Fail2Ban Setup
tsanga13 edited on Aug 4, 2025.
Setting up Fail2ban will prevent attackers to brute force your vault logins. This is particularly important if your instance is publicly available.
Table of Contents
- Pre-requisite
- Installation
- Setup for web vault
- Setup for admin page
- Setup for TOTP codes
- Testing Fail2Ban
- SELinux Problems
Pre-requisite
- Filenames are at the top of each code block.
- From Release 1.5.0, Vaultwarden supports logging to file. Please set this up : Logging
- Try to log to web vault with a false account and check the log files for following format
Installation
Debian / Ubuntu / Raspberry Pi OS
Fedora / Centos
EPEL repository is necessary (CentOS 7)
Synology DSM
With Synology, a bit more work is needed for various reasons. The full solution is pushed with Docker Compose there. The main issues are:
- The embedded IP ban system does not work for Docker's containers
- The iptables embedded do no support the
REJECTblocktype - The Docker GUI does not allow some advanced settings
- Modifying system configuration is not upgrade-proof
Therefore, we will use Fail2ban in a Docker container. Crazy-max/docker-fail2ban provides a good solution and the Synology's Docker GUI will be ignored. From command line through SSH, here the steps. As a convention volumeX is to be adapted to your Synology's config.
- Get root
- Creating persistent folders
- Replace
REJECTbyDROPblocktype
- Create
docker-composefile
- Start the container using command line
You should see the container running in Synology's Docker GUI. You will have to reload after configuring the filters and jails
Setup for web vault
As a convention, path_f2b means the path needed for Fail2ban to work. This depends on your system. E.g. on Synology, we are talking about /volumeX/docker/fail2ban/ where on some other systems we are talking about /etc/fail2ban/
Filter
Create and fill the following file
Tip: If you get the following error message in fail2ban.log (CentOS 7, Fail2Ban v0.9.7)
fail2ban.filter [5291]: ERROR No 'host' group in '^.*Username or password is incorrect\. Try again\. IP: <ADDR>\. Username:.*$'
Please Use <HOST> instead of <ADDR> in vaultwarden.local
Tip: Cloudflare users, make sure you set your Client IP header to CF-Connecting-IP in admin panel -> advanced settings -> Client IP header, else the clients real IP will not be logged/banned. Not necessary if you're using a proxy that's set up to configure which headers to use to determine the client's IP address; otherwise logging the Docker network address when CF-Connecting-IP doesn't exist.
Tip: If you see 127.0.0.1 as the IP address of failed logins in vaultwarden.log, then you're probably using a reverse proxy and fail2ban won't work correctly:
To remedy this, forward the true remote address to vaultwarden via the X-Real-IP header. How to do this varies depending on the proxy you use. For example, in Caddy 2.x, when you define the reverse-proxy, define header_up X-Real-IP {remote_host}. See Proxy examples for more info.
Jail
Create and fill the following file
Note for Docker Users
Docker uses the FORWARD chain instead of the default INPUT chain. If the machine receiving requests is mapping them straight to a Docker container, then chain will need to be set appropriately regardless of what is in the container (reverse proxy, Vaultwarden, etc). The default action is set to action_ (which uses banaction, which we alias to banaction_allports). action_ already takes the chain into account. Thus, simply set the chain. See this similar issue.
Note for Synology DSM Docker Users
Please set the chain to DOCKER-USER
Note for Docker Users with Fail2Ban v1.1.1.dev1 (and possibly newer)
With Fail2Ban v1.1.1.dev1 the default banactions for Debian changed from iptables to nftables (see here). Docker (at least version 25.0.3) on the other hand still uses iptables. Hence, the requests to the Docker containers are not blocked with banaction = %(banaction_allports)s. In this scenario, use
Tip: If you are using systemd to manage vaultwarden, you can use systemd-journal for fail2ban:
Use these instead of logpath = and filter = variables.
NOTE FOR BACKEND
If you installed fail2ban using such as sudo apt install, the /etc/fail2ban/jail.conf may using systemd as default backend. This default configuration item will result in the inability to monitor the log of logpath.
Add backend = pyinotify or backend = inotify to the vaultwarden.local config
Restart fail2ban for changes to take effect:
NOTE FOR CLOUDFLARE USERS If you use cloudflare proxy, you'll need to add Cloudflare in your actions list, like in this guide
Reload fail2ban for changes to take effect:
Feel free to change the options as you see fit.
Setup for admin page
If you've enabled the admin console by setting the ADMIN_TOKEN environment variable, you can prevent an attacker from brute-forcing the admin token using Fail2Ban. The process is the same as for the web vault.
Filter
Create and fill the following file
Tip: If you get the following error message in fail2ban.log
ERROR NOK: ("No 'host' group in '^.*Invalid admin token\\. IP: <ADDR>.*$'")
Please Use <HOST> instead of <ADDR> in vaultwarden-admin.local
Jail
Create and fill the following file
Note: Docker uses the FORWARD chain instead of the default INPUT chain. Therefore replace the banaction line with the following action when using Docker:
Tip: If you are using systemd to manage vaultwarden, you can use systemd-journal for fail2ban here as well:
Use these instead of logpath = and filter = variables.
NOTE FOR BACKEND
If you installed fail2ban using such as sudo apt install, the /etc/fai2ban/jail.conf may using systemd as default backend. This default configuration item will result in the inability to monitor the log of logpath.
Add backend = pyinotify or backend = inotify to the vaultwarden.local config
Restart fail2ban for changes to take effect:
NOTE FOR CLOUDFLARE USERS If you use cloudflare proxy, you'll need to add Cloudflare in your actions list, like in this guide
Reload fail2ban for changes to take effect:
Setup for TOTP
As a convention, path_f2b means the path needed for Fail2ban to work. This depends on your system. E.g. on Synology, we are talking about /volumeX/docker/fail2ban/ where on some other systems we are talking about /etc/fail2ban/
Filter
Create and fill the following file
Example log:
Jail
Create and fill the following file
Restart fail2ban for changes to take effect:
Feel free to change the options as you see fit.
Testing Fail2Ban
Now just try to login to vaultwarden using any email (it doesn't have to be a valid email, just an email format) If it works correctly and your IP is banned, you can unban the IP by running:
If Fail2Ban does not appear to be functioning, verify that the path to the Vaultwarden log file is correct. For Docker: If the specified log file is not being generated and/or updated, make sure the EXTENDED_LOGGING env variable is set to true (which is default) and that the path to the log file is the path inside the Docker (when you use /bw-data/:/data/ the log file should be in /data/... to be outside the container).
Also verify that the timezone of the Docker container matches the timezone of the host. Check this by comparing the time shown in the logfile with the host OS time. If they differ, there are various ways to fix this. One option is to start Docker with the option -e "TZ=<timezone>". A list of valid timezones is here (eg. -e "TZ=Australia/Melbourne")
If you are using podman instead of Docker it seems that setting the timezone via -e "TZ=<timezone>" does not work. This can be solved (when using the alpine image) by following this guide: https://wiki.alpinelinux.org/wiki/Setting_the_timezone.
SELinux Problems
When you are using SELinux it is possible that SELinux hinders fail2ban to read the logs. If so, follow these steps:
sudo tail /var/log/audit/audit.log. There you should see something along the lines of this (of course the actual audit ID will vary in your case):
To actually find out the reason you can use grep 'type=AVC msg=audit(1571777936.719:2193)' /var/log/audit/audit.log | audit2why. audit2allow -a will give you specific instructions on how to create a module and allow fail2ban to access these logs. Follow these steps and you're done! fail2ban should now work correctly.