mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-27 17:33:09 +00:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
411 lines
15 KiB
Nix
411 lines
15 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.fail2ban;
|
|
|
|
settingsFormat = pkgs.formats.keyValue { };
|
|
|
|
configFormat = pkgs.formats.ini {
|
|
mkKeyValue = generators.mkKeyValueDefault { } " = ";
|
|
};
|
|
|
|
mkJailConfig = name: attrs:
|
|
optionalAttrs (name != "DEFAULT") { inherit (attrs) enabled; } //
|
|
optionalAttrs (attrs.filter != null) { filter = if (builtins.isString filter) then filter else name; } //
|
|
attrs.settings;
|
|
|
|
mkFilter = name: attrs: nameValuePair "fail2ban/filter.d/${name}.conf" {
|
|
source = configFormat.generate "filter.d/${name}.conf" attrs.filter;
|
|
};
|
|
|
|
fail2banConf = configFormat.generate "fail2ban.local" cfg.daemonSettings;
|
|
|
|
strJails = filterAttrs (_: builtins.isString) cfg.jails;
|
|
attrsJails = filterAttrs (_: builtins.isAttrs) cfg.jails;
|
|
|
|
jailConf =
|
|
let
|
|
configFile = configFormat.generate "jail.local" (
|
|
{ INCLUDES.before = "paths-nixos.conf"; } // (mapAttrs mkJailConfig attrsJails)
|
|
);
|
|
extraConfig = concatStringsSep "\n" (attrValues (mapAttrs
|
|
(name: def:
|
|
optionalString (def != "")
|
|
''
|
|
[${name}]
|
|
${def}
|
|
'')
|
|
strJails));
|
|
|
|
in
|
|
pkgs.concatText "jail.local" [ configFile (pkgs.writeText "extra-jail.local" extraConfig) ];
|
|
|
|
pathsConf = pkgs.writeText "paths-nixos.conf" ''
|
|
# NixOS
|
|
|
|
[INCLUDES]
|
|
|
|
before = paths-common.conf
|
|
|
|
after = paths-overrides.local
|
|
|
|
[DEFAULT]
|
|
'';
|
|
in
|
|
|
|
{
|
|
|
|
imports = [
|
|
(mkRemovedOptionModule [ "services" "fail2ban" "daemonConfig" ] "The daemon is now configured through the attribute set `services.fail2ban.daemonSettings`.")
|
|
(mkRemovedOptionModule [ "services" "fail2ban" "extraSettings" ] "The extra default configuration can now be set using `services.fail2ban.jails.DEFAULT.settings`.")
|
|
];
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
services.fail2ban = {
|
|
enable = mkOption {
|
|
default = false;
|
|
type = types.bool;
|
|
description = ''
|
|
Whether to enable the fail2ban service.
|
|
|
|
See the documentation of {option}`services.fail2ban.jails`
|
|
for what jails are enabled by default.
|
|
'';
|
|
};
|
|
|
|
package = mkPackageOption pkgs "fail2ban" {
|
|
example = "fail2ban_0_11";
|
|
};
|
|
|
|
packageFirewall = mkOption {
|
|
default = config.networking.firewall.package;
|
|
defaultText = literalExpression "config.networking.firewall.package";
|
|
type = types.package;
|
|
description = "The firewall package used by fail2ban service. Defaults to the package for your firewall (iptables or nftables).";
|
|
};
|
|
|
|
extraPackages = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.package;
|
|
example = lib.literalExpression "[ pkgs.ipset ]";
|
|
description = ''
|
|
Extra packages to be made available to the fail2ban service. The example contains
|
|
the packages needed by the `iptables-ipset-proto6` action.
