I also hope that this feature will be implemented soon to prevent servers from ending up on blacklists. It will also help prevent users from sending mass emails without coordination. Virtually every mail provider has enabled this feature for good reason.
Something like Crowdsec is surely a step in the right direction. Unfortunately I do not know enough about security to write the guide on configuring these solutions. However - I know enough to know that it is desperately needed. Especially for SMB and Enterprise applications.
In general - Wouldn't it be nice to have a control center where you can know who is accessing your server, what they are doing, and if anything suspicious is going on?
@timconsidine Well, I don't know if Cloudron's dev are facing to "dev resources" problems, maybe you know more about that.
I only posted a "feature suggestion", far from wanting to "drain" development resources.
@scooke ha ha, no worries. We are just trying to understand your concerns really and if there is something we need to be concerned about if/when we implement this. Some of the other providers seem to have unicode field for domains already and our UI seems lagging behind here. I understand some of your concerns though like the homograph attack.
@warg OK, there was a bug that LA is chosen as default tz, if no tz was explicitly set. I have fixed this to make UTC as the default instead.
This feature request is still valid . Maybe we should either auto detect or ask the user about the timezone at installation/setup time.
Ah this was my fault, I didn't approve the required app package version. This done now. So if you setup a new proxy app via your Cloudron dashboard, the user-management options should be available now.
@jdaviescoates said in Feature request: Notifications about failed backups:
As many have previously requested, I would like email notifications after just 1 failed backup, not 3.
Agree that this simply needs to be more customizable. We just went for 3 as a compromise of not having the ability to customize
@Jan-Macenka as a follow up.
This module is for the acme protocol: https://datatracker.ietf.org/doc/html/rfc8555
And if I understand this module and everything correctly this will not auto renew on the system it self.
So you will have to run the ansible deployment again to renew the certs.
For the BigBlueButton Role I maintain I've written a task for installing acme.sh to manage the cert of the deployment.
https://github.com/ebbba-org/ansible-role-bigbluebutton/blob/master/tasks/certificate-letsencrypt.yml
I also turned this into a standalone Role for my company but not published it since its such a little role/task.
Maybe this can help you even further.
ps: big thanks for the beer @Jan-Macenka
@holm yes, thanks. This is planned but with a slightly different approach. The restore process will keep track of what it's downloaded, so that the download can be incremental. That way, one ideally doesn't need to select anything.