forked from go-gitea/gitea
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge remote-tracking branch 'giteaofficial/main'
* giteaofficial/main: Rework mailer settings (go-gitea#18982) Add default value for clone URLs (go-gitea#20600) [skip ci] Updated translations via Crowdin docs: zh-cn translations for fail2ban setup (go-gitea#20588) Should also support upper-case README files (go-gitea#20581) Fix typos in backup documentation (go-gitea#20567)
- Loading branch information
Showing
22 changed files
with
480 additions
and
163 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1503,50 +1503,58 @@ ROUTER = console | |
;; Prefix displayed before subject in mail | ||
;SUBJECT_PREFIX = | ||
;; | ||
;; Mail server | ||
;; Gmail: smtp.gmail.com:587 | ||
;; QQ: smtp.qq.com:465 | ||
;; As per RFC 8314 using Implicit TLS/SMTPS on port 465 (if supported) is recommended, | ||
;; otherwise STARTTLS on port 587 should be used. | ||
;HOST = | ||
;; | ||
;; Disable HELO operation when hostnames are different. | ||
;DISABLE_HELO = | ||
;; | ||
;; Custom hostname for HELO operation, if no value is provided, one is retrieved from system. | ||
;; Mail server protocol. One of "smtp", "smtps", "smtp+startls", "smtp+unix", "sendmail", "dummy". | ||
;; - sendmail: use the operating system's `sendmail` command instead of SMTP. This is common on Linux systems. | ||
;; - dummy: send email messages to the log as a testing phase. | ||
;; If your provider does not explicitly say which protocol it uses but does provide a port, | ||
;; you can set SMTP_PORT instead and this will be inferred. | ||
;; (Before 1.18, this was controlled via MAILER_TYPE and IS_TLS_ENABLED.) | ||
;PROTOCOL = | ||
;; | ||
;; Mail server address, e.g. smtp.gmail.com. | ||
;; For smtp+unix, this should be a path to a unix socket instead. | ||
;; (Before 1.18, this was combined with SMTP_PORT as HOST.) | ||
;SMTP_ADDR = | ||
;; | ||
;; Mail server port. Common ports are: | ||
;; 25: insecure SMTP | ||
;; 465: SMTP Secure | ||
;; 587: StartTLS | ||
;; If no protocol is specified, it will be inferred by this setting. | ||
;; (Before 1.18, this was combined with SMTP_ADDR as HOST.) | ||
;SMTP_PORT = | ||
;; | ||
;; Enable HELO operation. Defaults to true. | ||
;ENABLE_HELO = true | ||
;; | ||
;; Custom hostname for HELO operation. | ||
;; If no value is provided, one is retrieved from system. | ||
;HELO_HOSTNAME = | ||
;; | ||
;; Whether or not to skip verification of certificates; `true` to disable verification. This option is unsafe. Consider adding the certificate to the system trust store instead. | ||
;SKIP_VERIFY = false | ||
;; If set to `true`, completely ignores server certificate validation errors. | ||
;; This option is unsafe. Consider adding the certificate to the system trust store instead. | ||
;FORCE_TRUST_SERVER_CERT = false | ||
;; | ||
;; Use client certificate | ||
;USE_CERTIFICATE = false | ||
;CERT_FILE = custom/mailer/cert.pem | ||
;KEY_FILE = custom/mailer/key.pem | ||
;; | ||
;; Should SMTP connect with TLS, (if port ends with 465 TLS will always be used.) | ||
