Hi all
I'm just looking to tidy up/tighten my fail2ban logging with my traefik access.log, and I've noticed some entries that are not showing HTTP response codes or a matched router....
89.248.171.97 - - [01/Dec/2020:19:27:10 +0000] "GET / HTTP/1.1" - - "-" "-" 274990 "-" "-" 27ms
2.57.122.186 - - [02/Dec/2020:09:52:30 +0000] "GET /config/getuser?index=0 HTTP/1.1" - - "-" "-" 307452 "-" "-" 0ms
104.131.162.95 - - [02/Dec/2020:10:38:25 +0000] "GET / HTTP/1.0" - - "-" "-" 938 "-" "-" 0ms
181.215.223.57 - - [02/Dec/2020:15:51:32 +0000] "GET / HTTP/2.0" 403 9 "-" "-" 19952 "nohost@file" "-" 31ms
171.25.193.77 - - [03/Dec/2020:07:33:41 +0000] "GET / HTTP/1.1" - - "-" "-" 57563 "-" "-" 37ms
60.251.123.1 - - [03/Dec/2020:08:52:22 +0000] "GET /manager/html HTTP/1.1" - - "-" "-" 61536 "-" "-" 0ms
165.22.35.84 - - [03/Dec/2020:10:43:05 +0000] "GET / HTTP/1.0" 403 9 "-" "-" 65471 "nohost@file" "-" 0ms
As you can see above, lines 4 & 7 responded with a 403 and the "nohost@file" router - presumably as they hit my DNS name directly (which has a match), but the other lines didn't seem to get a response OR router?
My traefik.toml contains the following:
[entryPoints.web]
address = ":80"
[entryPoints.web.http.redirections.entryPoint]
to = "websecure"
scheme = "https"
[entryPoints.websecure]
address = ":443"
[entryPoints.websecure.forwardedHeaders]
insecure=true
[accessLog]
filePath = "/var/log/traefik/access.log"
[accessLog.filters]
statusCodes = [ "302","400-499" ]
I've then got the following included in my dynamic config which is intended to catch "stuff" with no hostname etc
[http.routers]
[http.routers.nohost]
rule = "HostHeader(`myhost.mydomain.com`)"
entrypoints = [ "websecure" ]
service = "nohost"
middlewares = [ "blockexternal" ]
[http.routers.nohost.tls]
certResolver = "myresolver"
# Define the domain to use, as it's one higher than the others
[[http.routers.nohost.tls.domains]]
main = "myhost.mydomain.com"
sans = [ "myhost.mydomain.com" ]
[http.routers.catcher]
rule = "PathPrefix(`/`)"
entrypoints = [ "websecure" ]
priority = 1
middlewares = [ "bouncer" ]
service = "nohost"
[http.routers.catcher.tls]
certResolver = "myresolver"
[[http.routers.catcher.tls.domains]]
main = "myhost.mydomain.com"
[http.middlewares]
[http.middlewares.internal-only-ip]
[http.middlewares.internal-only-ip.ipWhitelist]
sourceRange = [ "192.168.1.0/24","172.17.0.0/16" ]
[http.middlewares.blockexternal]
[http.middlewares.blockexternal.chain]
# I have this as a chain so I can add/remove other items easily
middlewares = [ "internal-only-ip" ]
[http.middlewares.bouncer]
[http.middlewares.bouncer.redirectRegex]
regex=".*"
replacement="https://www.somehost.com"
Is the problem that if someone points to the IP, or fudges a host to IP their end, that the SAN doesn't match, so no rule fires?