[Spce-user] IP & User ban feature are not working correctly anymore in mr4.5.5
Matthias Hohl
matthias.hohl at telematica.at
Tue Sep 19 11:20:30 EDT 2017
Hey,
Anybody a hint for me?
thanks
Von: Spce-user [mailto:spce-user-bounces at lists.sipwise.com] Im Auftrag von
Matthias Hohl
Gesendet: Freitag, 15. September 2017 13:10
An: spce-user at lists.sipwise.com
Betreff: [Spce-user] IP & User ban feature are not working correctly anymore
in mr4.5.5
Hello,
i did today a test on a testing enviroment with a device where i put in a
wrong password.
Normally this username and the ip adress should be blocked from spce and
fail2ban for 1 hour.
But it looks like that this is not working.
In kamailio-lb.log i see about 6 times a REGISTER request each minute and a
Reply from Inbound - S=401 - Unauthorized M=REGISTER
But the username nor the IP get blocked.
As far as i can remember, by wrong password, shoud there be not a
"Consecutive Authentication Failure" message in the log file?
i can't see this anywhere.
What i want?
If there are more then 100 messages in 2 seconds, the ip should be blocked
for 1 hour. (ngcp rule)
If there is more then 10 failed authentification of a username, the username
should be blocked for 1 hour. (ngcp rule)
If there is more then 10 failed authentification of a username in 1 hour,
the ip adress of the request should be blocked for 1 hour. (fail2ban rule
but actually deactivated)
If there is a malicious UA, the ip oft he request should be blocked.
(fail2ban rule)
Can you tell me whats wrong?
I believe in older SPCE version my config worked. But in the latest not.
Maybe cause you introduce a new spce firewall?
The config
====================
Config.yml:
security:
dos_ban_enable: yes
dos_ban_time: '3600'
dos_reqs_density_per_unit: '100'
dos_sampling_time_unit: '2'
dos_whitelisted_ips: []
dos_whitelisted_subnets: []
failed_auth_attempts: '10'
failed_auth_ban_enable: yes
failed_auth_ban_time: '3600'
fail2ban: jail.conf
[kamailio-iptables]
enabled = true
filter = kamailio
action = iptables-allports[name=KAMAILIO, protocol=all]
logpath = /var/log/ngcp/kamailio-lb.log
maxretry = 1
findtime = 3600
bantime = 3600
kamailio.conf
[Definition]
# filter for kamailio messages
failregex = Request rejected, malicious UA='.*' from IP='<HOST>
# Consecutive Authentication Failure for '.*' UA='.*' IP='<HOST>'
Kamailio.cfg.customtt.tt2
Request_route:
## filtering by UA : blacklist
if( is_method("REGISTER|INVITE") && ($ua =~ "friendly-scanner" || $ua =~
"friendly-request" || $ua =~ "sipvicious" || $ua =~ "^sipcli.+") )
{
xlog("L_WARN", "Request rejected, malicious UA='$ua' from IP=$si -
[% logreq_init -%]\n");
exit;
}
root at spce:~# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
fail2ban-KAMAILIO all -- anywhere anywhere
fail2ban-ssh tcp -- anywhere anywhere multiport
dports ssh
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain fail2ban-KAMAILIO (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
Chain fail2ban-ssh (1 references)
target prot opt source destination
REJECT all -- 117.71.18.20 anywhere reject-with
icmp-port-unreachable
RETURN all -- anywhere anywhere
Chain rtpengine (0 references)
target prot opt source destination
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sipwise.com/pipermail/spce-user_lists.sipwise.com/attachments/20170919/17a5c271/attachment-0001.html>
More information about the Spce-user
mailing list