search
HomeOperation and MaintenanceLinux Operation and MaintenanceTeach you how to configure fail2ban to protect the Apache server

This article mainly introduces the method of configuring fail2ban to protect the Apache server, mainly to filter IP addresses. The example is based on the Linux system. Friends in need can refer to it

In production environment The Apache server may be vulnerable to different attacks. An attacker may attempt to gain access to unauthorized or prohibited directories through brute force attacks or the execution of malicious scripts. Some malicious crawlers may scan your website for various security vulnerabilities, or send spam by collecting email addresses and web forms.

The Apache server has a comprehensive log function that can capture abnormal events reflected in various attacks. However, it is not yet able to systematically parse specific apache logs and quickly react to potential attacks (eg, ban/unban IP addresses). At this time, fail2ban can save all this and free up the system administrator's work.

fail2ban is an intrusion prevention tool that can detect different tools based on system logs and automatically take protective measures, such as banning IPs through iptables, blocking connections through /etc/hosts.deny, or sending notifications through email . fail2ban has a series of predefined "jails" that use specific program log filters to detect common attacks. You can also write custom rules to detect attacks from arbitrary programs.

In this tutorial, I will demonstrate how to configure fail2ban to protect your apache server. I assume you already have apache and fail2ban installed.
What is Fail2ban Jail
Let’s take a deeper look at fail2ban jail. Jail defines specific application policies, which trigger a protection measure for a specified program. fail2ban has predefined jails under /etc/fail2ban/jail.conf for some popular programs such as Apache, Dovecot, Lighttpd, MySQL, Postfix, SSH, etc. Each jail detects common attacks through specific program log filters (under /etc/fail2ban/filter.d). Let me look at an example jail: SSH jail.

The code is as follows:

[ssh]
    enabled   = true
    port      = ssh
    filter    = sshd
    logpath   = /var/log/auth.log
    maxretry  = 6
    banaction = iptables-multiport

The configuration of the SSH prison defines these parameters:

[ssh]: The square brackets are the prison's name.
enabled: whether to enable the jail
port: port number (or corresponding service name)
filter: log parsing rules for detecting attacks
logpath: detected log file
maxretry: maximum failure Number of times
banaction: The banned operations

Any parameters defined in the jail configuration will override the corresponding default configuration parameters in fail2ban-wide. Instead, any missing parameters use the default value defined in the [DEFAULT] field.

Predefined log filters are placed in /etc/fail2ban/filter.d, and the prohibited actions that can be taken are placed in /etc/fail2ban/action.d.

201561195702833.jpg (769×644)

If you want to override fail2ban's default behavior or define any custom jails, you can create /etc/fail2ban/jail.local* files. In this tutorial, I will use /etc/fail2ban/jail.local.
Enable predefined apache jails

The default installation of fail2ban provides some predefined jails and filters for the Apache service. I want to enable these built-in Apache jails. Since Debian and RedHat are configured slightly differently, I will provide their configuration files separately.
Enabling Apache jail on Debian or Ubuntu

To enable the predefined apache jail on Debian-based systems, create /etc/fail2ban/jail.local as follows.

  $ sudo vi /etc/fail2ban/jail.local

The code is as follows:

# 检测密码认证失败
    [apache]
    enabled  = true
    port     = http,https
    filter   = apache-auth
    logpath  = /var/log/apache*/*error.log
    maxretry = 6
    # 检测漏洞和 PHP 脆弱性扫描 
    [apache-noscript]
    enabled  = true
    port     = http,https
    filter   = apache-noscript
    logpath  = /var/log/apache*/*error.log
    maxretry = 6
    # 检测 Apache 溢出攻击 
    [apache-overflows]
    enabled  = true
    port     = http,https
    filter   = apache-overflows
    logpath  = /var/log/apache*/*error.log
    maxretry = 2
    # 检测在服务器寻找主目录的尝试
    [apache-nohome]
    enabled  = true
    port     = http,https
    filter   = apache-nohome
    logpath  = /var/log/apache*/*error.log
    maxretry = 2

Since the above jails do not specify measures, these jails will trigger default measures. To see the default action, find "banaction" under [DEFAULT] in /etc/fail2ban/jail.conf.

