add fail2ban
This commit is contained in:
parent
774bd99550
commit
51e8302c29
@ -1,10 +1,10 @@
|
|||||||
{ config, lib, libS, ... }:
|
{ config, lib, libS, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
cfg = config.boot;
|
cfg = config.boot;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options = {
|
options = {
|
||||||
boot = {
|
boot = {
|
||||||
default = libS.mkOpinionatedOption "enable the boot builder";
|
default = libS.mkOpinionatedOption "enable the boot builder";
|
||||||
cpuType = lib.mkOption {
|
cpuType = lib.mkOption {
|
||||||
|
45
modules/fail2ban.nix
Normal file
45
modules/fail2ban.nix
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
{ config, lib, libS, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.fail2ban;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options = {
|
||||||
|
services.fail2ban = {
|
||||||
|
recommendedDefaults = libS.mkOpinionatedOption "use fail2ban with recommended defaults";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config.services.fail2ban = lib.mkIf cfg.recommendedDefaults {
|
||||||
|
maxretry = 5;
|
||||||
|
bantime = "24h";
|
||||||
|
bantime-increment = {
|
||||||
|
enable = true;
|
||||||
|
formula = "ban.Time * math.exp(float(ban.Count+1)*banFactor)/math.exp(1*banFactor)";
|
||||||
|
multipliers = "1 2 4 8 16 32 64";
|
||||||
|
maxtime = "168h";
|
||||||
|
overalljails = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
jails = {
|
||||||
|
apache-nohome-iptables.settings = {
|
||||||
|
# Block an IP address if it accesses a non-existent
|
||||||
|
# home directory more than 5 times in 10 minutes,
|
||||||
|
# since that indicates that it's scanning.
|
||||||
|
filter = "apache-nohome";
|
||||||
|
action = ''iptables-multiport[name=HTTP, port="http,https"]'';
|
||||||
|
logpath = "/var/log/httpd/error_log*";
|
||||||
|
backend = "auto";
|
||||||
|
findtime = 600;
|
||||||
|
bantime = 600;
|
||||||
|
maxretry = 5;
|
||||||
|
};
|
||||||
|
dovecot = {
|
||||||
|
settings = {
|
||||||
|
filter = "dovecot[mode=aggressive]";
|
||||||
|
maxretry = 3;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
@ -1,7 +1,13 @@
|
|||||||
|
# BIASED
|
||||||
{ config, lib, ... }:
|
{ config, lib, ... }:
|
||||||
{
|
{
|
||||||
config = {
|
config = {
|
||||||
services = lib.mkIf config.services.gitea.enable {
|
services = lib.mkIf config.services.gitea.enable {
|
||||||
|
fail2ban = {
|
||||||
|
enable = true;
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
openssh = {
|
openssh = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
Match User gitea
|
Match User gitea
|
||||||
|
@ -25,11 +25,16 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
fail2ban = {
|
||||||
|
enable = lib.mkDefault true;
|
||||||
|
recommendedDefaults = true;
|
||||||
|
};
|
||||||
|
|
||||||
openssh = {
|
openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
fixPermissions = true;
|
fixPermissions = true;
|
||||||
extraConfig = ''StreamLocalBindUnlink yes'';
|
extraConfig = ''StreamLocalBindUnlink yes'';
|
||||||
# below is a modified default to include ecdsa (as per this https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67)
|
|
||||||
hostKeys = [
|
hostKeys = [
|
||||||
{
|
{
|
||||||
bits = 4096;
|
bits = 4096;
|
||||||
@ -46,13 +51,20 @@
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
settings = {
|
settings = {
|
||||||
PermitRootLogin = "no";
|
ClientAliveCountMax = 10;
|
||||||
|
Compression = "NO";
|
||||||
|
IgnoreRhosts = "yes";
|
||||||
|
MaxAuthTries = 3;
|
||||||
|
MaxSessions = 10;
|
||||||
PasswordAuthentication = false;
|
PasswordAuthentication = false;
|
||||||
# below config options from https://sysadministrivia.com/news/hardening-ssh-security
|
PermitEmptyPasswords = "no";
|
||||||
|
PermitRootLogin = "no";
|
||||||
|
|
||||||
KexAlgorithms = [
|
KexAlgorithms = [
|
||||||
"curve25519-sha256@libssh.org"
|
"curve25519-sha256@libssh.org"
|
||||||
"diffie-hellman-group-exchange-sha256"
|
"diffie-hellman-group-exchange-sha256"
|
||||||
];
|
];
|
||||||
|
|
||||||
Ciphers = [
|
Ciphers = [
|
||||||
"chacha20-poly1305@openssh.com"
|
"chacha20-poly1305@openssh.com"
|
||||||
"aes256-gcm@openssh.com"
|
"aes256-gcm@openssh.com"
|
||||||
@ -61,6 +73,7 @@
|
|||||||
"aes192-ctr"
|
"aes192-ctr"
|
||||||
"aes128-ctr"
|
"aes128-ctr"
|
||||||
];
|
];
|
||||||
|
|
||||||
Macs = [
|
Macs = [
|
||||||
"hmac-sha2-512-etm@openssh.com"
|
"hmac-sha2-512-etm@openssh.com"
|
||||||
"hmac-sha2-256-etm@openssh.com"
|
"hmac-sha2-256-etm@openssh.com"
|
||||||
@ -69,19 +82,6 @@
|
|||||||
"hmac-sha2-256"
|
"hmac-sha2-256"
|
||||||
"umac-128@openssh.com"
|
"umac-128@openssh.com"
|
||||||
];
|
];
|
||||||
|
|
||||||
# below config options from Lynis recommendations
|
|
||||||
ClientAliveCountMax =2;
|
|
||||||
Compression = "NO";
|
|
||||||
MaxAuthTries = 3;
|
|
||||||
MaxSessions = 2;
|
|
||||||
# Commenting below as I'm not sure if this will break things
|
|
||||||
# TCPKeepAlive = "NO";
|
|
||||||
# UseDNS = "NO";
|
|
||||||
|
|
||||||
# below config options from https://linux-audit.com/audit-and-harden-your-ssh-configuration/
|
|
||||||
IgnoreRhosts = "yes";
|
|
||||||
PermitEmptyPasswords = "no";
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
Loading…
x
Reference in New Issue
Block a user