====== Blacklist IP's from a file ======
fail2ban is designed to dynamically watch logs and ban/unban IP's with bad reputations. However, with a little sneakiness, it can be abused to also load a list of permanently banned IP addresses. This is a drastic action, and can end up blocking legitimate users who gain IP's previously used for cracking attempts, so I tend to clean them up every once in a while. But, for me, it is a list of IP's that have done some extended hacking on my servers in the past, and this way, fail2ban doesn't have to monitor their attempts.
Basically, we create a custom action which creates its own chain (under fail2ban's control), loads the IP's, then that is all. The jail is there just to call the action the first time, and the filter is there because fail2ban requires one (and complains if you set it to null).
We'll create three files, and add a block to jail.local
- list of IP's or subnets, one entry per line
- action file to be stored in actions.d/
- dummy filter file to be stored in filters.d/
- modify jail.local
===== Blacklist File =====
This is a basic text file with one IP or subnet per line. I store mine in /etc/fail2ban on my Devuan Linux machine. An example is:
172.104.94.112
190.40.235.20
190.4.51.122
210.186.135.78
39.45.148.16
193.93.16.14
93.174.93.0/24
===== Action file =====
Now, we need to create an action, a file to be placed in action.d. I named it blacklistip.conf, and the name is important when you define the jail it goes in, ie action = blacklistip means //look in action.d for a file names blacklistip.conf and load it as the action//.
# action file to allow loading of IP's from a text file to be blocked
# along with fail2ban.
# The file contains one IP or subnet per line, and may be placed
# anywhere on the system.
#
# This is a perversion of fail2ban's basic purpose, which is to dynamically
# add/remove IP's from IPTables, but it allows us to permenantly ban
# some really, really bad people
#
# example of file
# 172.104.94.112
# 190.40.235.20
# 190.4.51.122
# 210.186.135.78
# 39.45.148.0/24
#
# NOTE: I did not set it up to ignore comments, so you can't put comments
# into the file.
#
# Works on fail2ban v9
[INCLUDES]
before = iptables-common.conf
[Definition]
# what to do when fail2ban starts
# taken directly from the multiport ban script, with the last line
# inserted to load the IP file
# creates a chain, then loads all the IP's into it
actionstart = -N f2b-
-A f2b- -j
-I -p -j f2b-
cat | while read IP; do -I f2b- 1 -s $IP -j DROP; done
# these actions are taken when fail2ban is shut down
# basically, destroys the chain
actionstop = -D -p -j f2b-
-F f2b-
-X f2b-
actioncheck =
actionban =
actionunban =
[Init]
===== Filter =====
Now, we need a filter, because we are abusing fail2ban. fail2ban assumes you're going to be parsing a log file to find bad guys attacking you, but we already know who we want to block. So, we create a dummy and store it in filter.d/blacklistip.conf. The name of the file is not arbitrary. It is the default based on the name of our jail definition (later). We could call it anything, but would need to add
filter = anything
to our jail if we do. This is simpler.
# dummy filter file for blacklistip jail. Expect a warning that failregex is
# not defined, or, if you uncomment failregex, expect a warning that there
# is no entry in it
#
# Since this is a static read, we don't actually parse any logs
[INCLUDES]
[Definition]
#failregex = ''
[Init]
===== Modify jail.local =====
jail.local (in the root of the fail2ban configuration directory) is the place to make local modifications. So, we need to add the following block to it. This basically defines a jail named //blacklistip//, which is enabled. Since we don't have a //filter =// line, the filter is assumed to be filter.d/blacklistip.conf.
The action is specifically defined to be blacklistip (ie, action.d/blacklistip.conf), and we are passing the name of the chain to create (name=blacklistip) and the file name to be read from (filename='/etc/fail2ban/ip.blacklist').
[blacklistip]
enabled = true
bantime = -1
action = blacklistip[name=blacklistip,filename='/etc/fail2ban/ip.blacklist']
===== Test it =====
Restart fail2ban, then run the following command as root.
iptables -n -L f2b-blacklistip
You should see a list of all the banned IP's, with an action of drop. And, when you stop fail2ban, it will clean them up also.
===== Convenience Script =====
As it stands, to add a new IP to the blacklist, you must add it to the blacklist IP file, then restart fail2ban. A better option is to use fail2ban-client, which is a cli for fail2ban. The following Perl script automates the entire process.
- Add IP to the blacklist file
- blacklist the IP vai fail2ban-client while the system is running
#! /usr/bin/env perl
use strict;
use warnings;
my $IP = shift;
my $JAIL='blacklistip';
my $BLACKLIST='/etc/fail2ban/ip.blacklist';
my $FAIL2BAN_CLIENT = '/usr/bin/fail2ban-client';
if ( $IP && $IP =~ m/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$/ ) {
open BANNED, ">>$BLACKLIST" or die "Could not append $BLACKLIST: $!\n";
print BANNED "$IP\n";
close BANNED;
`$FAIL2BAN_CLIENT set $JAIL banip $IP`;
} else {
print "Usage: $0 IP_ADDRESS\n";
}
1;
===== Deficiencies =====
* Actually, this should be done on the router, since it will use some memory and processor on your server. Also, there is no way to dynamically add/remove IP's. You must modify the file, then restart fail2ban.
* The blacklist file should really have a date/time stamp on each entry so you can clean it up based on how long ago something was added. I have stuff in my blacklist file from several years ago, and they have probably been cleaned up since. This could be done by adding a delimiter (colons are common) to separate it into fields. I may do that soon.
* It would be nice to have an optional comment also.
* It would be nice to be able to do something like "Remove everything except those from other countries", so comparing things against a geoiplist or something.
===== Links =====
* [[https://www.fail2ban.org/wiki/index.php/Commands]]
* [[https://www.mauromascia.com/en/blog/fail2ban-set-permanent-ban-per-ip/]]