netfilter.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* help needed preventing bruteforce behind a reverse proxy
@ 2014-07-01  8:03 Francesco Morosinotto
  2014-07-01 15:35 ` William Taylor
  2014-07-01 17:17 ` Eliezer Croitoru
  0 siblings, 2 replies; 5+ messages in thread
From: Francesco Morosinotto @ 2014-07-01  8:03 UTC (permalink / raw)
  To: netfilter

Hi guys,

I'm a young "system administrator" that works for a non profit organization.
I've recently implemented owncloud on a local server running several
virtual machines.
Having only a static IP every service (running on different vms) is
served through a reverse proxy (apache).

I'm trying to secure my cloud installation in order to prevent
bruteforce attack: I can log the attackers IP (using apache-mod-rpaf
that reads the original ip from the x-forwarded-for header) and I was
setting up fail2ban to add these ips to a blacklist and deny the access
through iptables.

But It seems that iptables is not able to understand where does the
request come from and always log the internal proxy ip address.

Is there a way to tell iptables to read the x-forwarded-for headers?

can you suggest some other workaround?

thank you guys

-- 
Francesco Morosinotto
web: http://morosinotto.it
CV: http://morosinotto.it/curriculum
skype: francescomorosinotto


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2014-07-02  2:34 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-07-01  8:03 help needed preventing bruteforce behind a reverse proxy Francesco Morosinotto
2014-07-01 15:35 ` William Taylor
2014-07-01 17:17 ` Eliezer Croitoru
2014-07-01 19:02   ` Paul Robert Marino
     [not found]   ` <CAMEq33fMwz-iufG+kVsrvdXwf7m9HZoE_0vF4Er5vZ8yyHk_9g@mail.gmail.com>
2014-07-02  2:34     ` Eliezer Croitoru

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).