-
I have setup my nextcloud AIO behind a reverse proxy that terminates TLS and forwards to the nextcloud AIO apache (port 11000). The reverse proxy adapts the headers as following:
From time to time I have some people bruteforcing on the server. In the apache log container I can see then things like:
The IP 213.109.202.** is the attacker, the IP 192.168.178.1 is my reverse proxy. It seems like nextcloud adds also the reverse proxy to the blocking list. If I access my Nextcloud at the same time, I see the rate limiting on the login page (it says that it has detected many login attempts from my IP). Nextcloud AIO should make sure that it does not block the proxy but the originating IP. Or am I doing something wrong with the proxy? Peter |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 2 replies
-
please show your reverse proxy conf |
Beta Was this translation helpful? Give feedback.
-
Here is my config for relayd:
|
Beta Was this translation helpful? Give feedback.
-
Hi, can you check if this makes it work?
(I removed the append). |
Beta Was this translation helpful? Give feedback.
Hi, can you check if this makes it work?
(I removed the append).