !!! WARNINGS !!! # 1. Make sure that your loglevel specified in fail2ban.conf/.local # is not at DEBUG level -- which might then cause fail2ban to fall into # an infinite loop constantly feeding itself with non-informative lines # 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days) # to maintain entries for failed logins for sufficient amount of time [recidive] logpath = /var/log/fail2ban.log banaction = %(banaction_allports)s bantime = 1w findtime = 1d
Notice that the configuration is already in place. We only need to activate it:
# ... comments [recidive] # Include the next line to enable recidive enabled = true logpath = /var/log/fail2ban.log banaction = %(banaction_allports)s bantime = 1w findtime = 1d
Now we only need to restart the Fail2Ban service with:
systemctl restart fail2ban
Let’s check our fail2ban status to see which jails are running after our update:
fail2ban-client status # You should see something like this as output Status |- Number of jail: 2 `- Jail list: recidive, sshd
recidive is active, you can check if some IP addresses were banned for the whole week:
fail2ban-client status recidive # You should see something like this as output Status for the jail: recidive |- Filter | |- Currently failed: 25 | |- Total failed: 90 | `- File list: /var/log/fail2ban.log `- Actions |- Currently banned: 10 |- Total banned: 10 `- Banned IP list: 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206
Now we have Fail2Ban monitoring our SSH access and fully configured.
What to do if I block myself
You should be very careful with your server access from now on. Make sure that you have access from your computer and I highly recommend disabling password access.
You can wait the default 10 minutes or you can access from a different IP address (like routing your mobile phone) and remove your IP address from the blocklist with the following command:
fail2ban-client set jailname unbanip [IP_ADDRESS_HERE] # Here is how it could look like # if you want to unban an IP address from the sshd jail fail2ban-client set sshd unbanip 220.127.116.11 # from the recidive jail fail2ban-client set recidive unbanip 18.104.22.168
Where to go from here
Fail2Ban is quite extensive and supports many different kinds of extensions like your own custom jails. The good thing is that amazing people around the world like to share their experience as well, so if you want to setup Fail2Ban for a different service like nginx, Digital Ocean has a great tutorial about it with a step-by-step guide.
You can also read more about it on the Fail2Ban official page