Open Source & Collaborative Security with CrowdSec and Traefik - CrowdSec & Traefik Tutorial

Ғылым және технология

CrowdSec is a free, open-source and collaborative IPS. Analyze behaviors, respond to attacks & share signals across the community. With CrowdSec, you can set up your own intrusion detection system that parses logs, detects and blocks threats, and shares bad actors with the larger CrowdSec community. It works great with a reverse proxy like traefik to help keep hackers at bay. Could this be a viable alternative to fail2ban?
Video Notes: technotim.live/posts/crowdsec...
Support me on Patreon: / technotim
Sponsor me on GitHub: github.com/sponsors/timothyst...
Subscribe on Twitch: / technotim
Become a KZread member: / @technotim
Merch Shop 🛍️: l.technotim.live/shop
Gear Recommendations: l.technotim.live/gear
Get Help in Our Discord Community: l.technotim.live/discord
2nd channel: / @technotimtalks
A HUGE THANK YOU to Micro Center for sponsoring this video!
New Customers Exclusive - Get a Free 240gb SSD at Micro Center: micro.center/1fbb85 (paid)
CrowdSec crowdsec.net/
Traefik traefik.io/traefik/
Traefik CrowdSec Bouncer github.com/fbonalair/traefik-...
HomeLab & Self-Hosting Security Guide • Self-Hosting Security ...
Traefik Tutorial • Put Wildcard Certifica...
(Affiliate links may be included in this description. I may receive a small commission at no cost to you.)
00:00 - Intro
00:45 - What is CrowdSec?
02:02 - Advertisement
03:00 - How does CrowdSec work?
03:49 - Privacy
04:01 - CrowdSec with Traefik
05:13 - CrowdSec Docker Container
09:26 - Acquisition File
10:12 - Configuring Traefik Logs Config
11:26 - Update Traefik Docker Compose
12:34 - Start CrowdSec and Check Logs and Metrics
13:49 - Troubleshooting Traefik and CrowdSec
14:56 - Parsers, Collections, and Scenarios Oh My!
16:58 - Install Collection
18:16 - Updating CrowdSec Collections and Definitions
19:23 - CrowdSec Bouncers
20:14 - Traefik Bouncer
21:57 - CrowdSec API Key
22:57 - Traefik ForwardAuth Middleware
25:09 - Testing CrowdSec and Traefik - Blocking & Unblocking
27:07 - CrowdSec Dashboard Local & Cloud
27:34 - CrowdSec Alerting
27:48 - LearnLinuxTV + CrowdSec
28:00 - What do you think of CrowdSec?
28:13 - Stream Highlight - "I use consumer hardware for my HomeLab server"
#CyberSecurity #CrowdSec #Traefik
"Race" is from Harris Heller's album Sunset.
l.technotim.live/sb-music-lic...
Icons in this video have been created by Freepik from flaticon www.flaticon.com/authors/freepik
Thank you for watching!

Пікірлер: 193

  • @TechnoTim
    @TechnoTim2 жыл бұрын

    New Customers Exclusive - Get a Free 240gb SSD at Micro Center: micro.center/1fbb85 (paid)

  • @borat1

    @borat1

    2 жыл бұрын

    I'm def installing crowdsec on my homelab. Don't want any peepers on my NAS!

  • @fabienbonalair1493
    @fabienbonalair14932 жыл бұрын

    I'm the author of the traefik bouncer, thanks for showing my work! Great video, thank you for the content. BTW, it's prononced F bo-na-lair. ;-)

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    :-) Good job, Fabien! We love it!

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thank you so much! Also, thank you for letting me know how to pronounce your name phonetically!

  • @RaidOwl
    @RaidOwl2 жыл бұрын

    Next video: Tim takes jujitsu classes in case someone breaks in to steal his server.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Ninja vanish 🥷

  • @foakingphelp
    @foakingphelp2 жыл бұрын

    Your content keeps getting better and better. Thanks so much for showing us how to geek out even more while keeping ourselves secure!

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    I appreciate that! Thank you so much! It gets harder and harder too :)

  • @mikeyfoofoo
    @mikeyfoofoo2 жыл бұрын

    For a dude that seems to throw around containers like they are nothing, it's nice to see you admit to having to lookup something old-school like crontab. I've been watching your videos to get up to speed on containers.Thanks for the content. You are really good at it!

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thank you! I always try to share what I know and what I don’t know!