The code is as follows:

banaction = iptables-multiport

In this example, the default operation is iptables-multiport (defined in /etc/fail2ban/action.d/iptables-multiport.conf). This measure uses iptable's multiport module to ban an IP address.

After enabling the jail, you must restart fail2ban to load the jail.

  $ sudo service fail2ban restart

Enabling Apache jails in CentOS/RHEL or Fedora

To enable predefined jails in Red Hat-based systems, create /etc/fail2ban/ as follows jail.local.

  $ sudo vi /etc/fail2ban/jail.local

The code is as follows:

# 检测密码认证失败
    [apache]
    enabled  = true
    port     = http,https
    filter   = apache-auth
    logpath  = /var/log/httpd/*error_log
    maxretry = 6
    # 检测抓取邮件地址的爬虫
    [apache-badbots]
    enabled  = true
    port     = http,https
    filter   = apache-badbots
    logpath  = /var/log/httpd/*access_log
    bantime  = 172800
    maxretry = 1
    # 检测漏洞和 PHP 脆弱性扫描 
    [apache-noscript]
    enabled  = true
    port     = http,https
    filter   = apache-noscript
    logpath  = /var/log/httpd/*error_log
    maxretry = 6
    # 检测 Apache 溢出攻击 
    [apache-overflows]
    enabled  = true
    port     = http,https
    filter   = apache-overflows
    logpath  = /var/log/httpd/*error_log
    maxretry = 2
    # 检测在服务器寻找主目录的尝试
    [apache-nohome]
    enabled  = true
    port     = http,https
    filter   = apache-nohome
    logpath  = /var/log/httpd/*error_log
    maxretry = 2
    # 检测执行不存在的脚本的企图
    # 这些都是流行的网站服务程序
    # 如:webmail, phpMyAdmin,WordPress
    port     = http,https
    filter   = apache-botsearch
    logpath  = /var/log/httpd/*error_log
    maxretry = 2

Note that the default operation of these jail files is iptables-multiport (defined in "banaction" under the [DEFAULT] field in /etc/fail2ban/jail.conf ). This measure uses iptable's multiport module to ban an IP address.

After enabling the jail, you must restart fail2ban to load the jail.

In Fedora or CentOS/RHEL 7:

  $ sudo systemctl restart fail2ban

In CentOS/RHEL 6:

  $ sudo service fail2ban restart

Check and manage fail2ban ban status

Once the jail is activated, you can use the fail2ban client command line tool to monitor the current ban status.

View the list of active jails:

  $ sudo fail2ban-client status

View the status of a specific jail (including a list of banned IPs):

  $ sudo fail2ban-client status [监狱名]

201561195749494.jpg (800×298)

    你也可以手动禁止或者解禁IP地址:

要用制定监狱禁止IP:

  $ sudo fail2ban-client set [name-of-jail] banip [ip-address]

要解禁指定监狱屏蔽的IP:

  $ sudo fail2ban-client set [name-of-jail] unbanip [ip-address]

总结

本篇教程解释了fail2ban监狱如何工作以及如何使用内置的监狱来保护Apache服务器。依赖于你的环境以及要保护的web服务器类型,你或许要调整已有的监狱或者编写自定义监狱和日志过滤器。查看outfail2ban的官方Github页面来获取最新的监狱和过滤器示例。

The above is the detailed content of Teach you how to configure fail2ban to protect the Apache server. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
图文详解apache2.4+php8.0的安装配置方法图文详解apache2.4+php8.0的安装配置方法Dec 06, 2022 pm 04:53 PM

