-
-
Notifications
You must be signed in to change notification settings - Fork 253
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] IPs are banned but can still access the server/apps #476
Comments
Thanks for opening your first issue here! Be sure to follow the relevant issue templates, or risk having this issue marked as invalid. |
This might be out of our control as it does depend on some packages within the Host OS itself. Would need to do some testing. |
It seems there's a fix (or potential pull request) by using iptables-legacy see. https://github.com/crazy-max/docker-fail2ban |
Same problems on latest QTS 5.1 Qnap firmware. |
Same for me, Synology (BSD?) host have an issue with new iptable. Can you implement Environment variables for choose between new or legacy Iptables please? |
…d doesn't work. Fixes linuxserver#476
This issue has been automatically marked as stale because it has not had recent activity. This might be due to missing feedback from OP. It will be closed if no further activity occurs. Thank you for your contributions. |
I was hitting the same issue, and made a PR. I'm using my version on my Qnap and it's working for me now. (PS. Maybe making a PR for an issue should count as "activity"?) |
Hello.
new iptables "v1.8.X" don't support BSD host and atlernative of BSD host (like DSM Os or Qnap OS). We need an argument for choose between legacy iptables and nf iptables like crazymax fail2ban container. Swag 2.7.4 work always but don't refresh SSL cert. |
Solution found for Synology DSM 7.2 (and other alternate Linux BSD) .
And now it work for me with the last swag container version on my Synology dsm 7.2 |
Having the same issue running on UNRAID. |
What do you do for it work on your Qnap? |
I forked the repository, fixed the issue and rebuilt the docker image. I am currently running the image build from my fork on my Qnap. |
Thanks for this fork. It's good idead. I hope this fix will integrate the linuxserver repos. |
While this has been marked as closed it seems to still have issues for myself after updating.
iptables-legacy is present, and being used instead of iptables but I still have access to the hosted pages even after being banned on an ipv4 address. ipv6 however fails at being banned all together. fail2ban.log
Meanwhile ipv4 gets banned properly: But the access.log shows the initial detected entry "banme.php" but access persists
Base system is Unraid 6.12.11. |
go on discord or the forum for support, this is a configuration issue, not a container issue. you will need to provide your container logs beginning with our ascii logo and your docker run. |
Is there an existing issue for this?
Current Behavior
IPs are banned but can still access the server/apps.
There are errors in
fail2ban.log
Expected Behavior
A banned IP shouldn't be able to access the server.
Steps To Reproduce
jail.local
Tried also to override
fail2ban/action.d/iptables.conf
with a 'iptables.local` (from sosandroid/docker-fail2ban-synology) containing but it doesn't work either:Environment
CPU architecture
x86-64
Docker creation
Container logs
The text was updated successfully, but these errors were encountered: