under some kind of attack

mj lists at merit.unu.edu
Thu Jul 20 12:16:55 EEST 2017


Hi all,

If I may, one more question on this subject:

I would like to  create a fail2ban filer, that scans for these lines:

> Jul 20 11:10:09 auth: Info: ldap(user1,60.166.35.162,<cDFXHbxUQgA8piOi>): invalid credentials (given password: password)
> Jul 20 11:10:19 auth: Info: ldap(user2,61.53.66.4,<V+nyHbxU+wA9NUIE>): invalid credentials (given password: password)

(as you can see, I have enabled auth_verbose_passwords to do this, 
making me very uncomfortable...)

Anyway: since there are only a few password variations, I would like to 
block anyone using those passwords.

(since the connections are over TLS/SSL, I cannot use iptables, as 
suggested earlier)

So I need a specific fail2ban rule that extracts the <IP> from that 
line, and matches on "(given password: password)"

Can anyone here help out with a failregex line that would match..?


More information about the dovecot mailing list