Skip to content

Deployment

Fail2ban

File Browser does not natively support protection against brute force attacks. Therefore, we suggest using something like fail2ban, which takes care of that by tracking the logs of your File Browser instance. For more information on how fail2ban works, please refer to their wiki.

Filter Configuration

An example filter configuration targeted at matching File Browser’s logs.

[INCLUDES]
before = common.conf

[Definition]
datepattern = `^%%Y\/%%m\/%%d %%H:%%M:%%S`
failregex   = `\/api\/login: 403 <HOST> *`

Jail Configuration

An example jail configuration. You should fill it with the path of the logs of File Browser, as well as the port where it is running at.

[filebrowser]

enabled = true
port = [your_port]
filter = filebrowser
logpath = [your_log_path]
maxretry = 10
bantime = 10m
findtime = 10m
banaction = iptables-allports
banaction_allports = iptables-allports