;; If this is false but STARTTLS is supported the connection will be upgraded to TLS opportunistically. | ||
;IS_TLS_ENABLED = false | ||
;; Use client certificate in connection. | ||
;USE_CLIENT_CERT = false | ||
;CLIENT_CERT_FILE = custom/mailer/cert.pem | ||
;CLIENT_KEY_FILE = custom/mailer/key.pem | ||
;; | ||
;; Mail from address, RFC 5322. This can be just an email address, or the `"Name" <[email protected]>` format | ||
;FROM = | ||
;; | ||
;; Sometimes it is helpful to use a different address on the envelope. Set this to use ENVELOPE_FROM as the from on the envelope. Set to `<>` to send an empty address. | ||
;ENVELOPE_FROM = | ||
;; | ||
;; Mailer user name and password | ||
;; Please Note: Authentication is only supported when the SMTP server communication is encrypted with TLS (this can be via STARTTLS) or `HOST=localhost`. | ||
;; Mailer user name and password, if required by provider. | ||
;USER = | ||
;; | ||
;; Use PASSWD = `your password` for quoting if you use special characters in the password. | ||
;PASSWD = | ||
;; | ||
;; Send mails as plain text | ||
;; Send mails only in plain text, without HTML alternative | ||
;SEND_AS_PLAIN_TEXT = false | ||
;; | ||
;; Set Mailer Type (either SMTP, sendmail or dummy to just send to the log) | ||
;MAILER_TYPE = smtp | ||
;; | ||
;; Specify an alternative sendmail binary | ||
;SENDMAIL_PATH = sendmail | ||
;; | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -647,41 +647,35 @@ Define allowed algorithms and their minimum key length (use -1 to disable a type | |
## Mailer (`mailer`) | ||
|
||
- `ENABLED`: **false**: Enable to use a mail service. | ||
- `DISABLE_HELO`: **\<empty\>**: Disable HELO operation. | ||
- `HELO_HOSTNAME`: **\<empty\>**: Custom hostname for HELO operation. | ||
- `HOST`: **\<empty\>**: SMTP mail host address and port (example: smtp.gitea.io:587). | ||
- As per RFC 8314, if supported, Implicit TLS/SMTPS on port 465 is recommended, otherwise opportunistic TLS via STARTTLS on port 587 should be used. | ||
- `IS_TLS_ENABLED` : **false** : Forcibly use TLS to connect even if not on a default SMTPS port. | ||
- Note, if the port ends with `465` Implicit TLS/SMTPS/SMTP over TLS will be used despite this setting. | ||
- Otherwise if `IS_TLS_ENABLED=false` and the server supports `STARTTLS` this will be used. Thus if `STARTTLS` is preferred you should set `IS_TLS_ENABLED=false`. | ||
- `FROM`: **\<empty\>**: Mail from address, RFC 5322. This can be just an email address, or | ||
the "Name" \<[email protected]\> format. | ||
- `ENVELOPE_FROM`: **\<empty\>**: Address set as the From address on the SMTP mail envelope. Set to `<>` to send an empty address. | ||
- `PROTOCOL`: **\<empty\>**: Mail server protocol. One of "smtp", "smtps", "smtp+startls", "smtp+unix", "sendmail", "dummy". _Before 1.18, this was inferred from a combination of `MAILER_TYPE` and `IS_TLS_ENABLED`._ | ||
- SMTP family, if your provider does not explicitly say which protocol it uses but does provide a port, you can set SMTP_PORT instead and this will be inferred. | ||
