Difference between revisions of "Telephone system:fail2ban"

From Hackerspace ACKspace
Jump to: navigation, search
m (added reload commands)
(Added unauthorized targeted call filter)
 
Line 27: Line 27:
 
</pre>
 
</pre>
  
 +
And after <code><X-PRE-PROCESS cmd="include" data="public/*.xml"/></code>, you can place the following
 +
(note that this only applies to setups that allow certain public extensions/incoming trunks while also having (dynamic IP) users logged into their extension remotely (gained access by responding to the <code>407 Proxy authentication required</code>):
 +
<pre>
 +
<extension name="check_auth" continue="true">
 +
  <condition field="${sip_authorized}" expression="^true$" break="never">
 +
    <anti-action application="log" data="WARNING flag unauthorized: ${network_addr} (from ${sip_from_uri} to ${sip_to_uri})"/>
 +
    <anti-action application="respond" data="407"/>
 +
  </condition>
 +
</extension>
 +
</pre>
  
 
'''/etc/fail2ban/filter.d/freeswitch.conf'''
 
'''/etc/fail2ban/filter.d/freeswitch.conf'''
Line 44: Line 54:
 
ignoreregex =
 
ignoreregex =
 
</pre>
 
</pre>
 +
 +
 +
'''/etc/fail2ban/filter.d/freeswitch-reg-dos.conf'''
 +
<pre>
 +
[Definition]
 +
# Remote is trying to call without permission
 +
failregex = \[WARNING\] mod_dptools\.c:\d+ flag unauthorized: <HOST> \(from [^ ]* to [^ ]*\)$
 +
ignoreregex =
 +
</pre>
 +
  
 
'''/etc/fail2ban/jail.local'''
 
'''/etc/fail2ban/jail.local'''
Line 64: Line 84:
 
findtime = 300
 
findtime = 300
 
maxretry = 0
 
maxretry = 0
 +
# ban for a week
 +
bantime  = 604800
 +
action  = iptables-allports[name=freeswitch, protocol=all]
 +
 +
[freeswitch-reg-dos]
 +
enabled  = true
 +
port    = 5060,5061,5080,5081
 +
filter  = freeswitch-reg
 +
logpath  = /var/log/freeswitch/freeswitch.log
 +
findtime = 3600
 +
maxretry = 10
 
# ban for a week
 
# ban for a week
 
bantime  = 604800
 
bantime  = 604800

Latest revision as of 10:15, 23 December 2020

If you have a FreeSWITCH instance running on the public net, changes are people will try to exploit it. Fail2ban tries to mitigate this. This is a re-attempt since the alternative perl autoblock script would freeze/hang.


Forget the provided configs both of fail2ban and FreeSWITCH itself (here is a defect stating more or less the same): try these instead and keep an eye on the logs with tail -f /var/log/fail2ban.log for a while, together with a realtime FS log. Also, make sure the logpath is correct.

/etc/freeswitch/dialplan/public.xml before the subsirectory includes:

<extension name="IP based call">
  <condition field="${acl(${network_addr} trunks)}" expression="false"/>
  <condition field="${sip_to_host}" expression="${local_ip_v4}">
    <action application="log" data="WARNING IP based INVITE not from trunk ${network_addr}"/>
    <action application="respond" data="403"/>
  </condition>
</extension>

<extension name="Vicious scanners">
  <condition field="${acl(${network_addr} trunks)}" expression="false"/>
  <condition regex="any">
    <regex field="${sip_to_host}" expression="1\.1\.1\.1"/>
    <regex field="${sip_user_agent}" expression="friendly-scanner"/>
    <action application="log" data="WARNING vicious INVITE not from trunk ${network_addr}"/>
    <action application="respond" data="488"/>
  </condition>
</extension>

And after <X-PRE-PROCESS cmd="include" data="public/*.xml"/>, you can place the following (note that this only applies to setups that allow certain public extensions/incoming trunks while also having (dynamic IP) users logged into their extension remotely (gained access by responding to the 407 Proxy authentication required):

<extension name="check_auth" continue="true">
  <condition field="${sip_authorized}" expression="^true$" break="never">
    <anti-action application="log" data="WARNING flag unauthorized: ${network_addr} (from ${sip_from_uri} to ${sip_to_uri})"/>
    <anti-action application="respond" data="407"/>
  </condition>
</extension>

/etc/fail2ban/filter.d/freeswitch.conf

Definition]
# NOTE: don't trigger on challenge, only failure
failregex = ^\.\d+ \[WARNING\] sofia_reg\.c:\d+ SIP auth failure \((REGISTER|INVITE)\) on sofia profile \'[^']+\' for \[.*\] from ip <HOST>$
            ^\.\d+ \[WARNING\] sofia_reg\.c:\d+ Can't find user \[\d+@\d+\.\d+\.\d+\.\d+\] from <HOST>$
ignoreregex =

/etc/fail2ban/filter.d/freeswitch-ip.conf

[Definition]
# Remote is calling us by IP in stead of name
failregex = ^.*(IP based|vicious) INVITE not from trunk <HOST>$
ignoreregex =


/etc/fail2ban/filter.d/freeswitch-reg-dos.conf

[Definition]
# Remote is trying to call without permission
failregex = \[WARNING\] mod_dptools\.c:\d+ flag unauthorized: <HOST> \(from [^ ]* to [^ ]*\)$
ignoreregex =


/etc/fail2ban/jail.local

[freeswitch]
enabled  = true
port     = 5060,5061,5080,5081
filter   = freeswitch
logpath  = /var/log/freeswitch/freeswitch.log
maxretry = 4 ; for a total of five failures
findtime = 3600
bantime  = 28800 ; 1200=20m, 7200=2h, 28800=8h
action = iptables-allports[name=freeswitch, protocol=all]

[freeswitch-ip]
enabled  = true
port     = 5060,5061,5080,5081
filter   = freeswitch-ip
logpath  = /var/log/freeswitch/freeswitch.log
findtime = 300
maxretry = 0
# ban for a week
bantime  = 604800
action   = iptables-allports[name=freeswitch, protocol=all]

[freeswitch-reg-dos]
enabled  = true
port     = 5060,5061,5080,5081
filter   = freeswitch-reg
logpath  = /var/log/freeswitch/freeswitch.log
findtime = 3600
maxretry = 10
# ban for a week
bantime  = 604800
action   = iptables-allports[name=freeswitch, protocol=all]

[DEFAULT]
# Considered safe
# kingofdos.eu 185.66.250.17
# kingofdos.eu 91.218.127.87
# kingofdos.eu 164.138.31.26
# sip.speakup.nl 193.169.138.26
# sip.speakup.nl 193.169.139.26
# self: 666.666.666.666
ignoreip = 127.0.0.1/8 185.66.250.17 91.218.127.87 164.138.31.26 193.169.138.26 193.169.139.26 666.666.666.666
bantime  = 600
maxretry = 3

Apply the new config with service fail2ban reload and fs_cli -x reloadxml