forked from jan-leila/nix-config
		
	
		
			
				
	
	
		
			74 lines
		
	
	
	
		
			2.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			74 lines
		
	
	
	
		
			2.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| {
 | |
|   lib,
 | |
|   pkgs,
 | |
|   config,
 | |
|   ...
 | |
| }: let
 | |
|   dataFolder = "/var/lib/fail2ban";
 | |
|   dataFile = "fail2ban.sqlite3";
 | |
| in {
 | |
|   config = lib.mkIf config.services.fail2ban.enable (lib.mkMerge [
 | |
|     {
 | |
|       environment.etc = {
 | |
|         "fail2ban/filter.d/nginx.local".text = lib.mkIf config.services.nginx.enable (
 | |
|           pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
 | |
|             [Definition]
 | |
|             failregex = "limiting requests, excess:.* by zone.*client: <HOST>"
 | |
|           '')
 | |
|         );
 | |
|       };
 | |
| 
 | |
|       services.fail2ban = {
 | |
|         maxretry = 5;
 | |
|         ignoreIP = [
 | |
|           # Whitelist local networks
 | |
|           "10.0.0.0/8"
 | |
|           "172.16.0.0/12"
 | |
|           "192.168.0.0/16"
 | |
| 
 | |
|           # tail scale tailnet
 | |
|           "100.64.0.0/10"
 | |
|           "fd7a:115c:a1e0::/48"
 | |
|         ];
 | |
|         bantime = "24h"; # Ban IPs for one day on the first ban
 | |
|         bantime-increment = {
 | |
|           enable = true; # Enable increment of bantime after each violation
 | |
|           formula = "ban.Time * math.exp(float(ban.Count+1)*banFactor)/math.exp(1*banFactor)";
 | |
|           maxtime = "168h"; # Do not ban for more than 1 week
 | |
|           overalljails = true; # Calculate the ban time based on all the violations
 | |
|         };
 | |
|         jails = {
 | |
|           nginx-iptables.settings = lib.mkIf config.services.nginx.enable {
 | |
|             enabled = true;
 | |
|             filter = "nginx";
 | |
|             action = ''iptables-multiport[name=HTTP, port="http,https"]'';
 | |
|             backend = "auto";
 | |
|             findtime = 600;
 | |
|             bantime = 600;
 | |
|             maxretry = 5;
 | |
|           };
 | |
|           # TODO; figure out if there is any fail2ban things we can do on searx
 | |
|           # searx-iptables.settings = lib.mkIf config.services.searx.enable {};
 | |
|         };
 | |
|       };
 | |
|     }
 | |
|     (lib.mkIf config.host.impermanence.enable {
 | |
|       assertions = [
 | |
|         {
 | |
|           assertion = config.services.fail2ban.daemonSettings.Definition.dbfile == "${dataFolder}/${dataFile}";
 | |
|           message = "fail2ban data file does not match persistence";
 | |
|         }
 | |
|       ];
 | |
| 
 | |
|       environment.persistence."/persist/system/root" = {
 | |
|         directories = [
 | |
|           {
 | |
|             directory = dataFolder;
 | |
|             user = "fail2ban";
 | |
|             group = "fail2ban";
 | |
|           }
 | |
|         ];
 | |
|       };
 | |
|     })
 | |
|   ]);
 | |
| }
 |