fail2ban or similar concept

Matthew Newton mcn at freeradius.org
Fri Sep 2 03:31:22 UTC 2022



On 02/09/2022 04:20, Brantley Padgett via Freeradius-Users wrote:
> I guess what I mean is for example, just combing through the logs of the soon to be retired server and I see one IP in particular that has made failed auth requests 1.9mil times since Jun 2022. That IP is not one of ours and it just seems to me reckless to allow that to happen unchecked.

Which is why you run RADIUS servers on internal back-end networks that 
are not publicly available.

Don't permit IPs that are not yours from having access to the RADIUS 
server in the first place.

> I wanted to check if freeradius had some form of limiting/banning built in that I just didn't understand before trying to make something like fail2ban work.

No, because you don't expose your RADIUS server to the world.

But if you have logs identify IPs you want to block, that's exactly what 
fail2ban is for - get it to add a firewall rule like you would do for 
any other service. As Alan said, FreeRADIUS already ignores any unknown 
clients anyway, so you'd just firewall out the noise.

-- 
Matthew


More information about the Freeradius-Users mailing list