Custom Firewall
from Zenlix@lemmy.ml to selfhosted@lemmy.world on 09 Oct 14:03
https://lemmy.ml/post/37298900

I am searching for a firewall for my self hosted services. It should be conpatible with docker, podman and native running services. I should block clients with to many fauled authentication attempts. It should also support blocklists and be as easy to configure as possible (and foss ofc). I took a short look at fail2ban, but the github docs are just lacking so much information that I was looking for (like how to configure it). CrowdSec lookes not foss enough for me.

Any recommendations? Maybe some fail2ban guide?

#selfhosted

threaded - newest

non_burglar@lemmy.world on 09 Oct 14:22 next collapse

Not exactly sure what you’re looking for here; neither fail2ban nor crowdsec are firewalls by their strict definitions.

Are you looking for an IDS/IPS or other security measures? If so, what are you trying to secure?

Zenlix@lemmy.ml on 09 Oct 14:32 collapse

Inam trying to secure aelf hosted webservices against attackers. I noticed some attack attempts in my caddy logs.

non_burglar@lemmy.world on 09 Oct 16:10 collapse

Well, it wouldn’t hurt anything to install fail2ban and enable the popular templates, but it sounds like you might need to explain your service layout and how it’s exposed to the web before anyone can suggest a security measure.

Generally in the self-hosted space there are two common approaches: set up a VPN into your network for your trusted devices, or set up a reverse-proxy with a trusted tunneling proxy like cloudflare.

That you are seeing “attack attempts” in your caddy logs should be elaborated as well. What exactly are you seeing?

anamethatisnt@sopuli.xyz on 09 Oct 14:24 next collapse

Your services would first of all need some sort of integration to report failed authentication attempts to your firewall or you wouldn’t have anything to act on to start the block. Sounds complicated edit: and also what fail2ban does by reading logs it seems.

If I were you I would ponder if it wouldn’t be easier to just setup a headscale/wireguard/openvpn server and connect to your other services through that.

My favourite home firewall right now would be opnsense

Zenlix@lemmy.ml on 09 Oct 14:34 collapse

I fuess I can get that info from most services vy parsing their logs.

When using a vpn server, only I could access the services right?

Isnt opnsense only for bsd? I am running linux.

anamethatisnt@sopuli.xyz on 09 Oct 14:37 next collapse

When using a vpn server, only I could access the services right?

You can easily setup vpn users for friends/family but a random person on the internet won’t reach your services if you block access from WAN and forces everyone to go through the vpn server.

anamethatisnt@sopuli.xyz on 09 Oct 14:39 collapse

Isnt opnsense only for bsd? I am running linux.
opnsense is bsd based yes, you can either run it on it’s own hardware in front of your server or you can run it as a virtual machine and passthrough your hosts network ports to it for WAN/LAN.

Aspen10310@lemmy.ca on 09 Oct 15:55 next collapse

Maybe Pivpn ? Yes, you’ll need a small raspberry Pi, but then you can have it run wireguard to access all your home server gear. And then you have the added feature of putting Pinhole on there as well. Works for me here.

N0x0n@lemmy.ml on 10 Oct 10:44 collapse

I still need to find a “$35 Raspberry Pi” 🤣

melfie@lemy.lol on 11 Oct 23:26 next collapse

I use k3s with Calico so I can have k8s network policies for each service I’m running.

vegetaaaaaaa@lemmy.world on 13 Oct 17:36 collapse

I use firewalld as generic firewall and fail2ban as IPS/anti-bruteforce solution (blocks IPs using firewalld’s ipsets)