  • @fab_spaceinvaders
    @fab_spaceinvaders Жыл бұрын

    Hi mate, u can setup cloudflare bouncer to have crowdsec blacklist shared up to the cloudflare layer. Using it for enterprises u can ask cloudflare to have more than just 10000 ip addresses configured as a list (they raised me to 20k). After some months a bit of improvement is reached that way. Happy hardening u all 🎉

  • @jacksoncremean1664
    @jacksoncremean16642 жыл бұрын

    crowdsec has massive potential and it's great to see that it's getting more love

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Agreed! Huge potential!

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    Thanks for the nice words. Highly appreciated!

  • @killua_148
    @killua_1482 ай бұрын

    It would be great if you can revisit this video, since now traefik has an official plugin, the hub auto update itself (no cron needed), the dashboard looks cool, they have a centralized way to manage multiple instances, they added appsec WAF integration and probably more. There arent't many recent tutorials and you're always spot on with yours.

  • @DNAblue2112
    @DNAblue211210 ай бұрын

    As usual, absolutly epic guide that made it easy for me to get this up and running. thanks heaps!

  • @aryelinux9676
    @aryelinux96762 жыл бұрын

    Tim the King!! as always - thanks for the video - keep them coming - learned a lot!

  • @bronxandbrenx
    @bronxandbrenx2 жыл бұрын

    You are now my master in networking.

  • @toshy50
    @toshy502 жыл бұрын

    I'm already using Traefik so now I'm definitely gonna check out CrowdSec. Looks cool and easy to configure. Thanks for another awesome and easy-to-follow tutorial! FYI, isn't the GID value in the docker-compose file supposed to have colon to specify the default value "${GID:-1000}" ?

  • @virusbcn6472
    @virusbcn64722 жыл бұрын

    Very interesting Tim 👌 Happy to view more smiles 😜

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    More to come!

  • @edb75001
    @edb750012 жыл бұрын

    Man, I absolutely love your content and knowledge. Definitely appreciate ya'...

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thank you so much. That means a lot!

  • @docteurzoidberg
    @docteurzoidberg2 жыл бұрын

    Thanks a lot ! Please show us how you configure a proxmox log parser, or iptables bouncer on an episode #2, would love it

  • @Monsieur2068
    @Monsieur20682 жыл бұрын

    For those curious if you lose your api key you can just do docker exec crowdsec cscli bouncers remove bouncer-traefik and just do the add again.

  • @emileclevers2178
    @emileclevers21782 жыл бұрын

    Hi Tim ! How do you enroll your Crowdsec container in the cloud console ? I've done it with the cscli command but it needs to be done again after each re-creation ...

  • @mozzano
    @mozzano2 жыл бұрын

    Great tutorial Tim! Anyone know of a suitable Crowdsec docker image for arm (Raspberry pi)? I had a look around and couldnt find one. I'd rather install on docker if at all possible.

  • @francoisdeslauriers5940
    @francoisdeslauriers59402 жыл бұрын

    excellent document, I installed it , but had an issue witth the bouncer, even if the manual added ip deciscion is properly added to the list, the bouncer does not blocks ,

  • @t288msd
    @t288msd9 ай бұрын

    works a treat. cheers!

  • @chrisumali9841
    @chrisumali98412 жыл бұрын

    Thanks for the demo and info, have a great day

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thanks, you too!

  • @GSGWillSmith
    @GSGWillSmith Жыл бұрын

    Thank for the video! I would really appreciate a tutorial for using this with nginx proxy manager as well. I'm trying to figure it out, but I haven't gotten it to work yet!

  • @PriyankuBaruah
    @PriyankuBaruah2 жыл бұрын

    How did you get Cloudflare to forward the real IP? In your case if you use Cloudflare which I think you do, the ban only worked because you have a local DNS. Banning your IP would otherwise do nothing because traefik and hence crowdsec would always see the Cloudflare IP assuming you have reverse proxy set up in CF

  • @PeterFortuna
    @PeterFortuna2 жыл бұрын

    Love your stuff

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thank you!

  • @michaelk7321
    @michaelk73212 жыл бұрын

    Good video, Unfortunatly I found crowdsec to be buggy when blocking ssh so I went back to fail2ban.

  • @alphapapa77
    @alphapapa77 Жыл бұрын

    14:45 - I have the folder but no logs. When I exec into traefik there are both the log files. I've gone through my yml files 5 times now a nd rewatched the video to this point a few more. My networks are the same. Maybe there is something different being I am trying a year after your post?

  • @Smoothi0815
    @Smoothi08156 ай бұрын

    Hey @TechnoTim, did you tried the Metabase Dashboard? It works fine, but after compose recreation the credentials are default again. Were can i find the credential information to persist?

