native Bruteforce prevention in V3 #2865
Replies: 5 comments 11 replies
-
|
We also use fail2ban on host-based log files with Postal V2. Migrating to V3 currently means running with no protection from bad actors which target SMTP servers mercilessly. |
Beta Was this translation helpful? Give feedback.
-
|
if anyone like me stumbles upon this thread and wants to implement fail2ban for smtp. this is a working implementation: let docker write to syslogadd this file: install fail2banconfigure fail2banadd this file: and this file check and restartcheck the regex: start fail2ban: check the status: |
Beta Was this translation helpful? Give feedback.
-
|
i am also redirecting the logs of postal-web to syslog via this entry in the but the logs unfortunately don't show any failed authentication attempts to the web interface. Any ideas on that anyone? |
Beta Was this translation helpful? Give feedback.
-
|
I don't know if it's still relevant for you but I've created a PR that does just that (except all the fail2ban jazz): #3221 |
Beta Was this translation helpful? Give feedback.
-
|
We might be contributing some documentation and configuration to get https://www.crowdsec.net/ to ingest the postal logs in a similar fashion that has been done here with failban. Crowdsec has a similar approach to fail2ban with an added community block list and other nice features. (fail2ban is awesome, if it fits your needs, stick with that solution). |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
with V2 we could implement fail2ban via the log files to mitigate bruteforce attacks on SMTP
the logfiles were removed with logging refactor as per: #2864
we would like to see a native way for Postal to handle bruteforce attacks, both on the SMTP server and potentially also the web server
Beta Was this translation helpful? Give feedback.
All reactions