|
|
'';
|
|
};
|
|
|
|
bantime = mkOption {
|
|
default = "10m";
|
|
type = types.str;
|
|
example = "1h";
|
|
description = "Number of seconds that a host is banned.";
|
|
};
|
|
|
|
maxretry = mkOption {
|
|
default = 3;
|
|
type = types.ints.unsigned;
|
|
description = "Number of failures before a host gets banned.";
|
|
};
|
|
|
|
banaction = mkOption {
|
|
default = if config.networking.nftables.enable then "nftables-multiport" else "iptables-multiport";
|
|
defaultText = literalExpression ''if config.networking.nftables.enable then "nftables-multiport" else "iptables-multiport"'';
|
|
type = types.str;
|
|
description = ''
|
|
Default banning action (e.g. iptables, iptables-new, iptables-multiport,
|
|
iptables-ipset-proto6-allports, shorewall, etc). It is used to
|
|
define action_* variables. Can be overridden globally or per
|
|
section within jail.local file
|
|
'';
|
|
};
|
|
|
|
banaction-allports = mkOption {
|
|
default = if config.networking.nftables.enable then "nftables-allports" else "iptables-allports";
|
|
defaultText = literalExpression ''if config.networking.nftables.enable then "nftables-allports" else "iptables-allports"'';
|
|
type = types.str;
|
|
description = ''
|
|
Default banning action (e.g. iptables, iptables-new, iptables-multiport,
|
|
shorewall, etc) for "allports" jails. It is used to define action_* variables. Can be overridden
|
|
globally or per section within jail.local file
|
|
'';
|
|
};
|
|
|
|
bantime-increment.enable = mkOption {
|
|
default = false;
|
|
type = types.bool;
|
|
description = ''
|
|
"bantime.increment" allows to use database for searching of previously banned ip's to increase
|
|
a default ban time using special formula, default it is banTime * 1, 2, 4, 8, 16, 32 ...
|
|
'';
|
|
};
|
|
|
|
bantime-increment.rndtime = mkOption {
|
|
default = null;
|
|
type = types.nullOr types.str;
|
|
example = "8m";
|
|
description = ''
|
|
"bantime.rndtime" is the max number of seconds using for mixing with random time
|
|
to prevent "clever" botnets calculate exact time IP can be unbanned again
|
|
'';
|
|
};
|
|
|
|
bantime-increment.maxtime = mkOption {
|
|
default = null;
|
|
type = types.nullOr types.str;
|
|
example = "48h";
|
|
description = ''
|
|
"bantime.maxtime" is the max number of seconds using the ban time can reach (don't grows further)
|
|
'';
|
|
};
|
|
|
|
bantime-increment.factor = mkOption {
|
|
default = null;
|
|
type = types.nullOr types.str;
|
|
example = "4";
|
|
description = ''
|
|
"bantime.factor" is a coefficient to calculate exponent growing of the formula or common multiplier,
|
|
default value of factor is 1 and with default value of formula, the ban time grows by 1, 2, 4, 8, 16 ...
|
|
'';
|
|
};
|
|
|
|
bantime-increment.formula = mkOption {
|
|
default = null;
|
|
type = types.nullOr types.str;
|
|
example = "ban.Time * math.exp(float(ban.Count+1)*banFactor)/math.exp(1*banFactor)";
|
|
description = ''
|
|
"bantime.formula" used by default to calculate next value of ban time, default value bellow,
|
|
the same ban time growing will be reached by multipliers 1, 2, 4, 8, 16, 32 ...
|
|
'';
|
|
};
|
|
|
|
bantime-increment.multipliers = mkOption {
|
|
default = null;
|
|
type = types.nullOr types.str;
|
|
example = "1 2 4 8 16 32 64";
|
|
description = ''
|
|
"bantime.multipliers" used to calculate next value of ban time instead of formula, corresponding
|
|
previously ban count and given "bantime.factor" (for multipliers default is 1);
|
|
following example grows ban time by 1, 2, 4, 8, 16 ... and if last ban count greater as multipliers count,
|
|
always used last multiplier (64 in example), for factor '1' and original ban time 600 - 10.6 hours
|
|
'';
|
|
};
|
|
|
|
bantime-increment.overalljails = mkOption {
|
|
default = null;
|
|
type = types.nullOr types.bool;
|
|
example = true;
|
|
description = ''
|
|
"bantime.overalljails" (if true) specifies the search of IP in the database will be executed
|
|
cross over all jails, if false (default), only current jail of the ban IP will be searched.
