[Spce-user] IP & User ban feature are not working correctly anymore in mr4.5.5

Matthias Hohl matthias.hohl at telematica.at
Tue Sep 19 11:20:30 EDT 2017


Hey,

 

Anybody a hint for me?

 

thanks

 

 

Von: Spce-user [mailto:spce-user-bounces at lists.sipwise.com] Im Auftrag von
Matthias Hohl
Gesendet: Freitag, 15. September 2017 13:10
An: spce-user at lists.sipwise.com
Betreff: [Spce-user] IP & User ban feature are not working correctly anymore
in mr4.5.5

 

Hello,

 

i did today a test on a testing enviroment with a device where i put in a
wrong password.

Normally this username and the ip adress should be blocked from spce and
fail2ban for 1 hour.

But it looks like that this is not working.

 

In kamailio-lb.log i see about 6 times a REGISTER request each minute and a
Reply from Inbound - S=401 - Unauthorized M=REGISTER

But the username nor the IP get blocked.

 

As far as i can remember, by wrong password, shoud there be not a
"Consecutive Authentication Failure" message in the log file?

i can't see this anywhere.

 

 

What i want?

If there are more then 100 messages in 2 seconds, the ip should be blocked
for 1 hour. (ngcp rule)

If there is more then 10 failed authentification of a username, the username
should be blocked for 1 hour. (ngcp rule)

If there is more then 10 failed authentification of a username in 1 hour,
the ip adress of the request should be blocked for 1 hour. (fail2ban rule
but actually deactivated) 

If there is a malicious UA, the ip oft he request should be blocked.
(fail2ban rule)

 

Can you tell me whats wrong?

I believe in older SPCE version my config worked. But in the latest not.
Maybe cause you introduce a new spce firewall?

 

 

 

The config

====================

 

Config.yml:

    security:

      dos_ban_enable: yes

      dos_ban_time: '3600'

      dos_reqs_density_per_unit: '100'

      dos_sampling_time_unit: '2'

      dos_whitelisted_ips: []

      dos_whitelisted_subnets: []

      failed_auth_attempts: '10'

      failed_auth_ban_enable: yes

      failed_auth_ban_time: '3600'

 

 

 

fail2ban: jail.conf

[kamailio-iptables]

enabled = true

filter = kamailio

action = iptables-allports[name=KAMAILIO, protocol=all]

logpath = /var/log/ngcp/kamailio-lb.log

maxretry = 1

findtime = 3600

bantime = 3600

 

 

 

kamailio.conf

[Definition]

# filter for kamailio messages

failregex = Request rejected, malicious UA='.*' from IP='<HOST>

# Consecutive Authentication Failure for '.*' UA='.*' IP='<HOST>'

 

 

 

Kamailio.cfg.customtt.tt2

Request_route:

    ## filtering by UA : blacklist

    if( is_method("REGISTER|INVITE") && ($ua =~ "friendly-scanner" || $ua =~
"friendly-request" || $ua =~ "sipvicious" || $ua =~ "^sipcli.+") )

    {

        xlog("L_WARN", "Request rejected, malicious UA='$ua' from IP=$si -
[% logreq_init -%]\n");

        exit;

    }

 

 

 

root at spce:~# iptables -L

Chain INPUT (policy ACCEPT)

target     prot opt source               destination

fail2ban-KAMAILIO  all  --  anywhere             anywhere

fail2ban-ssh  tcp  --  anywhere             anywhere             multiport
dports ssh

 

Chain FORWARD (policy DROP)

target     prot opt source               destination

 

Chain OUTPUT (policy ACCEPT)

target     prot opt source               destination

 

Chain fail2ban-KAMAILIO (1 references)

target     prot opt source               destination

RETURN     all  --  anywhere             anywhere

 

Chain fail2ban-ssh (1 references)

target     prot opt source               destination

REJECT     all  --  117.71.18.20         anywhere             reject-with
icmp-port-unreachable

RETURN     all  --  anywhere             anywhere

 

Chain rtpengine (0 references)

target     prot opt source               destination

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sipwise.com/pipermail/spce-user_lists.sipwise.com/attachments/20170919/17a5c271/attachment-0001.html>


More information about the Spce-user mailing list