summaryrefslogtreecommitdiffstats
path: root/docs/content/doc/usage
diff options
context:
space:
mode:
authorNathaniel Sabanski <sabanski.n@gmail.com>2019-10-23 07:07:32 -0700
committerzeripath <art27@cantab.net>2019-10-23 15:07:32 +0100
commitc2fca23b2c6fa823e604611224c2b41e9cbf4695 (patch)
treeff39ee0b6d332ac3372f561220b05f816baf2655 /docs/content/doc/usage
parentb4b0e22f5f6f43edb712001b9d6964c8dfad9d55 (diff)
downloadgitea-c2fca23b2c6fa823e604611224c2b41e9cbf4695.tar.gz
gitea-c2fca23b2c6fa823e604611224c2b41e9cbf4695.zip
Docs: Added instructions for Docker fail2ban configuration. (#8642)
Diffstat (limited to 'docs/content/doc/usage')
-rw-r--r--docs/content/doc/usage/fail2ban-setup.md22
1 files changed, 19 insertions, 3 deletions
diff --git a/docs/content/doc/usage/fail2ban-setup.md b/docs/content/doc/usage/fail2ban-setup.md
index 28c4874da2..922c71f93d 100644
--- a/docs/content/doc/usage/fail2ban-setup.md
+++ b/docs/content/doc/usage/fail2ban-setup.md
@@ -26,7 +26,7 @@ on a bad authentication:
2018/04/26 18:15:54 [I] Failed authentication attempt for user from xxx.xxx.xxx.xxx
```
-So we set our filter in `/etc/fail2ban/filter.d/gitea.conf`:
+Add our filter in `/etc/fail2ban/filter.d/gitea.conf`:
```ini
# gitea.conf
@@ -35,12 +35,11 @@ failregex = .*Failed authentication attempt for .* from <HOST>
ignoreregex =
```
-And configure it in `/etc/fail2ban/jail.d/jail.local`:
+Add our jail in `/etc/fail2ban/jail.d/gitea.conf`:
```ini
[gitea]
enabled = true
-port = http,https
filter = gitea
logpath = /home/git/gitea/log/gitea.log
maxretry = 10
@@ -49,6 +48,23 @@ bantime = 900
action = iptables-allports
```
+If you're using Docker, you'll also need to add an additional jail to handle the **FORWARD**
+chain in **iptables**. Configure it in `/etc/fail2ban/jail.d/gitea-docker.conf`:
+
+```ini
+[gitea-docker]
+enabled = true
+filter = gitea
+logpath = /home/git/gitea/log/gitea.log
+maxretry = 10
+findtime = 3600
+bantime = 900
+action = iptables-allports[chain="FORWARD"]
+```
+
+Then simply run `service fail2ban restart` to apply your changes. You can check to see if
+fail2ban has accepted your configuration using `service fail2ban status`.
+
Make sure and read up on fail2ban and configure it to your needs, this bans someone
for **15 minutes** (from all ports) when they fail authentication 10 times in an hour.