  • @Weirlive
    @Weirlive2 жыл бұрын

    Great video! I think I’ll deploy this at least on my Docker-Web server.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thanks!

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    Brilliant idea :-)

  • @Weirlive

    @Weirlive

    2 жыл бұрын

    @@crowdsec I'm sensing a bias... :D

  • @robyee3325
    @robyee3325Күн бұрын

    this was great!

  • @fbifido2
    @fbifido22 жыл бұрын

    can you show how to run crowdsec with nginx proxy manager ??

  • @pewter77
    @pewter772 жыл бұрын

    I just set this up, be aware that if you're running behind a reverse proxy like cloudflare the traefik bouncer here doesn't use the correct IP address due using the incorrect header value.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    I noticed that too and there is a PR out there for it. According the CrowdSec though, CloudFlare IPs are on their global allow list so they can’t be blocked. Hopefully the PR gets merged to look at the real ip in the header

  • @pewter77

    @pewter77

    2 жыл бұрын

    @@TechnoTim The main problem isn't cloudflare IPs getting banned, it's that the bouncer doesn't block anything because it reads the headers and asks CrowdSec for information on the wrong IP. The PR is mine, I'm running it currently on my machine and it works well so hopefully the dev comes back soon!

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Ah! Nice! Thank you! I have been watching that issue! Looks like it was merged!

  • @2metal4you28
    @2metal4you286 ай бұрын

    never been happier to have a cleaned up Johnny Depp show me the way

  • @chrisrisley1324
    @chrisrisley13242 жыл бұрын

    Hey, Tim. Really enjoying the channel and Discord. I have a question not crowdsec related but something I noticed in the video. Would you mind going into some detail on the ip whitelist(s) for Traefik? Couple of us trying to get it figured out and not having much luck. Definitely implementing crowdsec now!

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thanks! I might at some point or you can all join our discord! Some folks use it in there!

  • @chrisrisley1324

    @chrisrisley1324

    2 жыл бұрын

    @@TechnoTim, cool. We’re there. Great place.

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    That sounds great!

  • @chandler-barry
    @chandler-barry6 ай бұрын

    ur awesome tim

  • @ChrisDePasqualeNJ
    @ChrisDePasqualeNJ2 жыл бұрын

    Hey Tim, great video appreciate all your hard work. I've been trying to install crowd sec for some time now in my environment. I have two raspberry pi's one 32 bit and one 64 bit. Crowd sec has given some instructions on how to install on arm but my Linux skills are lacking and well they don't show us like you do. Also I don't use traffic I use nginx reverse proxy. Should I even try or should I keep waiting for someone to make a video specifically for raspberry pi crowd sec with Nginx and docker.

  • @dermuschelschluerfer

    @dermuschelschluerfer

    2 жыл бұрын

    I wouldnt run an ips firewall on a raspberry pi. Its like showing everyone you have a tank in the garden to defend your country but in reality that tank is just out of cardboard. The performance wont hold up.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    I’d give it a shot over waiting, but that’s just me!

  • @philippehumeau7972

    @philippehumeau7972

    2 жыл бұрын

    The most likely place to find help on this topic is CrowdSec discourse server or the discord one (just google them)

  • @speedhunter787
    @speedhunter787 Жыл бұрын

    crowdsec and traefik seem to be seeing my docker bridge network gateway IP, not the client IP, so crowdsec doesn't seem to be working for me. Do you know what I would do to resolve it?

  • @zedzed4238
    @zedzed4238 Жыл бұрын

    I always see these videos with crowd-sec, fail2ban, etc, and I want to add these to my setup, but what I always see left out is the explanation of what happens to self-hosted content that isn't accessed exclusively from a browser? Like emby/plex wallabag bitwarden, etc, that have a mobile app integration and even a possible chrome extension? Do they just break unless the app-code is specifically built to work with it? because it seems like crowdsec and f2b work by placing a sort of http "basic-auth" layer in front of it and forwarding the creds to the app and then logging the apps response and sifting through those logs with the bouncers etc, unless I misunderstood that, and if that's the case, what if the chrome extensions for bitwarden and the mobile apps for emby/plex aren't setup to expect that middleware layer between the emby server and the mobile app? For example, does the bitwarden mobile app need to be specifically developed to expect that middleware layer or is it a seemless interception of the creds the mobile app passes to what it thinks to be the bitwarden server and is in reality the traefik/crowdsec middleware? An alternative would be if the middleware just passes through traffic that has http-headers/user agent strings that identify it as a mobile app to maintain compatibility because it doesn't deal with mobile apps, but what stops bots from just using that user-agent string to bypass the middleware if that's how it works? Again If anyone has experience with this i'd love to hear any explanations or corrections of misunderstandings i might have. It's one of those things that i've searched the docs for but it seems like i won't know it it works or not until i attempt it unless someone else has already and can share their experience