|
|
'';
|
|
};
|
|
|
|
ignoreIP = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
example = [ "192.168.0.0/16" "2001:DB8::42" ];
|
|
description = ''
|
|
"ignoreIP" can be a list of IP addresses, CIDR masks or DNS hosts. Fail2ban will not ban a host which
|
|
matches an address in this list. Several addresses can be defined using space (and/or comma) separator.
|
|
'';
|
|
};
|
|
|
|
daemonSettings = mkOption {
|
|
inherit (configFormat) type;
|
|
|
|
defaultText = literalExpression ''
|
|
{
|
|
Definition = {
|
|
logtarget = "SYSLOG";
|
|
socket = "/run/fail2ban/fail2ban.sock";
|
|
pidfile = "/run/fail2ban/fail2ban.pid";
|
|
dbfile = "/var/lib/fail2ban/fail2ban.sqlite3";
|
|
};
|
|
}
|
|
'';
|
|
description = ''
|
|
The contents of Fail2ban's main configuration file.
|
|
It's generally not necessary to change it.
|
|
'';
|
|
};
|
|
|
|
jails = mkOption {
|
|
default = { };
|
|
example = literalExpression ''
|
|
{
|
|
apache-nohome-iptables = {
|
|
settings = {
|
|
# Block an IP address if it accesses a non-existent
|
|
# home directory more than 5 times in 10 minutes,
|
|
# since that indicates that it's scanning.
|
|
filter = "apache-nohome";
|
|
action = '''iptables-multiport[name=HTTP, port="http,https"]''';
|
|
logpath = "/var/log/httpd/error_log*";
|
|
backend = "auto";
|
|
findtime = 600;
|
|
bantime = 600;
|
|
maxretry = 5;
|
|
};
|
|
};
|
|
dovecot = {
|
|
settings = {
|
|
# block IPs which failed to log-in
|
|
# aggressive mode add blocking for aborted connections
|
|
filter = "dovecot[mode=aggressive]";
|
|
maxretry = 3;
|
|
};
|
|
};
|
|
};
|
|
'';
|
|
type = with types; attrsOf (either lines (submodule ({ name, ... }: {
|
|
options = {
|
|
enabled = mkEnableOption "this jail." // {
|
|
default = true;
|
|
readOnly = name == "DEFAULT";
|
|
};
|
|
|
|
filter = mkOption {
|
|
type = nullOr (either str configFormat.type);
|
|
|
|
default = null;
|
|
description = "Content of the filter used for this jail.";
|
|
};
|
|
|
|
settings = mkOption {
|
|
inherit (settingsFormat) type;
|
|
|
|
default = { };
|
|
description = "Additional settings for this jail.";
|
|
};
|
|
};
|
|
})));
|
|
description = ''
|
|
The configuration of each Fail2ban “jail”. A jail
|
|
consists of an action (such as blocking a port using
|
|
{command}`iptables`) that is triggered when a
|
|
filter applied to a log file triggers more than a certain
|
|
number of times in a certain time period. Actions are
|
|
defined in {file}`/etc/fail2ban/action.d`,
|
|
while filters are defined in
|
|
{file}`/etc/fail2ban/filter.d`.
|
|
|
|
NixOS comes with a default `sshd` jail;
|
|
for it to work well,
|
|
{option}`services.openssh.logLevel` should be set to
|
|
`"VERBOSE"` or higher so that fail2ban
|
|
can observe failed login attempts.
|
|
This module sets it to `"VERBOSE"` if
|
|
not set otherwise, so enabling fail2ban can make SSH logs
|
|
more verbose.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
assertions = [
|
|
{
|
|
assertion = cfg.bantime-increment.formula == null || cfg.bantime-increment.multipliers == null;
|
|
message = ''
|
|
Options `services.fail2ban.bantime-increment.formula` and `services.fail2ban.bantime-increment.multipliers` cannot be both specified.