- **sendmail** Use the operating system's `sendmail` command instead of SMTP. This is common on Linux systems. | ||
- **dummy** Send email messages to the log as a testing phase. | ||
- Note that enabling sendmail will ignore all other `mailer` settings except `ENABLED`, `FROM`, `SUBJECT_PREFIX` and `SENDMAIL_PATH`. | ||
- Enabling dummy will ignore all settings except `ENABLED`, `SUBJECT_PREFIX` and `FROM`. | ||
- `SMTP_ADDR`: **\<empty\>**: Mail server address. e.g. smtp.gmail.com. For smtp+unix, this should be a path to a unix socket instead. _Before 1.18, this was combined with `SMTP_PORT` under the name `HOST`._ | ||
- `SMTP_PORT`: **\<empty\>**: Mail server port. If no protocol is specified, it will be inferred by this setting. Common ports are listed below. _Before 1.18, this was combined with `SMTP_ADDR` under the name `HOST`._ | ||
- 25: insecure SMTP | ||
- 465: SMTP Secure | ||
- 587: StartTLS | ||
- `USE_CLIENT_CERT`: **false**: Use client certificate for TLS/SSL. | ||
- `CLIENT_CERT_FILE`: **custom/mailer/cert.pem**: Client certificate file. | ||
- `CLIENT_KEY_FILE`: **custom/mailer/key.pem**: Client key file. | ||
- `FORCE_TRUST_SERVER_CERT`: **false**: If set to `true`, completely ignores server certificate validation errors. This option is unsafe. Consider adding the certificate to the system trust store instead. | ||
- `USER`: **\<empty\>**: Username of mailing user (usually the sender's e-mail address). | ||
- `PASSWD`: **\<empty\>**: Password of mailing user. Use \`your password\` for quoting if you use special characters in the password. | ||
- Please note: authentication is only supported when the SMTP server communication is encrypted with TLS (this can be via `STARTTLS`) or `HOST=localhost`. See [Email Setup]({{< relref "doc/usage/email-setup.en-us.md" >}}) for more information. | ||
- `SEND_AS_PLAIN_TEXT`: **false**: Send mails as plain text. | ||
- `SKIP_VERIFY`: **false**: Whether or not to skip verification of certificates; `true` to disable verification. | ||
- **Warning:** This option is unsafe. Consider adding the certificate to the system trust store instead. | ||
- **Note:** Gitea only supports SMTP with STARTTLS. | ||
- `USE_CERTIFICATE`: **false**: Use client certificate. | ||
- `CERT_FILE`: **custom/mailer/cert.pem** | ||
- `KEY_FILE`: **custom/mailer/key.pem** | ||
- Please note: authentication is only supported when the SMTP server communication is encrypted with TLS (this can be via `STARTTLS`) or SMTP host is localhost. See [Email Setup]({{< relref "doc/usage/email-setup.en-us.md" >}}) for more information. | ||
- `ENABLE_HELO`: **true**: Enable HELO operation. | ||
- `HELO_HOSTNAME`: **(retrieved from system)**: HELO hostname. | ||
- `FROM`: **\<empty\>**: Mail from address, RFC 5322. This can be just an email address, or the "Name" \<[email protected]\> format. | ||
- `ENVELOPE_FROM`: **\<empty\>**: Address set as the From address on the SMTP mail envelope. Set to `<>` to send an empty address. | ||
- `SUBJECT_PREFIX`: **\<empty\>**: Prefix to be placed before e-mail subject lines. | ||