  • @coletraintechgames2932
    @coletraintechgames29322 жыл бұрын

    Your my boy blue! And I understand why you did this, and I am glad you made a video! Seriously But I don't know what you are talking about. You went from cards you colored with a crayon yourself to this... Quite a leap! Especially for me! Like I said, I'm glad you did it. Seriously. And in about 3 years when I have caught up with you, I will be thankful! Ha ha keep up the good work. Lots of your vids meant nothing at first and then a few months later, I was on bord.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thank you!

  • @themorpheusmm
    @themorpheusmm2 жыл бұрын

    Windows is not yet supported

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    #soon

  • @aredcat1
    @aredcat12 жыл бұрын

    Hi, what extension do you use for highlighting arrays in the stack!?) it very useful

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Rainbow indent!

  • @rottison
    @rottison2 жыл бұрын

    Hi just wanted to ask u about your rack, on the bottom of it you have a 24 bay disk shelf what did you use to mount it in the rack? was it a Adjustable Rack Mount Server Shelf Rails 1U?

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    You can find all the gear I recommend here! kit.co/TechnoTim

  • @notdefined5768
    @notdefined57682 жыл бұрын

    what a brilliant video. i was thinking crowdsex not to long ago... but decided on a not yet... but maybe... hmm... i have a question though. What do you use for monitoring your network/home lab for failures/outages/etc etc ? I was looking at nagios but decided to stop looking there since core was note updated in 2 years... And the options are almost infinite... i'm a but lost at this point...

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thanks! Check out my video on Uptime Kuma!

  • @howling-wolf
    @howling-wolf3 ай бұрын

    wait in the end it sounds like i have to manually add ips to the descsions list. I thought this is an automatic thing that bans any IP that appears SUS to my instance or is already known to be sus.

  • @ivlis32
    @ivlis322 жыл бұрын

    How do you configure crowdsec to download their ban list and apply to your instance? Or is it automatic? This is kind of the whole point.

  • @philippehumeau7972

    @philippehumeau7972

    2 жыл бұрын

    it's automatic (based on the scenario you run). you can list the content from the list with cscli

  • @ph4nt0mcz130
    @ph4nt0mcz1302 жыл бұрын

    What is nice? A great selfhosted solution. What is even better? A solution with awesome graphics!

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thank you!

  • @exact-estimate
    @exact-estimate2 жыл бұрын

    Hey, great vids, just started self hosting, you're giving me too many ideas... Anyway, I'd love a video covering how you might have setup services that use SMTP/email settings. Thinking WordPress, Vaultwarden etc. Thinking to have a single SMTP relay that everything points to, which then forwards out via Gmail/X service.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    If you want ideas, check out kzread.info/dash/bejne/e3lp25SYg5u5aLg.html 😀😀

  • @exact-estimate

    @exact-estimate

    2 жыл бұрын

    @@TechnoTim nooooooo 😝 my wife has enough things breaking already

  • @KeshavSreekumar
    @KeshavSreekumar2 жыл бұрын

    Will this still work through cloudflare, specifically does it know how to parse the cloudflare forwarded IP field?

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    It should be able to parse the header however I just noticed there is a PR to fix a bug with it, hopefully it gets merged! ☝️

  • @jhmc93
    @jhmc93 Жыл бұрын

    I know this vid is a year old, but good video, would you do a guide for the nginx proxy manager with crowdsec?

  • @tcasex

    @tcasex

    8 ай бұрын

    this would be nice..

  • @danielcronk739
    @danielcronk7392 жыл бұрын

    Thanks for the great tutorial and video. I've leared a lot from you over the last few months. After working through this and installing I have a question I'd like your input on. When proxying through Cloudflare, crowdsec is analyzing the Cloudfare IP, not the real IP of the client. Now I can imagine how this may be useful if someone decides to attack the IP directly or somehow gets around Cloudflare (I can't even begin to imagine how that's even possible), but I have my firewall to only accept connections from Cloudflare IPs on 80/443. So in that instance, can you still see any benefit to crowdsec? I know there are some complicated ways to have traefik be able to see the real IP from Cloudflare, but I haven't attempted that yet.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    I think there is a PR out there to fix this!

  • @ColinEditz

    @ColinEditz

    2 жыл бұрын

    Hi Daniel, I appreciate the kind of higher level thinking of your comment. I have the exact same setup in regard to Cloudflare and only accepting Cloudflare IPs on 80/443, and had not thought of this yet. I wonder if you have done any more thinking about this. Are you still running Crowdsec or have you deemed it unnecessary? I see there is also a Cloudflare-Bouncer, which seems to take a different approach and updates your firewall settings in Cloudflare itself. Curious to hear what you think.

  • @TechnoTim
    @TechnoTim2 жыл бұрын

    How do you protect your services?

  • @haniel9079

    @haniel9079

    2 жыл бұрын

    I watch your videos and use them in the home lab. (it is a work in progress). I also use a vpn and an ip whitelist.

  • @MichaelKliewe
    @MichaelKliewe2 жыл бұрын

    I guess I would have started the bouncer before crowdsec, so that it's available when crowdsec starts up. Which means: crowdsec should depend on the bouncer. Am I wrong?

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    No since you can run everything distributed on different servers. You can have one agent receving logs from multiple other servers and controlling bouncers on remote firewalls, even across operating systems. So we can't depend the installation of the bouncer in the agent. And that is by design :-)

  • @V3ritas1989
    @V3ritas19892 жыл бұрын

    In europe stuff like this is always a pain to check if it is in line with GDPR

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    We're based in EU so GDPR is obviously taken into consideration. The only data that's being collected is the ip of the offender, timestamp and metadata on the attack (=which scenario triggered). So nothing to worry about in terms of GDPR.

  • @koevoet7288
    @koevoet72882 жыл бұрын

    Why dont you just use bind mounts instead of docker volumes? Aren’t binds easier to use and backup?

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    I did bind mount the only thing I want backed up, the config. The rest (like logs) is in a docker volume which I don't care too much about. Also, their docs say to do it like this and I had issues trying to bind locally.

  • @bladrbrettel6511
    @bladrbrettel65112 жыл бұрын

    hey it's me again I'm have a question, with that configuration you will not have logs on the the stdthing (out/err/in) don't remember witch one docker logs use, that's OK for crowdsec that need that aparently but how to put those logs in loki for grafana ? did you try the traefik/grafana/crowdsec combo and how to make those those logs from file in the loki-driver too ? thanks :)

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Haven’t tried it yet but anything that logs to stdout should be captured and sent using my method

  • @bladrbrettel6511

    @bladrbrettel6511

    2 жыл бұрын

    @@TechnoTim yeah except that for Traefik if you defined a file for the logs it will go to the file no more to stout... So you will have to set another job specific for Traefik, and may be some other container that will do the same: if log file is defined then pour in the file not stout anymore, and doing so I'm woundering how I can recognise that it's logs from container traefik. Using the same seentic in grafana... Or may be we should investigate the logs volume in crowdsec (or in the other way) ask crowdsec to look the logs from the grafana/loki logs directories...

  • @Kevin-oj2uo
    @Kevin-oj2uo9 ай бұрын

    Would this be the same as the plugin that is available for traefik?

  • @TechnoTim

    @TechnoTim

    9 ай бұрын

    Yes!

  • @joelang6126
    @joelang61262 жыл бұрын

    Tim what's the music during the crowd sec intro section.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    It's in the description!

  • @marcello4258
    @marcello42582 жыл бұрын

    The reason working in crown tabs is confusing is because you shouldn't. You better set it up via crony or similar. Btw same goes for the sudoers file

  • @408427
    @4084272 ай бұрын

    Can we get a updated video

  • @mitchross2852
    @mitchross28522 жыл бұрын

    This is really good. Thanks for putting this together.

  • @Calvin420GetRektM8
    @Calvin420GetRektM82 жыл бұрын

    One thing, that you still dont follow: you dont capsule your services from another. You just use ONE network: "Proxy" if you want to protect your services even more, you should create seperate containers between the traefik and services like heimdall and co.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thanks! I break up my compose files. Also, don't all services that are served through he reverse proxy need to be on the same docker network to proxy through?

  • @onehumanwasted4228
    @onehumanwasted42282 жыл бұрын

    It works 🙂

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    congrats!

  • @VillSid
    @VillSid2 жыл бұрын

    Question: Won't access log grow to infinity? How big is your access.log file right now? What should be the cap? Request: Can you make an update to Grafana monitoring guide using influxdb and adding consolidating the alerts including crowdsec? I just want "BOGOOGA" sound alert on my phone if I am getting DDosed.

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    You should join our Discord and ask about the Grafana stuff if you want fast help. Also you can setup a number of notifications on CrowdSec when a scenario triggers. So basically your DDoS scenario would trigger an alert which would then be sent to your phone. No problem with CrowdSec.

