Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Vultr Vulnerability

    Solved Support security vultr
    9
    2 Votes
    9 Posts
    4k Views
    ryangorleyR
    @girish Yeah, I'm thinking the same thing. ubuntu is a sudo user, and if the default password Vultr was using was exploited, then I'd have to be looking or processes run by anything. I'll migrate. Thanks again.
  • 0 Votes
    1 Posts
    281 Views
    No one has replied
  • 1 Votes
    5 Posts
    2k Views
    jegillikin 0J
    FWIW, I just upgraded from Ubuntu 18 this evening. Cloudron's documentation from going from 18 to 20 was quite helpful, re: a collectd edit that I never would have thought to make, plus the specific MySQL Server migration rules. Everything went smoothly, but without the documentation, it wouldn't have. So kudos to the team.
  • AWS Abuse Report

    Solved Support aws security
    9
    0 Votes
    9 Posts
    3k Views
    girishG
    I am still confused why they demand an answer from you, if your website is getting abused...
  • Cloudron Instance Platform Check App(s)

    Moved Discuss security
    23
    4 Votes
    23 Posts
    5k Views
    D
    @girish yep will give it a try. What about the networking graphs, or even the stacked ones? Is that a realistic feature to ask for?
  • Abuse report received

    Solved Support malware security
    22
    1 Votes
    22 Posts
    6k Views
    timconsidineT
    @girish said in Abuse report received: I found very similar reports in other server forums interesting, thank you also not sure what to make of it !
  • cloudflared request

    Locked Feature Requests security
    3
    1 Votes
    3 Posts
    1k Views
    adisonA
    o sorry, didn't know that was there
  • important security question

    WordPress (Managed) security
    8
    0 Votes
    8 Posts
    2k Views
    adisonA
    aw, thanks. i will attempt to use wordpress managed, as long as the export thing will work.
  • fido2support

    Solved Feature Requests security
    59
    12 Votes
    59 Posts
    15k Views
    I
    Thank you @nebulon
  • 2 Votes
    1 Posts
    3k Views
    No one has replied
  • Debugging ubuntu security updates

    Discuss ubuntu security updates
    5
    1 Votes
    5 Posts
    2k Views
    girishG
    tl;dr - If you have the above problem apt install python3-magic . Then, run apt update . On another server, unattended-upgrades package was missing as well (!) Not sure how because Cloudron installs it at install time. So, install it and run unattended-upgrade -d.
  • Securing cloudron against ddos attacks?

    Discuss security
    19
    2 Votes
    19 Posts
    5k Views
    I
    @LoudLemur said: @IniBudi I am not sure, but according to Grok: "you've got a classic volumetric DDoS (the kind that floods bandwidth with junk traffic like UDP floods or SYN floods) that chewed through 1TB and knocked your server offline. Cloudflare free + Hetzner/Netcup anti-DDoS is a solid starter setup, but it's getting bypassed or overwhelmed because:Most attacks hit your VPS's real IP directly (bypassing Cloudflare unless everything is perfectly proxied). Hetzner's protection (Arbor/Juniper-based) is automated but often slow to kick in or just null-routes your IP (blackholes the whole server to protect their network). Netcup's 2 Tbps filter is better but still leaks big attacks or causes brief downtime. Cloudflare free is unmetered and excellent for web traffic routed through it (absorbs massive attacks at the edge), but it only helps if traffic never reaches your VPS. The 1TB bandwidth bill/spike proves the attack was hitting your origin directly.Immediate Effective Fixes (Do These Right Now — Mostly Free)Force everything through Cloudflare In Cloudflare DNS, make ALL records Proxied (orange cloud icon). No A/AAAA records pointing directly to your VPS IP. This routes attacks to Cloudflare's global network first. Lock your VPS firewall to Cloudflare IPs only (this is the #1 game-changer) Block everything except Cloudflare's published IP ranges. This stops 99% of direct IP attacks. Hetzner: Use their Cloud Firewall (or iptables). Netcup: Same with ufw/iptables. Cloudflare publishes the list here: cloudflare.com/ips (update it automatically via their API — there's a simple cron script for this). Result: Attack traffic dies at Cloudflare; your VPS barely sees clean traffic. Activate Cloudflare's emergency mode Turn on "I'm Under Attack" mode (Security → Overview). Enable Bot Fight Mode + managed WAF rules + rate limiting (free tier has these). Set Security Level to "High" or "I'm Under Attack". This challenges suspicious traffic with JS/captchas before it even reaches your server. Extra quick wins Use Cloudflare Tunnel (cloudflared) if possible — runs on your VPS and proxies traffic without exposing any ports publicly. Zero public IP exposure. On the server: iptables rate limiting + fail2ban for extra layers. Contact your VPS support immediately — they can sometimes manually tune mitigation. These steps alone usually stop the bandwidth massacre because Cloudflare absorbs the junk at their edge (they've mitigated 11+ Tbps attacks).The Strongest Solutions (Ranked by Effectiveness vs Cost)Here's what actually survives big attacks in 2026:Best affordable strong solution: Switch VPS to OVHcloud + keep Cloudflare free/Pro OVH has the strongest built-in, always-on DDoS protection in the budget VPS world (unlimited, multi-Tbps scrubbing centers, rarely null-routes, works great for L3/L4 volumetric). Users consistently report it handles attacks that destroy Hetzner/Netcup. Pair it with Cloudflare for L7 (web) protection and you're basically bulletproof for most attacks. Migration is straightforward (snapshot your server, spin up OVH VPS, point DNS). This is the combo I recommend for 90% of people in your spot. Specialized DDoS-protected hosting DDoS-Guard (or similar like PATH.net / Evolution Host): Purpose-built for heavy volumetric attacks. Offers protected VPS or proxy services with fixed pricing and excellent filtering. Great if you want to stay cheap but stronger than Hetzner/Netcup. BuyVM: Super cheap add-on protection (handles 700M+ pps). Upgrade Cloudflare only (if you love your current VPS) Go Pro ($20/mo) for advanced WAF, better rate limiting, and more rules. Still use the firewall lockdown above. For non-HTTP/UDP (games, APIs, etc.), you'll eventually need Cloudflare Spectrum (paid) or a dedicated L4 protector. Enterprise-level (if budget allows and attacks are constant) Cloudflare Magic Transit (BGP routing) + your VPS, or Akamai/Imperva. These are what big sites use — full network scrubbing. Quick Reality CheckIf your server is a website/API (HTTP/HTTPS), the Cloudflare + firewall lockdown + OVH combo will solve 95% of cases for very low cost. If it's a game server, UDP-heavy service, or Minecraft/etc., prioritize a host with native L4 protection (OVH or specialized like TCPShield) — Cloudflare free alone won't proxy those ports easily.The core principle for any strong solution: You need high-capacity upstream scrubbing so the 1TB flood never reaches your VPS bandwidth/CPU.Do the immediate firewall + proxy steps first — that often fixes it instantly without spending anything. If you tell me exactly what your server runs (website? game? API? ports?), attack type (from CF analytics), or your budget, I can give exact config commands/scripts or migration steps. " I already created inbound traffic firewall only accept Cloudflare IPs. Unfortunately, my server is still down. I don't know why the attacker is targeting my website, the content only talks about Digital Marketing, SEO, etc. Hmm, I am still searching alternative solution because I just use Cloudflare Free and cheap VPS. Thank you for sharing @loudlemur
  • Secure Database suggestions