|
|
'';
|
|
}
|
|
];
|
|
|
|
warnings = mkIf (!config.networking.firewall.enable && !config.networking.nftables.enable) [
|
|
"fail2ban can not be used without a firewall"
|
|
];
|
|
|
|
environment.systemPackages = [ cfg.package ];
|
|
|
|
environment.etc = {
|
|
"fail2ban/fail2ban.local".source = fail2banConf;
|
|
"fail2ban/jail.local".source = jailConf;
|
|
"fail2ban/fail2ban.conf".source = "${cfg.package}/etc/fail2ban/fail2ban.conf";
|
|
"fail2ban/jail.conf".source = "${cfg.package}/etc/fail2ban/jail.conf";
|
|
"fail2ban/paths-common.conf".source = "${cfg.package}/etc/fail2ban/paths-common.conf";
|
|
"fail2ban/paths-nixos.conf".source = pathsConf;
|
|
"fail2ban/action.d".source = "${cfg.package}/etc/fail2ban/action.d/*.conf";
|
|
"fail2ban/filter.d".source = "${cfg.package}/etc/fail2ban/filter.d/*.conf";
|
|
} // (mapAttrs' mkFilter (filterAttrs (_: v: v.filter != null && !builtins.isString v.filter) attrsJails));
|
|
|
|
systemd.packages = [ cfg.package ];
|
|
systemd.services.fail2ban = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
partOf = optional config.networking.firewall.enable "firewall.service";
|
|
|
|
restartTriggers = [ fail2banConf jailConf pathsConf ];
|
|
|
|
path = [ cfg.package cfg.packageFirewall pkgs.iproute2 ] ++ cfg.extraPackages;
|
|
|
|
serviceConfig = {
|
|
# Capabilities
|
|
CapabilityBoundingSet = [ "CAP_AUDIT_READ" "CAP_DAC_READ_SEARCH" "CAP_NET_ADMIN" "CAP_NET_RAW" ];
|
|
# Security
|
|
NoNewPrivileges = true;
|
|
# Directory
|
|
RuntimeDirectory = "fail2ban";
|
|
RuntimeDirectoryMode = "0750";
|
|
StateDirectory = "fail2ban";
|
|
StateDirectoryMode = "0750";
|
|
LogsDirectory = "fail2ban";
|
|
LogsDirectoryMode = "0750";
|
|
# Sandboxing
|
|
ProtectSystem = "strict";
|
|
ProtectHome = true;
|
|
PrivateTmp = true;
|
|
PrivateDevices = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectKernelModules = true;
|
|
ProtectControlGroups = true;
|
|
};
|
|
};
|
|
|
|
# Defaults for the daemon settings
|
|
services.fail2ban.daemonSettings.Definition = {
|
|
logtarget = mkDefault "SYSLOG";
|
|
socket = mkDefault "/run/fail2ban/fail2ban.sock";
|
|
pidfile = mkDefault "/run/fail2ban/fail2ban.pid";
|
|
dbfile = mkDefault "/var/lib/fail2ban/fail2ban.sqlite3";
|
|
};
|
|
|
|
# Add some reasonable default jails. The special "DEFAULT" jail
|
|
# sets default values for all other jails.
|
|
services.fail2ban.jails = mkMerge [
|
|
{
|
|
DEFAULT.settings = (optionalAttrs cfg.bantime-increment.enable
|
|
({ "bantime.increment" = cfg.bantime-increment.enable; } // (mapAttrs'
|
|
(name: nameValuePair "bantime.${name}")
|
|
(filterAttrs (n: v: v != null && n != "enable") cfg.bantime-increment))
|
|
)
|
|
) // {
|
|
# Miscellaneous options
|
|
inherit (cfg) banaction maxretry bantime;
|
|
ignoreip = ''127.0.0.1/8 ${optionalString config.networking.enableIPv6 "::1"} ${concatStringsSep " " cfg.ignoreIP}'';
|
|
backend = "systemd";
|
|
# Actions
|
|
banaction_allports = cfg.banaction-allports;
|
|
};
|
|
}
|
|
|
|
# Block SSH if there are too many failing connection attempts.
|
|
(mkIf config.services.openssh.enable {
|
|
sshd.settings.port = mkDefault (concatMapStringsSep "," builtins.toString config.services.openssh.ports);
|
|
})
|
|
];
|
|
|
|
# Benefits from verbose sshd logging to observe failed login attempts,
|
|
# so we set that here unless the user overrode it.
|
|
services.openssh.settings.LogLevel = mkDefault "VERBOSE";
|
|
};
|
|
}
|