jailbird
Jailbird is a fail2ban add on, adding to the standard fail2ban action of dynamically blocking an ip address by creating temporary firewall rules. The main additional action is to further block entire ip ranges for a short period, the default being for 10 minutes. The rational for this is to prevent a continuous attack from a host with a range of addresses. This is likely to be particularly helpful where incoming traffic is ipv6 based.
Its other benefit is the logs it creates, which list every ip address that fail2ban blocks along with the range/s to which they belong and which jailbird itself has blocked. It also includes the NetName or Organization Name, which will naturally be more memorable than addresses and ranges and will help you spot persistent infringers.
In the example log snippet above you see date and time fields followed by the fail2ban jail name. The offending ip address is at the end of each line and is preceded by the net or organization name as recorded by the RIPE database and the range or ranges that were briefly blocked by jailbird.
Installation
Jailbird is written in a combination of lua and bash. So in addition to a running fail2ban instance you need a
lua install and the command line programs
whois and
at.
Download the archive and move it to the base (ie /) of your filesystem and run the following command as root:
You must either rename
/etc/fail2ban/jail.local.example to
/etc/fail2ban/jail.local and edit it to suit your setup or else copy the action lines to your own existing
jail.local. Now fail2ban can be restarted to allow jailbird to hook into to its ban action as defined in
/etc/fail2ban/action.d/jailbird.local. You should also check that the
at daemon is running.
Further Explanation
The
whois cli program is called by
jailbird.local to fetch information about the offending ip address. If it is an ipv6 address the cidr notation for the parent range is extracted as is. Such information for ipv4 addresses seems to often be inaccurate, so instead the network start and end addresses are grabbed and the network's cidr notation is calculated.
A DROP rule is added to the iptables firewall and an at job is created to remove the rule in 10 minutes, or in whatever time the DELAY variable holds. The log line is written as the DROP rule is created and network name information from the whois lookup is added.
The ipv4 calculations are performed by the cidr.lua program, which can also be used as a standalone network information and calculation tool. Simple run cidr.lua to see help with this.
Links
Here's some useful information on running fail2ban on a Debian
web and email server and
nameserver.