AustralianSimon

joined 2 years ago
MODERATOR OF
[–] AustralianSimon 6 points 10 hours ago (2 children)

You're going to have to read every single release with breaking changes.

[–] AustralianSimon 1 points 12 hours ago* (last edited 12 hours ago)

I'm trying to block the most likely attack vectors which is definitely VPS providers at this point in time. I just figure if I am blocking subnets plus additionals I identify it will force them out of these vectors to attack in ways I might be able to report better abuse.

Here check out my analysis.

[–] AustralianSimon 1 points 12 hours ago

No I think f2b handling it would be totally fine for me. Kids got in the way with digging around too much but will try this week.

[–] AustralianSimon 3 points 1 day ago

Ahhhmazing, I'll set this up tonight. Really appreciate the help.

[–] AustralianSimon 2 points 1 day ago* (last edited 1 day ago) (2 children)

I've used it on a machine before but given I am using a cloudflared container for ingress, can I route my traffic through a f2b container to the app? This might be ideal from a co fig perspective.

LLMs say yes but I'll need to play around.

[–] AustralianSimon 3 points 1 day ago* (last edited 1 day ago) (2 children)

I have more than 50k but even that page doesn't recommend it.

Top of that page

Recommendation: Use WAF custom rules instead

Cloudflare recommends that you create WAF custom rules instead of IP Access rules to perform IP-based or geography-based blocking (geoblocking):

  • For IP-based blocking, use an IP list in the custom rule expression.

On the fail2ban front, can I run my traffic through a f2b container and out into my app?

[–] AustralianSimon 2 points 1 day ago (1 children)

How easy is it to configure?

My goal is to download some lists from github and generate one big ban list to feed into the WAF but the community lists of Crowdsec might negate the need.

30
submitted 1 day ago* (last edited 12 hours ago) by AustralianSimon to c/selfhosted
 

I'm running a website that is getting a lot of bot traffic and found Cloudflare free rule tier to be a bit limiting. (5 custom rules with length limits)

Ive got subnets for major VPS providers to block and will run analysis against my traffic to build on these lists.

What do others do?

I'm contemplating my Cloudflared tunnel into Crowdsec to my app.

Edit: Adding in image of my analysis of the IPs scanning for vulnerabilities.

[–] AustralianSimon 6 points 1 week ago

I use namesilo for everything but my .au domains.

[–] AustralianSimon 1 points 1 week ago* (last edited 1 week ago)

Sometimes I miss my r720s but the silence is nice now.

Xcp or proxmox as your os.

720 depending on chips and memory is great for game servers.

[–] AustralianSimon 5 points 2 weeks ago

Download your the Amazon UI or use this tool while you can though.

[–] AustralianSimon 8 points 2 weeks ago (2 children)

Just a warning the Download and transfer via USB will no longer be an option from 26th of Feb according to Amazon UI.

[–] AustralianSimon 1 points 2 weeks ago

I didn't think OP was going the ZFS route so it wouldn't matter on that point.

His Server 2 will be running on the red line imho so any overhead would have impact.

71
Foss webscraper (github.com)
submitted 4 months ago* (last edited 4 months ago) by AustralianSimon to c/selfhosted
 

Not OP. This was posted to self hosted on reddit and might be useful to some.

Original post - https://www.reddit.com/r/selfhosted/comments/1glf06d/comment/lw1e4zd/

 

First bot on banlist. Posting some sort of lorem ipsum while being tested. Owner can post here to dispute.

 

I found this while starting to build out my own wrapper. Stopped and knew I had to share.

 

Go nuts!

3
this is a bot test (self.bot_testing)
 

if this works this is amazing!

25
submitted 2 years ago* (last edited 2 years ago) by AustralianSimon to c/lemmyworld
 

Interested in coding one to bring content over and do cross posting across instances.

13
Useful links (self.selfhosted)
view more: next ›