Skip to content
/ F2BNPM Public
forked from l4rm4nd/F2BFilters

Dockerized Fail2ban with filters and actions for Nginx Proxy Manager and Vaultwarden log formats.

Notifications You must be signed in to change notification settings

aionas2/F2BNPM

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

F2BNPM

Dockerized Fail2ban with filters and actions for Nginx Proxy Manager and Vaultwarden log formats.

Usage

# clone this repository
git clone https://github.com/l4rm4nd/F2BNPM

# change directory
cd F2BNPM

# adjust the docker-compose.yml as well as jail.d/, action.d/ and filter.d/ configs

# run the fail2ban docker container
docker compose up -d

Fail2ban Docker Container

This repository contains an example docker-compose.yml file to spawn up a dockerized fail2ban service. Ensure to bind mount your volume paths at volumes: containing the logs for Nginx Proxy Manager and Vaultwarden. Afterwards, the container can be started via docker compose up -d.

Note: The directory /mnt/docker-volumes/fail2ban/data/ will hold the subdirs jail.d, actions.d and filters.d. These directories are automatically created when the fail2ban container starts. Place the data of this repository there and adjust the files accordingly to your needs.

Fail2ban Configuration

The repository contains various action.d scripts and filter.d filters.

Jail Config

The jail.conf file defines all active filters and actions. It is configured for incremental IP bans. If a threat actor is detected multiple times, the ban time will be increased by multipliers continuously.

The following jail configuration is provided:

  • jail.conf

Actions

Fail2ban actions define what happens when a filter match is hit or triggered by log lines.

The following actions are provided by this repository:

  • action-ban-cloudflare.conf
    • Used to ban threat actor IP addresses on Cloudflare via API
  • action-ban-docker-badbots.conf
    • Used to ban threat actors with malicious user agents
  • action-ban-docker-forceful-browsing.conf
    • Used to ban threat actors that cause a multitude of 401, 403, 404 etc. errors
  • action-ban-docker-vaultwarden-bruteforce.conf
    • Used to ban threat actors conducting brute-force attacks on the login of vaultwarden password manager
  • telegram_notif.sh
    • Used to send notifications via Telegram messenger

Filters

Fail2ban filters define the regex pattern that is used to monitor log files.

The following filters are provided by this repository:

  • npm-general-badbots.conf
    • Filter to identify HTTP requests with well-known malicious user agents
  • npm-general-forceful-browsing.conf
    • Filter to identify forceful browsing attacks (multitude of 404, 403 etc.)
  • vaultwarden_login_bruteforce.conf
    • Filter to identify brute-force attacks on the login area of vaultwarden (Bitwarden alternative written in Rust)

About

Dockerized Fail2ban with filters and actions for Nginx Proxy Manager and Vaultwarden log formats.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%