-
-
Notifications
You must be signed in to change notification settings - Fork 316
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add support for 418 for dubious queries #1875
Conversation
44c3e2f
to
ebd6fef
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't really like the matching system, but I don't have any other idea
'.env', | ||
'.git/config', | ||
'.git/HEAD', | ||
'.well-known/security.txt', |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not really related: We could actually add a security.txt to Lychee to easily allow researchers to report vulns to us.
* add support for 418 for dubious queries * skip if honeypot is not enabled
The goal of this is to flag queries which are just bots trying to scan for vulnerabilities.
Combined with Fail2Ban, we can now ban IP then to avoid being hit uselessly by such visitors.
read more here:
https://aureola.codes/en/blog/2021/how-stop-vulnaribility-scanners-laravel-fail2ban
/etc/fail2ban/filter.d/nginx-honeypot.conf
/etc/fail2ban/jail.d/honeypot.conf
Of course in the case of Apache we need to check the respective log.
As said in the article: