-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FR: sendmail8.16-auth support #2757
Comments
|
append for jail.conf: sendmail8.16-auth.conf: |
|
Provide a log example, please... |
|
a log example: |
|
I saw #2751 and updated sendmail8.16-auth.conf according this |
…message introduced in sendmail 8.16.1, AUTH_FAIL_LOG_USER (gh-2757)
|
Probably shouldn't have combined these tests into one. The message "possible SMTP attack" is a prepared result of internal Sendmail's diagnostic. The "maxretry" in this case can have the value 1. The "authentication failure" message is generated for each failed attempt and the "maxretry" value should be more 1. |
|
The There was some RFE for weighting of several regex (cannot find its number), so if it gets implemented one could set highest weight by "possible SMTP attack" regex to cause immediate ban. |
|
Sorry, I was inaccurate: another string in log possible: So "authentication failure" may be replaced by "user not found" sometimes. |
I mean, Sendmail already keeps a record of attempts for the case "possible SMTP attack": In this way host can be blocked immediately (i.e. |
There is still no such possibility to emphasize single regex to cause an immediate ban (but I have some experimental branch doing that, must take a closer look whether it could be backported). |
Yes, I understand this argument. But it seems to me that the file system's cache reduces the problem.
As an temporary alternative I suggest to make three rules: one common and two separate. |
And next update... I saw the third variant and now looked to the sendmail's code I seems the regular expression should look like this |
|
Now I saw 4 log's variants: |
…" messages, sendmail 8.16.1 (gh-2757)
|
Ultimately fixed in 8afea37. Thx!
This looks a bit too weak (vulnerable) to me, at least due to the catch-all... We shall stay with more precise regex for now. |
|
I'm seeing a lot of log lines that lack the user= part, so the fail2ban regex fails to catch them. Here's an example: This is on CentOS 7.9 running sendmail 8.14.7 and fail2ban 0.11.2. I'm able to fix it by adding an optional grouping around the user= part of the regex in my sendmail-auth.local. |
Environment:
The issue:
Sendmail 8.16 can be build with _FFR_AUTH_FAIL_LOG_USER.
This event is interesting to track via fail2ban.
UPD: Sendmail 8.16.1 released with AUTH_FAIL_LOG_USER by default.
The text was updated successfully, but these errors were encountered: