Docs on required capabilities? (NET_ADMIN / NET_RAW)
#3957
-
|
I've tried searching a bit for information regarding capabilities Fail2Ban expects to run, but it's either not documented that well in this repo/issues/discussions, or I'm using the wrong keywords. I commonly see |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
|
Fail2ban (as tool or as python process) doesn't require any capability to run, but... Because normally fail2ban-server running (as systemd service or init-daemon) as root, it has basically all needed capabilities per definition, therefore it is not documented well. The same is surely valid for containers (if fail2ban shall run in a container, but for instance ban or monitor logs/journal outside of container), however this is a repository rather for bare metal and doesn't focus on containers either... There are some forks, like https://github.com/crazy-max/docker-fail2ban that may be probably better suitable for such question. Although the question is too generic for my taste and it really depends. |
Beta Was this translation helpful? Give feedback.
Fail2ban (as tool or as python process) doesn't require any capability to run, but...
It surely depend on goals for which you need it, and then on jails to protect, banning actions, etc. E. g. if you would need banactions to ban IPs via net-filter subsystem (iptables/nftables/etc) it would be surely NET_ADMIN. But if you do banning not IP-based, e. g. session/user/token only, for instance with something like
nginx-block-mapaction, or your action just redirect requests to some proxy backend (honeypot) for certain IDs, or it is just an action notifying admin by e-mail by some failures, you'd not need it at all.Also it is crucial to able to monitor logs and/or journal (but I don't think yo…