--- # This example configuration file is a good starting point, but you're # strongly encouraged to take a look at the full documentation: https://reaction.ppom.me # # This file is using the well-established YAML configuration language. # Note that the more powerful JSONnet configuration language is also supported # and that the documentation uses JSONnet # definitions are just a place to put chunks of conf you want to reuse in another place # using YAML anchors `&name` and pointers `*name` # definitions are not readed by reaction definitions: - &ip4tablesban [ 'iptables', '-w', '-A', 'reaction', '-s', '', '-j', 'DROP' ] - &ip6tablesban [ 'ip6tables', '-w', '-A', 'reaction', '-s', '', '-j', 'DROP' ] - &ip4tablesunban [ 'iptables', '-w', '-D', 'reaction', '-s', '', '-j', 'DROP' ] - &ip6tablesunban [ 'ip6tables', '-w', '-D', 'reaction', '-s', '', '-j', 'DROP' ] # ip46tables is a minimal C program (only POSIX dependencies) present as a subdirectory. # it permits to handle both ipv4/iptables and ipv6/ip6tables commands # where the state (database) must be read # defaults to . which means reaction's working directory. # The systemd service starts reaction in /var/lib/reaction. state_directory: . # if set to a positive number → max number of concurrent actions # if set to a negative number → no limit # if not specified or set to 0 → defaults to the number of CPUs on the system concurrency: 0 # patterns are substitued in regexes. # when a filter performs an action, it replaces the found pattern patterns: name: # reaction regex syntax is defined here: https://docs.rs/regex/latest/regex/#syntax # common patterns have a 'regex' field regex: '[a-z]+' # patterns can ignore specific strings ignore: - 'cecilia' # patterns can also be ignored based on regexes, it will try to match the whole string detected by the pattern ignoreregex: # ignore names starting with 'jo' - 'jo.*' ip: # patterns can have a special 'ip' type that matches both ipv4 and ipv6 # or 'ipv4' or 'ipv6' to match only that ip version type: ip ignore: - 127.0.0.1 - ::1 # they can also ignore whole CIDR ranges of ip ignorecidr: - 10.0.0.0/8 # last but not least, patterns of type ip, ipv4, ipv6 can also group their matched ips by mask # ipv4mask: 30 # this means that ipv6 matches will be converted to their network part. ipv6mask: 64 # for example,"2001:db8:85a3:9de5::8a2e:370:7334" will be converted to "2001:db8:85a3:9de5::/64". # ipv4: # type: ipv4 # ignore: ... # Those commands will be executed in order at start, before everything else start: - [ 'iptables', '-w', '-N', 'reaction' ] - [ 'ip6tables', '-w', '-N', 'reaction' ] - [ 'iptables', '-w', '-I', 'INPUT', '-p', 'all', '-j', 'reaction' ] - [ 'ip6tables', '-w', '-I', 'INPUT', '-p', 'all', '-j', 'reaction' ] - [ 'iptables', '-w', '-I', 'FORWARD', '-p', 'all', '-j', 'reaction' ] - [ 'ip6tables', '-w', '-I', 'FORWARD', '-p', 'all', '-j', 'reaction' ] # Those commands will be executed in order at stop, after everything else stop: - [ 'iptables', '-w', '-D', 'INPUT', '-p', 'all', '-j', 'reaction' ] - [ 'ip6tables', '-w', '-D', 'INPUT', '-p', 'all', '-j', 'reaction' ] - [ 'iptables', '-w', '-D', 'FORWARD', '-p', 'all', '-j', 'reaction' ] - [ 'ip6tables', '-w', '-D', 'FORWARD', '-p', 'all', '-j', 'reaction' ] - [ 'iptables', '-w', '-F', 'reaction' ] - [ 'ip6tables', '-w', '-F', 'reaction' ] - [ 'iptables', '-w', '-X', 'reaction' ] - [ 'ip6tables', '-w', '-X', 'reaction' ] # streams are commands # they are run and their ouptut is captured # *example:* `tail -f /var/log/nginx/access.log` # their output will be used by one or more filters streams: # streams have a user-defined name ssh: # note that if the command is not in environment's `PATH` # its full path must be given. cmd: [ 'journalctl', '-n0', '-fu', 'sshd.service' ] # filters run actions when they match regexes on a stream filters: # filters have a user-defined name failedlogin: # reaction's regex syntax is defined here: https://docs.rs/regex/latest/regex/#syntax regex: # is predefined in the patterns section # ip's regex is inserted in the following regex - 'authentication failure;.*rhost=' - 'Failed password for .* from ' - 'Invalid user .* from ' - 'Connection (reset|closed) by (authenticating|invalid) user .* ' - 'banner exchange: Connection from port [0-9]*: invalid format' # if retry and retryperiod are defined, # the actions will only take place if a same pattern is # found `retry` times in a `retryperiod` interval retry: 3 # format is defined as follows: # - whitespace between the integer and unit is optional # - integer must be positive (>= 0) # - unit can be one of: # - ms / millis / millisecond / milliseconds # - s / sec / secs / second / seconds # - m / min / mins / minute / minutes # - h / hour / hours # - d / day / days retryperiod: 6h # duplicate specify how to handle matches after an action has already been taken. # 3 options are possible: # - extend (default): update the pending actions' time, so they run later # - ignore: don't do anything, ignore the match # - rerun: run the actions again. so we may have the same pending actions multiple times. # (this was the default before 2.2.0) # duplicate: extend # actions are run by the filter when regexes are matched actions: # actions have a user-defined name ban4: # YAML substitutes *reference by the value anchored at &reference cmd: *ip4tablesban # this optional field permits to run an action only when a pattern of type ip contains an ipv4 ipv4only: true ban6: cmd: *ip6tablesban # this optional field permits to run an action only when a pattern of type ip contains an ipv6 ipv6only: true unban4: cmd: *ip4tablesunban # if after is defined, the action will not take place immediately, but after a specified duration # same format as retryperiod after: '2 days' # let's say reaction is quitting. does it run all those pending commands which had an `after` duration set? # if you want reaction to run those pending commands before exiting, you can set this: # onexit: true # (defaults to false) # here it is not useful because we will flush and delete the chain containing the bans anyway # (with the stop commands) ipv4only: true unban6: cmd: *ip6tablesunban after: '2 days' ipv6only: true mail: cmd: ['sendmail', '...', ''] # some commands, such as alerting commands, are "oneshot". # this means they'll be run only once, and won't be executed again when reaction is restarted oneshot: true # persistence # tldr; when an `after` action is set in a filter, such filter acts as a 'jail', # which is persisted after reboots. # # when a filter is triggered, there are 2 flows: # # if none of its actions have an `after` directive set: # no action will be replayed. # # else (if at least one action has an `after` directive set): # if reaction stops while `after` actions are pending: # and reaction starts again while those actions would still be pending: # reaction executes the past actions (actions without after or with then+after < now) # and plans the execution of future actions (actions with then+after > now)