    Discuss database security nextcloud
    2
    0 Votes
    2 Posts
    1k Views
    humptyH
    @LoudLemur I use cryptomator to encrypt sensitive files that I have on my nextcloud. Your use case is a bit trickier as you have multiple people working on the same file simultaneously. Take a look at the existing apps in the App Store like collabora, onlyoffice, and cryptpad. Cryptpad might be your best option though as it’s end to end encrypted. Edit: There’s also baserow and noco. I’m not sure if the databases are encrypted.
  • 0 Votes
    29 Posts
    7k Views
    scookeS
    @andreasdueren I'd be cautious about implementing it then. Cloudron hardens your server enough - doing more by installing more software, which is NOT recommended, will only lead to problems, especially if you don't already have a deep enough understanding of what is happening. It seems to be that @BrutalBirdie's gang knows their stuff (they're using Ansible to install Cloudron??? Yeah, that is next level coding there). Of course, they may also be paying for the Enterprise level of service (I'm not asking btw, no need to respond to that @BrutalBirdie ) so if they have hassles then I suppose it's fine for them to get help beyond typical Cloudron support, especially if they are doing more to their servers than what Cloudron themselves advise.
  • Online tools to check website security?

    Discuss security certificates
    5
    2 Votes
    5 Posts
    2k Views
    DanTheManD
    Also stumbled on this one last week: https://web-check.xyz/ Selfhosted: https://github.com/Lissy93/web-check And a little explanation on how this works: https://www.helpnetsecurity.com/2024/02/26/web-check-website-open-source-intelligence/
  • Locked myself out after changing to port 202

    Solved Support ssh security ports port202 sshdconfig
    3
    1 Votes
    3 Posts
    1k Views
    skinnylatteS
    @nebulon Thank you, I will investigate today and let you know.
  • 6 Votes
    4 Posts
    2k Views
    subvenS
    I use vaultwarden for business related secrets or where customer data come into play. For my private stuff I still use Chrome sync but also want to switch to vaultwarden. What came to my mind: By January, a lot of people will (hopefully) switch from Chromium sourced browsers to Firefox because of the manifest v3 implementation. Because I don't want to trust Mozilla nor Google, I tinker with the thought to host my own FFsync (Firefox Sync) server to be more independend with my "cloud" hosted data. Had to think about the risks because hosting something like vaultwarden might be safe but I was unsure if FFsync gets the same care.
  • Privilege escalation through mail manager role

    Solved Discuss security mail
    8
    2 Votes
    8 Posts
    2k Views
    nebulonN
    This is fixed for next release with https://git.cloudron.io/cloudron/box/-/commit/3477cf474f32a51c62aef65015e615db62bca4f7 For the other feature request about domains, please make a separate thread there, but I can already say that Cloudron is still designed to work for a setup of one Cloudron per organization and not many maintaining isolated organizations on one Cloudron. This will add all kinds of complexities for the 99% use-cases Cloudron is currently used for.
  • Increase length of app passwords

    Solved Support app passwords security
    5
    0 Votes
    5 Posts
    2k Views
    humptyH
    @girish It sure did. I thought it was a simple matter of brute forcing 16 characters. I’m glad that’s not the case. Thanks for the clarification!
  • 2.8.10 security update available

    Solved Discourse security updates
    6
    0 Votes
    6 Posts
    2k Views
    jdaviescoatesJ
    @nebulon thanks! I'm not getting my hopes up too far, but hopefully this will somehow also resolve all the issues that loads of the official plugins have when trying to install them on Cloudron...