mirror of
https://github.com/linuxserver/docker-swag.git
synced 2026-05-02 17:04:27 +09:00
Compare commits
4 Commits
1.25.0-ls1
...
1.26.0-ls1
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
a9e53d5fc8 | ||
|
|
f9e05fd86a | ||
|
|
2272c3037a | ||
|
|
de3b43cb62 |
@@ -103,11 +103,12 @@ This will *ask* Google et al not to index and list your site. Be careful with th
|
|||||||
|
|
||||||
### Using fail2ban
|
### Using fail2ban
|
||||||
|
|
||||||
* This container includes fail2ban set up with 4 jails by default:
|
* This container includes fail2ban set up with 5 jails by default:
|
||||||
1. nginx-http-auth
|
1. nginx-http-auth
|
||||||
2. nginx-badbots
|
2. nginx-badbots
|
||||||
3. nginx-botsearch
|
3. nginx-botsearch
|
||||||
4. nginx-deny
|
4. nginx-deny
|
||||||
|
5. nginx-unauthorized
|
||||||
* To enable or disable other jails, modify the file `/config/fail2ban/jail.local`
|
* To enable or disable other jails, modify the file `/config/fail2ban/jail.local`
|
||||||
* To modify filters and actions, instead of editing the `.conf` files, create `.local` files with the same name and edit those because .conf files get overwritten when the actions and filters are updated. `.local` files will append whatever's in the `.conf` files (ie. `nginx-http-auth.conf` --> `nginx-http-auth.local`)
|
* To modify filters and actions, instead of editing the `.conf` files, create `.local` files with the same name and edit those because .conf files get overwritten when the actions and filters are updated. `.local` files will append whatever's in the `.conf` files (ie. `nginx-http-auth.conf` --> `nginx-http-auth.local`)
|
||||||
* You can check which jails are active via `docker exec -it swag fail2ban-client status`
|
* You can check which jails are active via `docker exec -it swag fail2ban-client status`
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ apr-util-1.6.1-r7
|
|||||||
argon2-libs-20190702-r1
|
argon2-libs-20190702-r1
|
||||||
bash-5.1.16-r0
|
bash-5.1.16-r0
|
||||||
brotli-libs-1.0.9-r5
|
brotli-libs-1.0.9-r5
|
||||||
busybox-1.33.1-r6
|
busybox-1.33.1-r7
|
||||||
c-client-2007f-r11
|
c-client-2007f-r11
|
||||||
ca-certificates-20211220-r0
|
ca-certificates-20211220-r0
|
||||||
ca-certificates-bundle-20211220-r0
|
ca-certificates-bundle-20211220-r0
|
||||||
@@ -216,7 +216,7 @@ scanelf-1.3.2-r0
|
|||||||
shadow-4.8.1-r0
|
shadow-4.8.1-r0
|
||||||
skalibs-2.10.0.3-r0
|
skalibs-2.10.0.3-r0
|
||||||
sqlite-libs-3.35.5-r0
|
sqlite-libs-3.35.5-r0
|
||||||
ssl_client-1.33.1-r6
|
ssl_client-1.33.1-r7
|
||||||
tzdata-2022a-r0
|
tzdata-2022a-r0
|
||||||
unixodbc-2.3.9-r1
|
unixodbc-2.3.9-r1
|
||||||
utmps-0.1.0.2-r0
|
utmps-0.1.0.2-r0
|
||||||
|
|||||||
@@ -120,11 +120,12 @@ app_setup_block: |
|
|||||||
|
|
||||||
### Using fail2ban
|
### Using fail2ban
|
||||||
|
|
||||||
* This container includes fail2ban set up with 4 jails by default:
|
* This container includes fail2ban set up with 5 jails by default:
|
||||||
1. nginx-http-auth
|
1. nginx-http-auth
|
||||||
2. nginx-badbots
|
2. nginx-badbots
|
||||||
3. nginx-botsearch
|
3. nginx-botsearch
|
||||||
4. nginx-deny
|
4. nginx-deny
|
||||||
|
5. nginx-unauthorized
|
||||||
* To enable or disable other jails, modify the file `/config/fail2ban/jail.local`
|
* To enable or disable other jails, modify the file `/config/fail2ban/jail.local`
|
||||||
* To modify filters and actions, instead of editing the `.conf` files, create `.local` files with the same name and edit those because .conf files get overwritten when the actions and filters are updated. `.local` files will append whatever's in the `.conf` files (ie. `nginx-http-auth.conf` --> `nginx-http-auth.local`)
|
* To modify filters and actions, instead of editing the `.conf` files, create `.local` files with the same name and edit those because .conf files get overwritten when the actions and filters are updated. `.local` files will append whatever's in the `.conf` files (ie. `nginx-http-auth.conf` --> `nginx-http-auth.local`)
|
||||||
* You can check which jails are active via `docker exec -it swag fail2ban-client status`
|
* You can check which jails are active via `docker exec -it swag fail2ban-client status`
|
||||||
|
|||||||
Reference in New Issue
Block a user