native Bruteforce prevention in V3 #2865
Replies: 3 comments 8 replies
-
We also use fail2ban on host-based log files with Postal V2. Migrating to V3 currently means running with no protection from bad actors which target SMTP servers mercilessly. |
Beta Was this translation helpful? Give feedback.
-
if anyone like me stumbles upon this thread and wants to implement fail2ban for smtp. this is a working implementation: let docker write to syslogadd this file:
install fail2ban
configure fail2banadd this file:
and this file
check and restartcheck the regex: start fail2ban:
check the status:
|
Beta Was this translation helpful? Give feedback.
-
i am also redirecting the logs of postal-web to syslog via this entry in the
but the logs unfortunately don't show any failed authentication attempts to the web interface. Any ideas on that anyone? |
Beta Was this translation helpful? Give feedback.
-
with V2 we could implement fail2ban via the log files to mitigate bruteforce attacks on SMTP
the logfiles were removed with logging refactor as per: #2864
we would like to see a native way for Postal to handle bruteforce attacks, both on the SMTP server and potentially also the web server
Beta Was this translation helpful? Give feedback.
All reactions