diff options
author | Nathaniel Sabanski <sabanski.n@gmail.com> | 2019-10-23 07:07:32 -0700 |
---|---|---|
committer | zeripath <art27@cantab.net> | 2019-10-23 15:07:32 +0100 |
commit | c2fca23b2c6fa823e604611224c2b41e9cbf4695 (patch) | |
tree | ff39ee0b6d332ac3372f561220b05f816baf2655 /docs/content/doc/usage | |
parent | b4b0e22f5f6f43edb712001b9d6964c8dfad9d55 (diff) | |
download | gitea-c2fca23b2c6fa823e604611224c2b41e9cbf4695.tar.gz gitea-c2fca23b2c6fa823e604611224c2b41e9cbf4695.zip |
Docs: Added instructions for Docker fail2ban configuration. (#8642)
Diffstat (limited to 'docs/content/doc/usage')
-rw-r--r-- | docs/content/doc/usage/fail2ban-setup.md | 22 |
1 files changed, 19 insertions, 3 deletions
diff --git a/docs/content/doc/usage/fail2ban-setup.md b/docs/content/doc/usage/fail2ban-setup.md index 28c4874da2..922c71f93d 100644 --- a/docs/content/doc/usage/fail2ban-setup.md +++ b/docs/content/doc/usage/fail2ban-setup.md @@ -26,7 +26,7 @@ on a bad authentication: 2018/04/26 18:15:54 [I] Failed authentication attempt for user from xxx.xxx.xxx.xxx ``` -So we set our filter in `/etc/fail2ban/filter.d/gitea.conf`: +Add our filter in `/etc/fail2ban/filter.d/gitea.conf`: ```ini # gitea.conf @@ -35,12 +35,11 @@ failregex = .*Failed authentication attempt for .* from <HOST> ignoreregex = ``` -And configure it in `/etc/fail2ban/jail.d/jail.local`: +Add our jail in `/etc/fail2ban/jail.d/gitea.conf`: ```ini [gitea] enabled = true -port = http,https filter = gitea logpath = /home/git/gitea/log/gitea.log maxretry = 10 @@ -49,6 +48,23 @@ bantime = 900 action = iptables-allports ``` +If you're using Docker, you'll also need to add an additional jail to handle the **FORWARD** +chain in **iptables**. Configure it in `/etc/fail2ban/jail.d/gitea-docker.conf`: + +```ini +[gitea-docker] +enabled = true +filter = gitea +logpath = /home/git/gitea/log/gitea.log +maxretry = 10 +findtime = 3600 +bantime = 900 +action = iptables-allports[chain="FORWARD"] +``` + +Then simply run `service fail2ban restart` to apply your changes. You can check to see if +fail2ban has accepted your configuration using `service fail2ban status`. + Make sure and read up on fail2ban and configure it to your needs, this bans someone for **15 minutes** (from all ports) when they fail authentication 10 times in an hour. |