- `MAILER_TYPE`: **smtp**: \[smtp, sendmail, dummy\] | ||
- **smtp** Use SMTP to send mail | ||
- **sendmail** Use the operating system's `sendmail` command instead of SMTP. | ||
This is common on Linux systems. | ||
- **dummy** Send email messages to the log as a testing phase. | ||
- Note that enabling sendmail will ignore all other `mailer` settings except `ENABLED`, | ||
`FROM`, `SUBJECT_PREFIX` and `SENDMAIL_PATH`. | ||
- Enabling dummy will ignore all settings except `ENABLED`, `SUBJECT_PREFIX` and `FROM`. | ||
- `SENDMAIL_PATH`: **sendmail**: The location of sendmail on the operating system (can be | ||
command or full path). | ||
- `SENDMAIL_ARGS`: **_empty_**: Specify any extra sendmail arguments. (NOTE: you should be aware that email addresses can look like options - if your `sendmail` command takes options you must set the option terminator `--`) | ||
- `SENDMAIL_PATH`: **sendmail**: The location of sendmail on the operating system (can be command or full path). | ||
- `SENDMAIL_ARGS`: **\<empty\>**: Specify any extra sendmail arguments. (NOTE: you should be aware that email addresses can look like options - if your `sendmail` command takes options you must set the option terminator `--`) | ||
- `SENDMAIL_TIMEOUT`: **5m**: default timeout for sending email through sendmail | ||
- `SENDMAIL_CONVERT_CRLF`: **true**: Most versions of sendmail prefer LF line endings rather than CRLF line endings. Set this to false if your version of sendmail requires CRLF line endings. | ||
- `SEND_BUFFER_LEN`: **100**: Buffer length of mailing queue. **DEPRECATED** use `LENGTH` in `[queue.mailer]` | ||
- `SEND_AS_PLAIN_TEXT`: **false**: Send mails only in plain text, without HTML alternative. | ||
|
||
## Cache (`cache`) | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -301,7 +301,7 @@ volumes: | |
sudo -u git ssh-keygen -t rsa -b 4096 -C "Gitea Host Key" | ||
``` | ||
|
||
在下一步中,需要在主机上创建一个名为 `/user/local/bin/gitea` 的文件(具有可执行权限)。该文件将发出从主机到容器的 SSH 转发。将以下内容添加到 `/user/local/bin/gitea`: | ||
在下一步中,需要在主机上创建一个名为 `/usr/local/bin/gitea` 的文件(具有可执行权限)。该文件将发出从主机到容器的 SSH 转发。将以下内容添加到 `/usr/local/bin/gitea`: | ||
|
||
```bash | ||
ssh -p 2222 -o StrictHostKeyChecking=no [email protected] "SSH_ORIGINAL_COMMAND=\"$SSH_ORIGINAL_COMMAND\" $0 $@" | ||
|
@@ -324,14 +324,14 @@ ports: | |
ssh-rsa <Gitea Host Key> | ||
|
||
# other keys from users | ||
command="/user/local/bin/gitea --config=/data/gitea/conf/app.ini serv key-1",no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty <user pubkey> | ||
command="/usr/local/bin/gitea --config=/data/gitea/conf/app.ini serv key-1",no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty <user pubkey> | ||
``` | ||
|
||
这是详细的说明,当发出 SSH 请求时会发生什么: | ||
|
||
1. 使用 `git` 用户向主机发出 SSH 请求,例如 `git clone git@domain:user/repo.git`。 | ||
2. 在 `/home/git/.ssh/authorized_keys` 中,该命令执行 `/user/local/bin/gitea` 脚本。 | ||
3. `/user/local/bin/gitea` 将 SSH 请求转发到端口 2222,该端口已映射到容器的 SSH 端口(22)。 | ||
2. 在 `/home/git/.ssh/authorized_keys` 中,该命令执行 `/usr/local/bin/gitea` 脚本。 | ||
