Skip to content

zerwes/opnsense-fail2ban

Repository files navigation

pylint License: GPL v3

opnsense-fail2ban

fail2ban action script for opnsense

features

  • uses the opnsense api
  • ban action i.e. add a new IP to the alias
  • unban action i.e. remove a IP from the alias
  • flush action i.e. clear all IPs from the alias
  • list action i.e. display the IPs from the alias
  • optional: check if the IP is listed or removed from the alias
  • optional: kill all states for the IP in questio after adding it to the alias
  • use a predefined alias by default or define it via a argument

usage

usage: opnsense-fail2ban.py [-h] [-l {CRITICAL,FATAL,ERROR,WARN,WARNING,INFO,DEBUG,NOTSET}] [-g GROUP]
                            [-a {ban,unban,flush,list}] [-i IP] [-c] [-k]

manipulate a opnsense alias by adding/removing IPs

optional arguments:
  -h, --help            show this help message and exit
  -l {CRITICAL,FATAL,ERROR,WARN,WARNING,INFO,DEBUG,NOTSET}, --loglevel {CRITICAL,FATAL,ERROR,WARN,WARNING,INFO,DEBUG,NOTSET}
                        set loglevel
  -g GROUP, --group GROUP
                        group/alias for actions (default: {{ opnsense_default_alias }})
  -a {ban,unban,flush,list}, --action {ban,unban,flush,list}
                        action to perform
  -i IP, --ip IP        IP to ban/unban
  -c, --check           re-fetch and check alias after ban/unban
  -k, --kill            kill states after ban action for a IP

requirements

All requirements are defined in requirements.txt.

You can install them using:

pip install -r requirements.txt

On debian and derivates you can use:

apt install python3-simplejson python3-requests

if you prefer to use the package manager instead of pip.

setup

The script uses jinja2 variables, so you have several options:

ansible

Install the script using ansible and define the variables in your ansible var files. See this post for more details.

jinja2-cli

Define your vars in a yaml file jinja2.yml (see sample-jinja2.yml) and run:

make 

This will install jinja2-cli and generate script/opnsense-fail2ban.py with the jinja2 vars replaced according to your settings.

manual

Edit opnsense-fail2ban.py and replace the jinja2 vars:

  • {{ opnsense_api_host }}
  • {{ opnsense_api_key }}
  • {{ opnsense_api_secret }}
  • {{ opnsense_default_alias }}

caveats

ssl

In case you use a self-signed certificate on the opnsense firewall, you must import the opnsense (ca) certificate in order to trust it. And the value defined in opnsense_api_host must be valid in terms of ssl (i.e. the value must match the CN or a DNS or IP entry from the Alternative Names).

opnsense alias

The opnsense alias to use should be of Type: Hosts(s) (https://docs.opnsense.org/manual/aliases.html#alias-types)

diverged alias and fail2ban state

Sometimes it might happen that the state of the alias and the fail2ban database might diverge (this can happen by manual editing the alias etc...).

There is a small script snippet to keep f2b banns and the opnsense alias in sync as a gist: https://gist.github.com/zerwes/f9f659a0751ee3acb6ba8910a9185f3d

links

opnsense api

opnsense certificates

blog post on the topic