AustralianSimon

joined 2 years ago
[–] AustralianSimon@lemmy.world 8 points 17 hours ago (2 children)

You're going to have to read every single release with breaking changes.

[–] AustralianSimon@lemmy.world 1 points 19 hours ago* (last edited 19 hours ago)

I'm trying to block the most likely attack vectors which is definitely VPS providers at this point in time. I just figure if I am blocking subnets plus additionals I identify it will force them out of these vectors to attack in ways I might be able to report better abuse.

Here check out my analysis.

collapsed inline media

[–] AustralianSimon@lemmy.world 2 points 19 hours ago

No I think f2b handling it would be totally fine for me. Kids got in the way with digging around too much but will try this week.

Ahhhmazing, I'll set this up tonight. Really appreciate the help.

[–] AustralianSimon@lemmy.world 2 points 1 day ago* (last edited 1 day ago) (2 children)

I've used it on a machine before but given I am using a cloudflared container for ingress, can I route my traffic through a f2b container to the app? This might be ideal from a co fig perspective.

LLMs say yes but I'll need to play around.

[–] AustralianSimon@lemmy.world 3 points 1 day ago* (last edited 1 day ago) (2 children)

I have more than 50k but even that page doesn't recommend it.

Top of that page

Recommendation: Use WAF custom rules instead

Cloudflare recommends that you create WAF custom rules instead of IP Access rules to perform IP-based or geography-based blocking (geoblocking):

  • For IP-based blocking, use an IP list in the custom rule expression.

On the fail2ban front, can I run my traffic through a f2b container and out into my app?

[–] AustralianSimon@lemmy.world 2 points 1 day ago (1 children)

How easy is it to configure?

My goal is to download some lists from github and generate one big ban list to feed into the WAF but the community lists of Crowdsec might negate the need.

30
submitted 1 day ago* (last edited 19 hours ago) by AustralianSimon@lemmy.world to c/selfhosted@lemmy.world
 

I'm running a website that is getting a lot of bot traffic and found Cloudflare free rule tier to be a bit limiting. (5 custom rules with length limits)

Ive got subnets for major VPS providers to block and will run analysis against my traffic to build on these lists.

What do others do?

I'm contemplating my Cloudflared tunnel into Crowdsec to my app.

Edit: Adding in image of my analysis of the IPs scanning for vulnerabilities.

collapsed inline media

[–] AustralianSimon@lemmy.world 6 points 1 week ago

I use namesilo for everything but my .au domains.