v1.1.2 - CrowdSec integration and custom ports
This commit is contained in:
parent
798f6c726d
commit
36c4f3e065
20
README.md
20
README.md
@ -15,7 +15,7 @@ Non-exhaustive list of features :
|
|||||||
- Automatic ban of strange behaviors with fail2ban
|
- Automatic ban of strange behaviors with fail2ban
|
||||||
- Antibot challenge through cookie, javascript, captcha or recaptcha v3
|
- Antibot challenge through cookie, javascript, captcha or recaptcha v3
|
||||||
- Block TOR, proxies, bad user-agents, countries, ...
|
- Block TOR, proxies, bad user-agents, countries, ...
|
||||||
- Perform automatic DNSBL checks to block known bad IP
|
- Block known bad IP with DNSBL and CrowdSec
|
||||||
- Prevent bruteforce attacks with rate limiting
|
- Prevent bruteforce attacks with rate limiting
|
||||||
- Detect bad files with ClamAV
|
- Detect bad files with ClamAV
|
||||||
- Easy to configure with environment variables
|
- Easy to configure with environment variables
|
||||||
@ -55,6 +55,7 @@ Fooling automated tools/scanners :
|
|||||||
+ [Antibot](#antibot)
|
+ [Antibot](#antibot)
|
||||||
+ [External blacklist](#external-blacklist)
|
+ [External blacklist](#external-blacklist)
|
||||||
+ [DNSBL](#dnsbl)
|
+ [DNSBL](#dnsbl)
|
||||||
|
+ [CrowdSec](#crowdsec)
|
||||||
+ [Custom whitelisting](#custom-whitelisting)
|
+ [Custom whitelisting](#custom-whitelisting)
|
||||||
+ [Custom blacklisting](#custom-blacklisting)
|
+ [Custom blacklisting](#custom-blacklisting)
|
||||||
+ [Requests limiting](#requests-limiting)
|
+ [Requests limiting](#requests-limiting)
|
||||||
@ -199,6 +200,16 @@ Values : *\<any valid path to web files\>
|
|||||||
Default value : */www*
|
Default value : */www*
|
||||||
The default folder where nginx will search for web files. Don't change it unless you want to make your own image.
|
The default folder where nginx will search for web files. Don't change it unless you want to make your own image.
|
||||||
|
|
||||||
|
`HTTP_PORT`
|
||||||
|
Values : *\<any valid port greater than 1024\>*
|
||||||
|
Default value : *8080*
|
||||||
|
The HTTP port number used by nginx and certbot inside the container.
|
||||||
|
|
||||||
|
`HTTPS_PORT`
|
||||||
|
Values : *\<any valid port greater than 1024\>*
|
||||||
|
Default value : *8443*
|
||||||
|
The HTTPS port number used by nginx inside the container.
|
||||||
|
|
||||||
### Information leak
|
### Information leak
|
||||||
|
|
||||||
`SERVER_TOKENS`
|
`SERVER_TOKENS`
|
||||||
@ -514,6 +525,13 @@ Values : *\<list of DNS zones separated with spaces\>*
|
|||||||
Default value : *bl.blocklist.de problems.dnsbl.sorbs.net sbl.spamhaus.org xbl.spamhaus.org*
|
Default value : *bl.blocklist.de problems.dnsbl.sorbs.net sbl.spamhaus.org xbl.spamhaus.org*
|
||||||
The list of DNSBL zones to query when `USE_DNSBL` is set to *yes*.
|
The list of DNSBL zones to query when `USE_DNSBL` is set to *yes*.
|
||||||
|
|
||||||
|
### CrowdSec
|
||||||
|
|
||||||
|
`USE_CROWDSEC`
|
||||||
|
Values : *yes* | *no*
|
||||||
|
Default value : *no*
|
||||||
|
If set to *yes*, [CrowdSec](https://github.com/crowdsecurity/crowdsec) will be enabled with the [nginx collection](https://hub.crowdsec.net/author/crowdsecurity/collections/nginx). API pulls will be done automaticaly.
|
||||||
|
|
||||||
### Custom whitelisting
|
### Custom whitelisting
|
||||||
|
|
||||||
`USE_WHITELIST_IP`
|
`USE_WHITELIST_IP`
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user