Changed Fail2ban settings, updated Readme (#191)

* Made fail2ban settings more consistent across OSes, disabled HTTP ratelimit permaban on Debian as auto-refresh behaviour in FusionPBX can trigger it.

* Increase nginx-404 ban back to 1 hour
This commit is contained in:
danry25 2018-10-11 11:22:35 -07:00 committed by FusionPBX
parent 0ac1c952ae
commit 009702bd12
5 changed files with 18 additions and 15 deletions

View File

@ -1,9 +1,9 @@
FusionPBX Install
--------------------------------------
A quick install guide for a FusionPBX install. It is recommended to start the install on a minimal install of the operating system.
A quick install guide for a FusionPBX install. It is recommended to start the install on a minimal install of the operating system. Notes on further tweaking your configuration are at end of the file.
## Operating Systems
### Debian
Debian 8 is the preferred operating system by the FreeSWITCH developers. It supports the latest video dependencies. If you want to do video mixing use Debian. Download Debian 8 Jessie from here https://cdimage.debian.org/cdimage/archive/
@ -13,7 +13,7 @@ cd /usr/src/fusionpbx-install.sh/debian && ./install.sh
```
### Devuan
If you like Debian but rather not bother with systemd, Devuan is a "drop in" replacement.
Version 1 is bassed on Jessie. So you will find the same packages available.
Version 1 is bassed on Jessie, so you will find the same packages available.
Please note that the source installation and installation on ARM is not fully tested.
```sh
@ -52,3 +52,6 @@ cd /usr/src/fusionpbx-install.sh/centos && ./install.sh
Master https://github.com/fusionpbx/fusionpbx-install.sh/archive/master.zip
```
## Security Considerations
Fail2ban is installed and pre-configured for all operating systems this repository works on besides Windows, but the default settings may not be ideal depending on your needs. Please take a look at the jail file (/etc/fail2ban/jail.local on Debian/Devuan) to configure it to suit your application and security model!

View File

@ -95,7 +95,7 @@ port = 80,443
protocol = tcp
filter = nginx-404
logpath = /var/log/nginx/access*.log
bantime = 600
bantime = 3600
findtime = 60
maxretry = 120
@ -103,11 +103,11 @@ maxretry = 120
# Based on apache-badbots but a simple IP check (any IP requesting more than
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
# Block for two full days.
enabled = true
enabled = false
port = 80,443
protocol = tcp
filter = nginx-dos
logpath = /var/log/nginx/access*.log
findtime = 60
bantime = 172800
bantime = 86400
maxretry = 240

View File

@ -104,7 +104,7 @@ action = iptables-allports[name=fusionpbx-mac, protocol=all]
# sendmail-whois[name=fusionpbx-mac, dest=root, sender=fail2ban@example.org] #no smtp server installed
maxretry = 5
findtime = 300
bantime = -1
bantime = 86400
[nginx-404]
enabled = true
@ -120,12 +120,12 @@ maxretry = 120
[nginx-dos]
# Based on apache-badbots but a simple IP check (any IP requesting more than
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
enabled = true
enabled = false
port = 80,443
protocol = tcp
filter = nginx-dos
logpath = /var/log/nginx/access*.log
action = iptables-allports[name=nginx-dos, protocol=all]
findtime = 60
bantime = -1
bantime = 86400
maxretry = 240

View File

@ -95,7 +95,7 @@ port = 80,443
protocol = tcp
filter = nginx-404
logpath = /var/log/nginx/access*.log
bantime = 600
bantime = 3600
findtime = 60
maxretry = 120
@ -103,11 +103,11 @@ maxretry = 120
# Based on apache-badbots but a simple IP check (any IP requesting more than
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
# Block for two full days.
enabled = true
enabled = false
port = 80,443
protocol = tcp
filter = nginx-dos
logpath = /var/log/nginx/access*.log
findtime = 60
bantime = 172800
bantime = 86400
maxretry = 240

View File

@ -86,7 +86,7 @@ bantime = 3600
# Based on apache-badbots but a simple IP check (any IP requesting more than
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
# Block for two full days.
enabled = true
enabled = false
port = 80,443
protocol = tcp
filter = nginx-dos
@ -94,4 +94,4 @@ logpath = /var/log/nginx/access*.log
findtime = 60
maxretry = 240
banaction = pf
bantime = 172800
bantime = 86400