diff --git a/setup/start/cloudron-firewall.sh b/setup/start/cloudron-firewall.sh index 28de55f87..3da9608d7 100755 --- a/setup/start/cloudron-firewall.sh +++ b/setup/start/cloudron-firewall.sh @@ -77,8 +77,6 @@ if [[ -f "${ldap_allowlist_json}" ]]; then done < "${ldap_allowlist_json}" # ldap server we expose 3004 and also redirect from standard ldaps port 636 - $iptables -t filter -C INPUT -j CLOUDRON_RATELIMIT 2>/dev/null || $iptables -t filter -I INPUT 1 -j CLOUDRON_RATELIMIT - $iptables -t nat -I PREROUTING -p tcp --dport 636 -j REDIRECT --to-ports 3004 $iptables -t filter -A CLOUDRON -m set --match-set cloudron_ldap_allowlist src -p tcp --dport 3004 -j ACCEPT @@ -149,6 +147,7 @@ for port in 3306 5432 6379 27017; do $iptables -A CLOUDRON_RATELIMIT -p tcp --syn -s 172.18.0.0/16 -d 172.18.0.0/16 --dport ${port} -m connlimit --connlimit-above 5000 -j CLOUDRON_RATELIMIT_LOG done +# Add the rate limit chain to input chain $iptables -t filter -C INPUT -j CLOUDRON_RATELIMIT 2>/dev/null || $iptables -t filter -I INPUT 1 -j CLOUDRON_RATELIMIT $ip6tables -t filter -C INPUT -j CLOUDRON_RATELIMIT 2>/dev/null || $ip6tables -t filter -I INPUT 1 -j CLOUDRON_RATELIMIT