  • @striderstache99
    @striderstache99 Жыл бұрын

    I got hit with almost 8,000 requests on my Synology in three days. I watched the notification stream up into the notification box at a rapid enough pace I was legit afraid lol. Luckily I had protections in place because oh myyyy

  • @primenetwork27
    @primenetwork275 ай бұрын

    How do i reseve proxy outside doxker

  • @mormantu8561
    @mormantu85612 жыл бұрын

    Maybe I'm missing something. But didn't you configure a conditional forward in your UDM Pro so that only traffic from Cloudflare gets allowed? In other words, if the rest of the packets gets dropped, what's the advantage of this?

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Helps if someone or something makes it past Cloudflare. It adds IPS to my Traefik instance

  • @mormantu8561

    @mormantu8561

    2 жыл бұрын

    @@TechnoTim But if someone makes it past Cloudflare the traffic gets dropped by your firewall right? So it doesn't reach your Traefik instance.

  • @wyattarich

    @wyattarich

    2 жыл бұрын

    @@mormantu8561 Why would Cloudflare be the only thing that can reach Traefik? There's a lot to connect to out there... What if someone SSH tunnels to an unlucky internal device that's been compromised in order to pivot around inside the network? Better to have multiple walls to climb than just one you can walk around.

  • @mormantu8561

    @mormantu8561

    2 жыл бұрын

    @@wyattarich True, but in another video he showed us that traffic on http(s) to his Traefik instance is only allowed from Cloudflare IP addresses. My comment was about why he would implement this if he has that rule, but come to think of it, maybe he means if Cloudflare fails to detect a threat. Whereas I thought that he meant what if someone or something bypasses Cloudflare entirely.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    That's right. I don't mean that someone circumvented cloudflare, I mean that cloudflare's bot detection might not catch all bad actors, where this is yet another line of defense.

  • @krishnegowdaa.h2271
    @krishnegowdaa.h2271 Жыл бұрын

    When I'm using CF proxy how to get real ip to crowdsec ?

  • @brianmccullough4578
    @brianmccullough45782 жыл бұрын

    Micro center is like Disney land

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Agreed! That's how I feel when I walk in!

  • @denzilhoff6026
    @denzilhoff60262 жыл бұрын

    Instead of crontab, you might want to get familiar with systemd timers. Much easier to manage in my opinion.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Good call!

  • @mikeyfoofoo

    @mikeyfoofoo

    2 жыл бұрын

    @@TechnoTim Maybe systemd timers would make a good video?

  • @manuelthallinger7297
    @manuelthallinger72972 жыл бұрын

    The Core Question for me is, can i make Trafik work behind an HaProxy. I have atm a haproxy running in my pfsense and i would like to keep that, but trafik with crowdsec would be a nice addition? What IP does Crowdsec ban ? For example can i tell it to ban cf-connecting-ip ?

  • @philippehumeau7972

    @philippehumeau7972

    2 жыл бұрын

    well here you can use crowdsec with opnsense, ha proxy, nginx or as a container so quite some flexibility :) Ip are banned base on the sightings of all user of the community and curated by CrowdSec to avoid false positives and poisoning.

  • @manuelthallinger7297

    @manuelthallinger7297

    2 жыл бұрын

    @@philippehumeau7972 Played around with it, atm still behind my haproxy and works well. I noticed some problems over the time with running software behind cloudflare. Some software is intelligent enough to recognize the real ip ( it can be seen through the CF-Connecting-IP Header), some just see the Cloudflare IP and the last thing I would want it to do is to block the Cloudflare ips =) the only thing really missing from traefik is brotli, but that's just personal preference

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    @@manuelthallinger7297 No matter what there are ips that can't be blocked. Clouflare and other CDN provider's ips are among those.

  • @cbaservs
    @cbaservs4 ай бұрын

    seems still pretty complex but i feel following the steps it can be done

  • @DaPanda19
    @DaPanda192 жыл бұрын

    Calmly waiting on your Turing Pi cluster video... I.... Promise..... :)

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    I'm working on it!

  • @DaPanda19

    @DaPanda19

    2 жыл бұрын

    @@TechnoTim no rush! Just excited to follow along! (Assuming the format of the vid). Have 1 Pi4 8GB, 2 Pi4 4GB, and 3 Jetson Nano 2GB that I wanna use :) Sorry just excited! Also thank you for getting me into homelabbing! Really appreciate it!

  • @typkrft
    @typkrft2 жыл бұрын

    The container has crontab in it. Just mount a script with cscli hub update && cscli hub upgrade to /etc/periodic/hourly.

