ModSecurity and fail2ban can be used as an open source intrusion prevention system.
The setup is pretty straight forward:
ModSecurityto detect some attacks against your system
fail2banto read the
ModSecurityaudit log file
Install a commercial ruleset or open source ruleset, such as the OWASP ModSecurity Core Rule Set, for your ModSecurity web application firewall.
One of the neat tricks in the OWASP ruleset is that if your application raises an exception or certain content appears to leak out then it triggers a
403 Unauthorized HTTP response rather than returning the content to a potential attacker.
This error condition can be detected by
fail2ban through the next configuration example.
An example configuration for ModSecurity
This is the filter for the mod_security audit file.
# Fail2Ban configuration file # # Author: Florian Roth [Definition] failregex = \[.*?\]\s[\w-]*\s<HOST>\s ignoreregex =
You can read more about this filter at HOWTO fail2ban with ModSecurity2.5 (fail2ban.org).
# # HTTP servers # [modsec] enabled = true filter = modsec action = iptables-multiport[name=ModSec, port="http,https"] sendmail-buffered[name=ModSec, lines=5, email@example.com] logpath = /var/log/apache2/modsec_audit.log bantime = 172800 maxretry = 3 [apache] enabled = true port = http,https filter = apache-auth logpath = /var/log/apache*/*error.log maxretry = 6
Now that you have a way to detect exceptions in your web application and to push rules to a firewall to block offending IP addresses for a period of time, you can design your web application to work in concert with the network level tools to respond to an attack against your app.
For example, if your application detects that a user is doing something unauthorized raise and exception and after the 3rd attempt that IP address will be blocked for 48 hours! Perhaps, you can craft a rule the detects the presence of honey tokens that triggers an immediately lockout and notifies your security response team of an active attack! In other words, booby trap your application!
- How To Set Up mod_security with Apache on Debian/Ubuntu (digitalocean.com)
- Tuning and managing modsecurity rules (atomicorp.com)
- How To Protect SSH with fail2ban on Ubuntu 12.04 (digitalocean.com)
- Detecting Malice with ModSecurity: HoneyTraps (spiderlabs.com)
- HOWTO fail2ban with ModSecurity2.5 (fail2ban.org)