使用fail2ban预防被挖洞的笔记

参考:https://blog.csdn.net/dorisnzy/article/details/82926067

1、安装fail2ban:

yum -y install epel-release

yum -y install fail2ban

2、配置fail2ban:

修改/etc/fail2ban/jail.conf

[default]
destemail = [email protected]
sender = [email protected]
#这里需要修改发送和接收邮件的邮箱

[nginx-get-404]
enabled = true
port = http,https
filter = nginx
action = iptables[name=nginx, port=http, protocol=tcp]
         %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
#这里增加了邮件通知
logpath = /var/log/nginx/access.log
bantime = 3600
findtime = 60
maxretry = 5

增加/etc/fail2ban/filter.d/nginx.conf

[Definition]
failregex =  -.*- .*HTTP/1.* 404 .*$
ignoreregex =  -.*- .*GET /www/common/.*$
#ignoreregex是忽略的地址,防止因页面代码写的不好引发的错判,如果不需要可以留空

修改/etc/postfix/mail.cf

主要是修改releyhost = 10.0.30.1

本身有内部邮件的smtp转发服务器

3、检查fail2ban规则

fail2ban-regex /var/log/nginx/access.log /etc/fail2ban/filter.d/nginx.conf /etc/fail2ban/filter.d/nginx.conf --print-all-match --print-all-ignore

注意:上面有2次用到/etc/fail2ban/filter.d/nginx.conf,是因为我配置了ignoreregex的内容

4、启动fail2ban和postfix

service postfix restart
service fail2ban restart

5、检查fail2ban

fail2ban-client status

fail2ban-client status ngixn-get-404

分别检查的是fail2ban的总开关状态,和其中nginx-get-404功能的扫描状态

你可能感兴趣的:(使用fail2ban预防被挖洞的笔记)