native Bruteforce prevention in V3 #2865
Replies: 5 comments 11 replies
-
We also use fail2ban on host-based log files with Postal V2. Migrating to V3 currently means running with no protection from bad actors which target SMTP servers mercilessly. |
Beta Was this translation helpful? Give feedback.
-
if anyone like me stumbles upon this thread and wants to implement fail2ban for smtp. this is a working implementation: let docker write to syslogadd this file:
install fail2ban
configure fail2banadd this file:
and this file
check and restartcheck the regex: start fail2ban:
check the status:
|
Beta Was this translation helpful? Give feedback.
-
i am also redirecting the logs of postal-web to syslog via this entry in the
but the logs unfortunately don't show any failed authentication attempts to the web interface. Any ideas on that anyone? |
Beta Was this translation helpful? Give feedback.
-
I don't know if it's still relevant for you but I've created a PR that does just that (except all the fail2ban jazz): #3221 |
Beta Was this translation helpful? Give feedback.
-
We might be contributing some documentation and configuration to get https://www.crowdsec.net/ to ingest the postal logs in a similar fashion that has been done here with failban. Crowdsec has a similar approach to fail2ban with an added community block list and other nice features. (fail2ban is awesome, if it fits your needs, stick with that solution). |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
with V2 we could implement fail2ban via the log files to mitigate bruteforce attacks on SMTP
the logfiles were removed with logging refactor as per: #2864
we would like to see a native way for Postal to handle bruteforce attacks, both on the SMTP server and potentially also the web server
Beta Was this translation helpful? Give feedback.
All reactions