AustralianSimon

joined 2 years ago
[–] AustralianSimon@lemmy.world 4 points 1 hour ago

You're going to have to read every single release with breaking changes.

[–] AustralianSimon@lemmy.world 1 points 3 hours ago* (last edited 3 hours ago)

I'm trying to block the most likely attack vectors which is definitely VPS providers at this point in time. I just figure if I am blocking subnets plus additionals I identify it will force them out of these vectors to attack in ways I might be able to report better abuse.

Here check out my analysis.

collapsed inline media

[–] AustralianSimon@lemmy.world 1 points 3 hours ago

No I think f2b handling it would be totally fine for me. Kids got in the way with digging around too much but will try this week.

[–] AustralianSimon@lemmy.world 3 points 20 hours ago

Ahhhmazing, I'll set this up tonight. Really appreciate the help.

[–] AustralianSimon@lemmy.world 2 points 23 hours ago* (last edited 23 hours ago) (2 children)

I've used it on a machine before but given I am using a cloudflared container for ingress, can I route my traffic through a f2b container to the app? This might be ideal from a co fig perspective.

LLMs say yes but I'll need to play around.

[–] AustralianSimon@lemmy.world 3 points 23 hours ago* (last edited 23 hours ago) (2 children)

I have more than 50k but even that page doesn't recommend it.

Top of that page

Recommendation: Use WAF custom rules instead

Cloudflare recommends that you create WAF custom rules instead of IP Access rules to perform IP-based or geography-based blocking (geoblocking):

  • For IP-based blocking, use an IP list in the custom rule expression.

On the fail2ban front, can I run my traffic through a f2b container and out into my app?

[–] AustralianSimon@lemmy.world 2 points 1 day ago (1 children)

How easy is it to configure?

My goal is to download some lists from github and generate one big ban list to feed into the WAF but the community lists of Crowdsec might negate the need.

30
submitted 1 day ago* (last edited 3 hours ago) by AustralianSimon@lemmy.world to c/selfhosted@lemmy.world
 

I'm running a website that is getting a lot of bot traffic and found Cloudflare free rule tier to be a bit limiting. (5 custom rules with length limits)

Ive got subnets for major VPS providers to block and will run analysis against my traffic to build on these lists.

What do others do?

I'm contemplating my Cloudflared tunnel into Crowdsec to my app.

Edit: Adding in image of my analysis of the IPs scanning for vulnerabilities.

collapsed inline media

[–] AustralianSimon@lemmy.world 6 points 6 days ago

I use namesilo for everything but my .au domains.