  • @apscandy
    @apscandy2 жыл бұрын

    I have been using crowdsec on my Debian server for the past week but I had no idea they Docker images and docker bouncers

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    You can ignore those ENV for k8s. They should have access to write to their PVC

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    Great to hear. CrowdSec is available on a lot of platforms :-)

  • @steaders82
    @steaders822 жыл бұрын

    Hi Tim I'm having an issue that it only works for me when I block a local (docker) IP. If I block my public IP it still permits access. When I view the logs it only shows the local addresses. Any ideas?? Thank you

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    I thought there might have been a bug that was recently fixed

  • @steaders82

    @steaders82

    2 жыл бұрын

    @@TechnoTim I got it working. I added a second interface on 'host' that seemed to fix it Nice videos BTW. I've been in the game 15 years and still learning 🇬🇧

  • @festro1000
    @festro10002 жыл бұрын

    Sounds great, but this is not only open sourced but the database is managed by the community; what's to stop bad actors from listing valid sites as malicious? wouldn't that make this it's own kind of ddos attack if people can't access a site because someone fraudulently added it to a block list?

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    That's a good question. Very shortly described it's based on trust level but servers who report; the longer time they have sine so reliably, the higher trust ranking and the more do they count when determining wheter an IP is bad or not. Also, an ASN only gets one count. All this and more exists to make poisioning as expensive and hard as possible. If you have more questions, feel free to go to our Discord.

  • @festro1000

    @festro1000

    2 жыл бұрын

    @@crowdsec Ok thanks, a few more things to consider would be oversight, I read that a university was banned despite making years of commits to Linux for posting some intentionally bad commits, and you said that an ASN only gets one count are their measures taking botnets into consideration? because I can't imagine it would be hard for someone with a large botnet spoofing an address to make it seem malicious.

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    @@festro1000 Where was the university banned? Was this in relation to CrowdSec? No, we're only taking their actual behaviour in terms of how realiably they send signals into consideration. Could you elaborate on the spoofing part?

  • @thbe51
    @thbe519 ай бұрын

    Late for the Party but thanks anyway. Works perfect!! 🙂🙂

  • @thefrisianclause
    @thefrisianclause2 жыл бұрын

    Well atleast you can say that the security information that you have been providing to us, works in with evidence :)

  • @KronosaurusRex
    @KronosaurusRex Жыл бұрын

    In case you see this, this is blocking every internal service but not the ones that are external. Guess it's due to the ip that we are blocking being internal.

  • @freddywestside3763
    @freddywestside37632 жыл бұрын

    That promotion has been going on for so long I'm really starting to wonder if they got an amazing deal on a container full of 240gb SATA SSDs or added a 0 to an order right before the price came down on 500's.

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    It is generous! They have amazing deals on everything :)

  • @freddywestside3763

    @freddywestside3763

    2 жыл бұрын

    @@TechnoTim I'm a fan of Microcenter, just can't spend much money with them because they don't have a store near me and their web presence I so limited, and it is a great promotion. I'm just saying that after two years it's starting to feel like a creative solution to a massive overstock 😂

  • @RonDLite
    @RonDLite2 жыл бұрын

    Those 1.2m people should have clicked subscribe, those get through!

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    That's what I'm talking about!

  • @MadChristianX
    @MadChristianX2 жыл бұрын

    During you were DDOS attacked I tried to find your article about traeffik 2 and I was lost 😩

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    My Traefik guide is here! docs.technotim.live/posts/traefik-portainer-ssl/

  • @MadChristianX

    @MadChristianX

    2 жыл бұрын

    I used your traefik 2 ingres guiide to set up traefik as reverse proxy in my k3s cluster (some Pi's, some x86 VM's and one Mac mini M1). I needed some time to figure out how to route on external endpoints in my network for services that are not in the cluster yet. Thanks to your new guides i will never be bored.

  • @xandercode
    @xandercode2 жыл бұрын

    Informative video. It's not nice whoever did the ddos, did it in the first place. properly for internet cred if that a thing 😁😂

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    haha! I agree! It was all blocked but scary / awesome to see!

  • @Trotroyanas
    @Trotroyanas2 жыл бұрын

    hi, you have a github with this complete solution ?

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    In my docs, and in github

  • @Trotroyanas

    @Trotroyanas

    2 жыл бұрын

    ​@@TechnoTim yes i think found :) thank you

  • @TechnoTim
    @TechnoTim2 жыл бұрын

    New Customers Exclusive - Get a Free 240gb SSD at Micro Center: micro.center/1fbb85 (paid)

  • @dontworry7127
    @dontworry71276 ай бұрын

    Very well explained but you dont have the files on github :(

  • @TechnoTim

    @TechnoTim

    6 ай бұрын

    The link is in the description :(

  • @DigitEgal
    @DigitEgal2 жыл бұрын

    Collaborative Open Source is the future

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    agreed!

  • @crowdsec

    @crowdsec

    2 жыл бұрын

    We approve of this message!

  • @bladrbrettel6511

    @bladrbrettel6511

    2 жыл бұрын

    Open Source is collaborative by definition, I would have said it's the past, the present, and must improve in the future ;)

  • @MrHjscott
    @MrHjscott2 жыл бұрын

    Thanks!

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Thank you so much!

  • @NovaCayn
    @NovaCayn2 жыл бұрын

    Will this work with Nginx Proxy Manager?

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    Not sure, check their docs!

  • @BrianThomas
    @BrianThomas6 ай бұрын

    I know he's going slow, which is helpful, but I just want to do a temperature check in the comment section. Does anyone fully get what he's saying?

  • @TechnoTim

    @TechnoTim

    6 ай бұрын

    I do

  • @WildestPotato
    @WildestPotato Жыл бұрын

    Install starts at 5:15

  • @Mark-xj6ry
    @Mark-xj6ry Жыл бұрын

    "ah-quiz" file, youre welcome

  • @PeterBatah
    @PeterBatah8 ай бұрын

    Acquis is pronounced "A Key"

  • @Rundik
    @Rundik2 жыл бұрын

    You can not protect your home lab against ddos. I suggest you not to waste time on this unless your home is inside a datacenter. Even if you set an ip whitelist to all ports and protocols it's not going to protect you. If your bandwidth can't handle it, there is nothing you can do. There is a possibility to use bgp flow to your advantage, but I don't know a single home internet provider who supports it and even then it's really limited

  • @Rundik

    @Rundik

    2 жыл бұрын

    Just keep using proxy man

  • @Rundik

    @Rundik

    2 жыл бұрын

    And against brute force attacks and vulnerability scanning you should just use WAF for public services and VPN server for maintenence and stuff

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    You can protect your homelab against DDOS by using Cloudflare which hides your public IP and points incoming traffic to their proxy which has DDOS protection.

  • @mmospanenko
    @mmospanenko12 күн бұрын

    Crowdsec? Seriously 😅

  • @Bad_Chad
    @Bad_Chad2 жыл бұрын

    Dang 4 minute of video ads prior to the content. Real cool….

  • @TechnoTim

    @TechnoTim

    2 жыл бұрын

    There were 60 seconds of ads and thanks

  • @bladrbrettel6511
    @bladrbrettel65112 жыл бұрын

    Hi Tim, I tried crowdsec on traefik, but I think authelia is getting in the way ! I did many try to connect on my phone but no log in traefik yet when I want to see the log of the authelia application I can see the log : Unsuccessful 1FA authentication attempt by user '' and so far CS did not decide to block those try ! so it's great to block already known IPs I looking forward to an update so we can add authelia in the survey of CS :) I already found the collection and configuration now I need to put that togather and add a new aquisition in the list, but that part is a bit clouded for 1 folder it's clear, cristal clear, but can I add other foler with other labels... and what abount a bouncer for that app? may be it's not needed cause the app that will block is traefik; I'ld like to get the logs of the server hosting docker to be analysed too; to be sure no brute force will be attempted on my ssh even if I'm a no password guy I'd like to get those metrics in CS ;) So here you gave me way to criticaly upgrade my securiity :D again thanks dude :)

  • @bladrbrettel6511

    @bladrbrettel6511

    2 жыл бұрын

    found part of the solution by putting the /etc/crowdsec/config.yaml file out of the container and changed the line acquisition_path to acquisition_dir and and create a folder in my mounted directory to put those acquisitions files instead of just having one file...

  • @bladrbrettel6511

    @bladrbrettel6511

    2 жыл бұрын

    Hey I managed to get my phone blocked with multi testing wrong user and of course password \o/ So now that's done ! Extracting the configuration file and replace with no typo (I had a few so I had to precise) the path by a dir you can now put more than one file to the inquisition ;) And I just thought that I could just mount the file of my host to the CS pod so CS could do it's magic too for bad guys trying to ssh in even if the challange ssh key is stronger than password that does not mean you should put no security espacialy in those dark times ! xD So basicaly now the only thing is to do it now... yet for this one I think I should add a bouncer but how to give it access the system FW 🤔May be I will look at the bouncers and invest in a true FW it will not be lost xD 1 am here, need to sleep this over ;)

Келесі