本文给大家介绍如何安装apache2.4,以及如何配置php8.0,文中附有图文详细步骤,下面就带大家一起看看怎么安装配置apache2.4+php8.0吧~

Linux apache怎么限制并发连接和下载速度Linux apache怎么限制并发连接和下载速度May 12, 2023 am 10:49 AM

mod_limitipconn,这个是apache的一个非官方模块,根据同一个来源ip进行并发连接控制,bw_mod,它可以根据来源ip进行带宽限制,它们都是apache的第三方模块。1.下载:wgetwget2.安装#tar-zxvfmod_limitipconn-0.22.tar.gz#cdmod_limitipconn-0.22#vimakefile修改:apxs=“/usr/local/apache2/bin/apxs”#这里是自己apache的apxs路径,加载模块或者#/usr/lo

apache版本怎么查看?apache版本怎么查看?Jun 14, 2019 pm 02:40 PM

查看​apache版本的步骤:1、进入cmd命令窗口;2、使用cd命令切换到Apache的bin目录下,语法“cd bin目录路径”;3、执行“httpd -v”命令来查询版本信息,在输出结果中即可查看apache版本号。

超细!Ubuntu20.04安装Apache+PHP8环境超细!Ubuntu20.04安装Apache+PHP8环境Mar 21, 2023 pm 03:26 PM

本篇文章给大家带来了关于PHP的相关知识,其中主要跟大家分享在Ubuntu20.04 LTS环境下安装Apache的全过程,并且针对其中可能出现的一些坑也会提供解决方案,感兴趣的朋友下面一起来看一下吧,希望对大家有帮助。

nginx,tomcat,apache的区别是什么nginx,tomcat,apache的区别是什么May 15, 2023 pm 01:40 PM

1.Nginx和tomcat的区别nginx常用做静态内容服务和代理服务器,直接外来请求转发给后面的应用服务器(tomcat,Django等),tomcat更多用来做一个应用容器,让javawebapp泡在里面的东西。严格意义上来讲,Apache和nginx应该叫做HTTPServer,而tomcat是一个ApplicationServer是一个Servlet/JSO应用的容器。客户端通过HTTPServer访问服务器上存储的资源(HTML文件,图片文件等),HTTPServer是中只是把服务器

php站用iis乱码而apache没事怎么解决php站用iis乱码而apache没事怎么解决Mar 23, 2023 pm 02:48 PM

​在使用 PHP 进行网站开发时,你可能会遇到字符编码问题。特别是在使用不同的 Web 服务器时,会发现 IIS 和 Apache 处理字符编码的方法不同。当你使用 IIS 时,可能会发现在使用 UTF-8 编码时出现了乱码现象;而在使用 Apache 时,一切正常,没有出现任何问题。这种情况应该怎么解决呢?

如何在 RHEL 9/8 上设置高可用性 Apache(HTTP)集群如何在 RHEL 9/8 上设置高可用性 Apache(HTTP)集群Jun 09, 2023 pm 06:20 PM

Pacemaker是适用于类Linux操作系统的高可用性集群软件。Pacemaker被称为“集群资源管理器”,它通过在集群节点之间进行资源故障转移来提供集群资源的最大可用性。Pacemaker使用Corosync进行集群组件之间的心跳和内部通信,Corosync还负责集群中的投票选举(Quorum)。先决条件在我们开始之前,请确保你拥有以下内容:两台RHEL9/8服务器RedHat订阅或本地配置的仓库通过SSH访问两台服务器root或sudo权限互联网连接实验室详情:服务器1:node1.exa

Linux下如何查看nginx、apache、mysql和php的编译参数Linux下如何查看nginx、apache、mysql和php的编译参数May 14, 2023 pm 10:22 PM

快速查看服务器软件的编译参数:1、nginx编译参数:your_nginx_dir/sbin/nginx-v2、apache编译参数:catyour_apache_dir/build/config.nice3、php编译参数:your_php_dir/bin/php-i|grepconfigure4、mysql编译参数:catyour_mysql_dir/bin/mysqlbug|grepconfigure以下是完整的实操例子:查看获取nginx的编译参数:[root@www~]#/usr/lo

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools