Skip to main content

Stop brute force email logins?

Comments

6 comments

  • ES - George
    The only way to make it impossible to bruteforce would be to limit the service to only trusted IPs. Bruteforcing is unfortunately "normal", and something that will always happen. You can't stop it, but you can stop the effects it (i.e. a successful intrusion) by maintaining good password policies, and whilst blocking an offending IP address is helpful, a good, strong password will keep you safe. I'd recommend reading over the cPHulk documentation if you haven't done so already: cPHulk Brute Force Protection - Version 78 Documentation - cPanel Documentation
    0
  • cPanelLauren
    Great answer @ES - George Thanks for that!
    0
  • aeroweb
    We are very familiar with brute force attacks and various distributed attacks, that was not my question. We have been using a combination of CSF and other features for years which has helped mitigate most attacks against IMAP, SMTP, SSH etc... What I am concerned about is that all the attacks showed the local IP address 127.0.0.1 rather than the offenders IP address (see previous attachment). Is there any way to get CpHulk to the attackers IP instead of 127.0.0.1? Or is there a log file I can view that shows who is accessing the webmail login page? Thanks
    0
  • cPanelLauren
    Hi @aeroweb Unfortunately, when the IP address is obfuscated like this (which is done on purpose) it's beyond cPhulk's capability to identify. cPhulk is registering the IP address that the system sees the attack from. You can see the IP being used in /var/log/maillog in most cases as a webmail login attempt would be noted there.
    0
  • keat63
    Would adding a rule in Host Access Control work. Although I'm not sure of the implications of blocking 127.0.0.1
    0
  • cPanelLauren
    That wouldn't work, you would deal with a ton of unintended side effects if you blocked localhost.
    0

Please sign in to leave a comment.