3. `/usr/local/bin/gitea` 将 SSH 请求转发到端口 2222,该端口已映射到容器的 SSH 端口(22)。 | ||
4. 由于 `/home/git/.ssh/authorized_keys` 中存在 `git` 用户的公钥,因此身份验证主机 → 容器成功,并且 SSH 请求转发到在 docker 容器中运行的 Gitea。 | ||
|
||
如果在 Gitea Web 界面中添加了新的 SSH 密钥,它将以与现有密钥相同的方式附加到 `.ssh/authorized_keys` 中。 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,92 @@ | ||
--- | ||
date: "2022-08-01T00:00:00+00:00" | ||
title: "使用: 设置 Fail2ban" | ||
slug: "fail2ban-setup" | ||
weight: 16 | ||
toc: false | ||
draft: false | ||
menu: | ||
sidebar: | ||
parent: "usage" | ||
name: "设置 Fail2ban" | ||
weight: 16 | ||
identifier: "fail2ban-setup" | ||
--- | ||
|
||
# 使用 Fail2ban 阻止攻击者的暴力登录 | ||
|
||
**Fail2ban 检查客户端登录日志,将多次登录失败的客户端识别为攻击者并在一段时间内阻止其访问服务。如果你的实例是公开的,这一点尤其重要。请管理员仔细设置 fail2ban,错误的配置将导致防火墙阻止你访问自己的服务器。** | ||
|
||
Gitea 会在日志文件 `log/gitea.log` 中记录登录失败的 CLI、SSH 或 HTTP 客户端 IP 地址,而你需要将 Gitea 的日志输出模式从默认的 `console` 更改为 `file`。这表示将日志输出到文件,使得 fail2ban 可以定期扫描日志内容。 | ||
|
||
当用户的身份验证失败时,日志中会记录此类信息: | ||
|
||
```log | ||
2018/04/26 18:15:54 [I] Failed authentication attempt for user from xxx.xxx.xxx.xxx | ||
``` | ||
|
||
```log | ||
2020/10/15 16:08:44 [E] invalid credentials from xxx.xxx.xxx.xxx | ||
``` | ||
|
||
## 设置 Fail2ban | ||
|
||
添加日志过滤器规则到配置文件 `/etc/fail2ban/filter.d/gitea.conf`: | ||
|
||
```ini | ||
[Definition] | ||
failregex = .*(Failed authentication attempt|invalid credentials|Attempted access of unknown user).* from <HOST> | ||
ignoreregex = | ||
``` | ||
|
||
添加监狱规则到配置文件 `/etc/fail2ban/jail.d/gitea.conf`: | ||
|
||
```ini | ||
[gitea] | ||
enabled = true | ||
filter = gitea | ||
logpath = /var/lib/gitea/log/gitea.log | ||
maxretry = 10 | ||
findtime = 3600 | ||
bantime = 900 | ||
action = iptables-allports | ||
``` | ||
|
||
如果你的 Gitea 实例运行在 Docker 容器中,并且直接将容器端口暴露到外部网络, | ||
你还需要添加 `chain="FORWARD"` 到监狱规则配置文件 `/etc/fail2ban/jail.d/gitea-docker.conf` | ||
以适应 Docker 的网络转发规则。但如果你在容器的宿主机上使用 Nginx 反向代理连接到 Gitea 则无需这样配置。 | ||
|
||
```ini | ||
[gitea-docker] | ||
enabled = true | ||
filter = gitea | ||
logpath = /var/lib/gitea/log/gitea.log | ||
maxretry = 10 | ||
findtime = 3600 | ||
bantime = 900 | ||
action = iptables-allports[chain="FORWARD"] | ||
``` | ||
|
||
最后,运行 `systemctl restart fail2ban` 即可应用更改。现在,你可以使用 `systemctl status fail2ban` 检查 fail2ban 运行状态。 | ||
|
||
上述规则规定客户端在 1 小时内,如果登录失败的次数达到 10 次,则通过 iptables 锁定该客户端 IP 地址 15 分钟。 | ||
|
||
## 设置反向代理 | ||
|
||
如果你使用 Nginx 反向代理到 Gitea 实例,你还需要设置 Nginx 的 HTTP 头部值 `X-Real-IP` 将真实的客户端 IP 地址传递给 Gitea。否则 Gitea 程序会将客户端地址错误解析为反向代理服务器的地址,例如回环地址 `127.0.0.1`。 | ||
|
||
``` | ||
proxy_set_header X-Real-IP $remote_addr; | ||
``` | ||
|
||
额外注意,在 Gitea 的配置文件 `app.ini` 中存在下列默认值: | ||
|
||
``` | ||
REVERSE_PROXY_LIMIT = 1 | ||
REVERSE_PROXY_TRUSTED_PROXIES = 127.0.0.0/8,::1/128 | ||
``` | ||
|
||
`REVERSE_PROXY_LIMIT` 限制反向代理服务器的层数,设置为 `0` 表示不使用这些标头。 | ||
`REVERSE_PROXY_TRUSTED_PROXIES` 表示受信任的反向代理服务器网络地址, | ||
经过该网络地址转发来的流量会经过解析 `X-Real-IP` 头部得到真实客户端地址。 | ||
(参考 [configuration cheat sheet](https://docs.gitea.io/en-us/config-cheat-sheet/#security-security)) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.