Verdant TCS

Using Fail2Ban with Cloudflare

6 min read

index

  1. Introduction to Fail2Ban
  2. Using Fail2Ban with WordPress on vCanopy
  3. Using an Action to block IP addresses at Cloudflare
  4. Setting up our Action

Introduction to Fail2Ban

Huge thank you to Ken Wiesner for making this article possible and freely contributing the info to the vCanopy community!

Fail2Ban is an open source intrusion detection software installed and activated by default on vCanopy servers that parses system log files and automatically bans IP addresses that show signs of malicious activity for a set period of time or permanently.

The application itself is composed of three main components:

Filters define the rules by which Fail2Ban will scan local log files for bad behavior. By default, Fail2Ban comes with a library of filters for many popular software packages including SSHD, Nginx, WordPress, and more! Each filter looks for activity like too many bad login attempts, patterns of known exploits, etc.

Actions are commands that tell Fail2Ban what to do when filters are triggered. The default action in most cases is to block an offending IP address in the local firewall.

Jails consist of a filter and one or more actions to be performed.

Using Fail2Ban with WordPress on vCanopy

By using the WP fail2ban plugin, WordPress can send events to Syslog for Fail2Ban to act upon. These events include failed login attempts, spam detection, user enumeration, etc. In addition to installing and activating the plugin, we also need to set up the jails so Fail2Ban knows what to do with these events.

To make this feature robust and easy to implement, we have a GP-CLI command that will install and activate the WP fail2ban plugin as a must-use plugin and configure the necessary jail file. This is accomplished by installing the plugin in the standard plugin directory so that it will automatically update but it is activated by creating a symlink from /mu-plugins to force it to remain active.

The GP-CLI commands to enable/disable WP fail2Ban are as follows. Replace {site.url} with your site primary domain.

gp site {site.url} -enable-wp-fail2ban
gp site {site.url} -disable-wp-fail2ban

Using an Action to block IP addresses at Cloudflare

If you are trying to use Fail2Ban when your site is behind the Cloudflare proxy, there is a problem. While the vCanopy stack will automatically translate the real IP coming through Cloudflare, by default that IP address will be added to the local firewall. The problem is that it won’t do us any good if the attacker continues to be proxied through Cloudflare. The traffic from the attacker will continue to be passed from Cloudflare to the origin server because the local firewall is blocking the attacker’s IP address and not the Cloudflare IP (nor should it as this would block legitimate traffic.)

We can use a custom Fail2Ban action to send IP ban and unban requests to Cloudflare via their v4 API. This has many benefits most notable:

  1. When a ban is put into effect, the traffic will never have to be processed by the origin server. This can save a considerable amount of system resources during an aggressive attack making the Fail2Ban solution much more effective.
  2. If you have multiple servers and they are all configured with the same custom action on the same Cloudflare account, IP bans will be applied to your entire Cloudflare account and apply to each origin server.

UPDATE

At the time of publishing, I had added the following code as the addition to the jail.local:

action = gpcloudflare
    iptables-multiport

It was recently brought to our attention that the integration was no longer working. The fix to get this integration back up and running is to change iptables-multiport to iptables-allports:

action = gpcloudflare
    iptables-allports

Setting up our Actio

To connect F2B and Cloudflare together we need to change the default Cloudflare configuration and add our Cloudflare API details.

STEP 1. COPY YOUR CLOUDFLARE API KEY

If you’re already using Cloudflare with your vCanopy account, these are the same details in your settings page under DNS providers. It requires your Cloudflare account email address and your API key.

If you haven’t yet set Cloudflare up with your vCanopy account, you can follow this guide, and it will also walk you through how to get your API key:

Using Cloudflare with vCanopy

STEP 2. SSH INTO YOUR SERVER

Please see the following articles to get started:

Generate your SSH Key:

Generate SSH Key on Mac

Generate SSH Key on Windows with Putty

Generate SSH Key on Windows with Windows Subsystem for Linux

Generate SSH Key on Windows with Windows CMD/PowerShell

Add your SSH Key to vCanopy:

Add default SSH Keys

Add/Remove an SSH Key to/from an Active vCanopy Server

Connect to your server:

Connect to a vCanopy server by SSH as Root user.

STEP 3. UPDATE THE CLOUDFLARE.CONF

We’re going to update the cloudflare.conf to the latest version that solves some of the previous issues with the unban action. At the time of writing, this was updated on April 27th 2020. This is located on the F2B GitHub here:

https://github.com/fail2ban/fail2ban/blob/master/config/action.d/cloudflare.conf

Previously, I had replaced the contents of cloudflare.conf, however, let’s create a new config instead to ensure nothing gets overwritten in the future. In your server run the following command to create our new config:

nano /etc/fail2ban/action.d/gpcloudflare.conf

Now copy and paste the info from the above GitHub page to add the latest, up-to-date cloudflare.conf code.

Leave the nano editor open and move on to step 4 below to add your Cloudflare account details.

STEP 4. ADD YOUR CLOUDFLARE DETAILS TO CLOUDFLARE.CONF

Still inside the gpcloudflare.conf, scroll down to the bottom of the file with your down arrow key. Here you’ll see the following:

We need to enter our API details:

Ctrl+O and then press enter to save the file. Then Ctrl+X to exit nano.

STEP 4. UPDATE JAIL.LOCAL

We also need to edit the jail.local file to add the Cloudflare action. To edit the file, use the following command:

nano /etc/fail2ban/jail.local

Here we need to add the following to each of our jails (make sure that iptables-multiport is tabbed over as shown in screenshot):

action = gpcloudflare
    iptables-allports

You can add this at the bottom of each jail. Depending on your setup you’ll either have some or all of the following: –

  1. [wordpress-wp-login]
  2. [wordpress-xmlrpc]
  3. [wordpress-hard]
  4. [wordpress-soft]
  5. [wordpress-extra]

Ctrl+O and then press enter to save the file. Then Ctrl+X to exit nano.

STEP 5. RELOAD FAIL2BAN

Now we need to check your syntax and reload Fail2Ban for our changes to take effect:

fail2ban-client -d && service fail2ban restart

All done! Fail2Ban is now configured to work with Cloudflare.

STEP 6. TEST YOUR WORK

In my testing of this, there has been a bit of a delay between getting banned by F2B and this taking effect at Cloudflare. This means the maximum number of login attempts on a site may not work as you have configured it due to this delay.

Because of this, I’m pretty strict with my ban times, and I mention it because that may something you wish to consider as well. For testing purposes though, you may wish to keep this ban time at 2-3 minutes and then increase again afterwards. See the Configuring Fail2Ban article for details.

I recommend you test this with a VPN so as not to get your own IP banned. If not using a VPN you should definitely implement a short ban time so you can get back on to your websites ASAP.

Testing: –

1. Connect to a VPN

2. Open 2-3 of your websites that you manage in your Cloudflare account and that have orange clouds.

3. Start hitting the login button at /wp-login.php on one of the sites until you get banned:

4. Once banned, check your other websites to confirm you’re banned there too.

5. Check your Cloudflare account to confirm the ban and then to confirm that the IP is unbanned after the short period you’ve set.

Search the Knowledge Base

New to vCanopy?

Get started with our FREE Core plan today! We bring the software, you bring the hardware.