Replies: 4 comments 7 replies
-
Fail2ban use user ip to block retry attempt from user, but your revers-proxy mask real user ip. |
Beta Was this translation helpful? Give feedback.
-
You could whitelist the Roundcube container in docker-mailserver's fail2ban and use a separate fail2ban in the roundcube container directly. |
Beta Was this translation helpful? Give feedback.
-
I noticed that Roundcube's container gets the Caddy container IP - 172.18.0.6 - and the real IP - x.y.z.w - that is using Firefox to get to Roundcube. Docker-mailserver appears "to see" only the Docker's network gateway IP - 172.18.0.1 - and his own IP - 172.18.0.14. @casperklein I am trying to figure out how to use your suggestion. |
Beta Was this translation helpful? Give feedback.
-
I just observed that only two attempts with wrong password put the address in the ban list. I thought that were three attempts... Roundcube log
Docker-Mailserver log
setup.sh
|
Beta Was this translation helpful? Give feedback.
-
I have docker-mailserver on one container and roudcube on another container.
Both are "connected" by an internal docker network "caddy_net". I use Caddy as reverse proxy.
Roundcube reaches docker-mailserver by name using an internal IP like 172.18.0.1.
When one user types the wrong password fail2ban prevents everybody using Roundcube webmail from login.
Any ideas on how to prevent this behavior and/or log/ban the remote IP of the user instead of container's internal IP?
Beta Was this translation helpful? Give feedback.
All reactions