docker-fail2ban
Fail2Ban
Our great sponsors
docker-fail2ban | Fail2Ban | |
---|---|---|
9 | 49 | |
599 | 10,366 | |
- | 4.1% | |
6.6 | 8.8 | |
7 months ago | 21 days ago | |
Dockerfile | Python | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
docker-fail2ban
-
How to secure my self-hosted website?
It does, but it defaults to nftables from (I think) Ubuntu 21 and onwards. So when you're running fail2ban in a docker container, it run an iptables command to block the IP. However, it errors out because nftables is default in Ubuntu 19 onwards (only for new installs). See https://github.com/crazy-max/docker-fail2ban down the page. You can replace the defaults, but I do not want to mess with my docker box at this point!
-
Newbie looking to get a NAS
Nginx Reverse Proxy Manager Lets you redirect traffic from a single machine to all of your VMs and servers as well as manage SSL certificates, you can also do things like deploy Fail2Ban
- Help securing/exposing self-hosted services
-
A working regex for the fallback_access.log in nginx proxy manager
My setup is all docker on the raspberry pi 4 8gb. I can not seem to find a good regex for this log file. All log entries fail when testing. You wish it will put the client entry IP address in iptables. My regex knowledge is zero so I depend on examples (that don't work). I have no problems with the configuration that works fine. The proxy xx access log has a different format, but if someone has a working regex for that file, please let me know. For fail2ban I use https://github.com/crazy-max/docker-fail2ban For NPM I use https://github.com/jc21/nginx-proxy-manager In fail2ban I use the filter.d dir for the conf file. I can see it's loading in the log but the testing from within the docker image gives no result.
-
Possible to redirect container logs to file
My setup right now includes - Rootless Docker (can read and maybe write to journald, syslog seems to require root but maybe I'm wrong) - Fail2ban in a container crazymax/fail2ban
-
Was my raspberry hacked?
If you are running docker for your stuff, crazy-max dockerized fail2ban works well. Just be sure to export any form of logs out of what you want to protect and into the fail2ban container.
-
fail2ban for reverse proxy inside docker
You can use the following docker image to spawn an instance of fail2ban: https://github.com/crazy-max/docker-fail2ban
-
Is putting fail2ban/ufw in front of Docker+Traefik v2 necessary? How do Docker+Traefik handle the same need?
https://github.com/crazy-max/docker-fail2ban#custom-jails-actions-and-filters
Fail2Ban
-
Looking for a way to remote in to K's of raspberry pi's...
now some things you need to think about: - cloud init - this will need to be secure so lock it down hard anything not needed an alternative OS to look at if you have the ability's is https://www.alpinelinux.org/ also as these devices are not that powerfull every extra agent / abstaction layer you add impacts performance need to look at low over head security https://www.crowdsec.net/ and https://github.com/fail2ban/fail2ban (if you call fail2ban security) - using certificates to authenticate ssh login
- Fail2Ban
- Fail2Ban – Daemon to ban hosts that cause multiple authentication errors
-
I am (to be) a web designer, how to ensure security on a vps?
See https://github.com/fail2ban/fail2ban for beginner's guide, basically you set it up to monitor logfiles and it would act accordingly (plenty of built-in config to handle various daemons so you don't have to write yourself).
-
Home Lab Setup Recommendations
- Nginx & crowdsec/fail2ban if you are exposing your parts (services) to the public ( https://hub.docker.com/r/baudneo/nginx-proxy-manager, https://www.crowdsec.net, https://www.fail2ban.org )
-
fail2ban not notifying Cloudflare
— In /etc/fail2ban/action.d/cloudflare.conf I copied the file from https://github.com/fail2ban/fail2ban/blob/master/config/action.d/cloudflare.confand added my ‘cftoken’ and ‘cfuser’ on the bottom
-
Firewall rules beyond "deny incoming, enable only the ports that you need"
https://github.com/fail2ban/fail2ban is a mature, easy to set up way to have some dynamic firewall rules that respond to attacks. There are more sophisticated options, but they are probably not worth the return on time investment for you.
-
Comments/Suggestions on security-auditing different services
You can create your own regexes for custom services: https://github.com/fail2ban/fail2ban/wiki/Developing-Regex-in-Fail2ban
-
Fail2Ban Limitation
Others seem to be (or were) experiencing this too: https://github.com/fail2ban/fail2ban/issues/3100
What are some alternatives?
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
docker-php-nginx - Docker image with PHP-FPM 8.3 & Nginx 1.24 on Alpine Linux
Suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
docker-rtorrent-rutorrent - rTorrent and ruTorrent Docker image
Snort - Snort++
docker-cloudflared - Cloudflared proxy-dns Docker image
Denyhosts - Automated host blocking from SSH brute force attacks
docker-matomo - Matomo (formerly Piwik) Docker image
OSSEC - OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
AnonAddy-docker - AnonAddy Docker image
pfSense - Main repository for pfSense