Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Feature Requests
  3. Reduce visibility to spam bots via KnockD

Reduce visibility to spam bots via KnockD

Scheduled Pinned Locked Moved Feature Requests
networkingfirewall
2 Posts 2 Posters 417 Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • robiR Offline
      robiR Offline
      robi
      wrote on last edited by girish
      #1

      Certain services, like ssh get a lot of attention from bots if the port is open.

      It would be nice to remove being the attention of such scans by closing those affected ports.

      Since we still need to use them, they can be enabled for us specifically via port knocking.

      Combined with temporary IP whitelisting, keeping related connections open in IPtables, and cleaning up the white list/port after IP change/inactivity, that would keep things nicely automated, and reduce the amount of logging and CPU necessary.

      It could also be nicely adapted to the remote Cloudron support process.

      Conscious tech

      P 1 Reply Last reply
      2
      • robiR robi

        Certain services, like ssh get a lot of attention from bots if the port is open.

        It would be nice to remove being the attention of such scans by closing those affected ports.

        Since we still need to use them, they can be enabled for us specifically via port knocking.

        Combined with temporary IP whitelisting, keeping related connections open in IPtables, and cleaning up the white list/port after IP change/inactivity, that would keep things nicely automated, and reduce the amount of logging and CPU necessary.

        It could also be nicely adapted to the remote Cloudron support process.

        P Offline
        P Offline
        p44
        translator
        wrote on last edited by
        #2

        @robi Wow Robi, this is a great feature request!!! Just yesterday one of my Cloudron instances got a lot of traffic to email for a bruteforce attack.

        @girish I think this feature have to put on the top of the list to improve safety but also to reduce workload of instances and network traffic...

        Schermata 2021-01-13 alle 09.49.21.png

        This is a statping how network performances was impacted before and later bruteforce.

        Also, need a robust alert system - email or other - to let us know that something is happens.

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


          • Login

          • Don't have an account? Register

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • Bookmarks
          • Search