Posts by fulltilt

    By the way ... same attacks are also carried out for postfix sasl with changing IP addresses, so I have set in F2B postfix_sasl to:

    maxretry = 1

    Currently, massive attacks on western servers are being carried out everywhere, checks for blacklisted IPs (DNSBL lists) are intermittently no longer possible ... today multirbl.valli.org was repeatedly not accessible anymore

    https://multirbl.valli.org/lookup/

    that's what I mean

    Code
    1. 181.53.12.11 - - [30/Jan/2022:12:56:25 +0100] "POST /wp-login.php HTTP/1.1" 200 2950 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36"
    2. 102.140.230.72 - - [30/Jan/2022:12:56:30 +0100] "POST /wp-login.php HTTP/1.1" 200 2950 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36"
    3. 27.34.25.97 - - [30/Jan/2022:12:56:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2950 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36"
    4. 156.198.135.15 - - [30/Jan/2022:12:57:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2968 "-" "Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0"
    5. 46.56.206.143 - - [30/Jan/2022:13:07:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2969 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15"
    6. 49.149.67.65 - - [30/Jan/2022:13:08:24 +0100] "POST /wp-login.php HTTP/1.1" 200 2951 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0"

    the IP address does not appear twice on the same day ...

    and in the background all possible passwords can be tested, day after day

    Not a perfect solution, but if all the IPs are from countries you don't work with (or your customers), block the whole country 😅

    Thanks, I'm already using such country ipsets, this case is difficult because each request comes from a different IP address & country.

    I'm trying to improve my jail.local to block repeat offenders w/ increased ban times:

    http://blog.shanock.com/fail2b…mes-for-repeat-offenders/


    However, filtering and blocking a huge botnet is almost impossible ...

    The attacks have become more and more sophisticated lately, I took a closer look at the logs today and found that most attacks are now being carried out via botnets. The IP addresses are therefore changing every minute and a blocking via Fail2ban is becoming difficult without locking out regular customers.

    So Fail2ban is bypassed by botnets and another solution is needed ...

    does anyone have an idea?


    check out:

    tail -n 50000 /var/log/fail2ban.log | grep wordpress

    tail -n 50000 /var/log/fail2ban.log | grep postfix

    tail -n 50000 /var/log/fail2ban.log | grep postfix

    tail -n 50000 /var/log/fail2ban.log | grep dovecot

    tail -n 50000 /var/log/fail2ban.log | grep postfix-sasl

    etc.

    OK, panel, postfix, dovecot, proftpd and apache2 are reachable over IPv6 and Gmail also accepts IPv6 connections w/ valid ipv6 SPF include.

    I use external PDNS name servers, these are not yet set or registered to ipv6.


    Must the name servers resolve to ipv6 addresses or should mail ipv6 be deactivated if n1.mydomain.tld and ns2.mydomain.tld only resolve to ipv4 currently?

    All of my DNS zone records all have valid AAAA entrys, except ns1 and ns2 itself.

    Update: Saw that you added it automatically - remove it and add the address manually. Also change/adjust your network settings based on my example and all should be fine


    Seems to work now, I had to reboot because of the pervious auto setting a different IP was created ...


    This is a Hetzner cloud, so I can configure the network statically but only with ipv4, after that the ipv6 resolution no longer works. But the IP addresses are still fixed, I think it works with the Hetzner standard network cloud configuration - everything is OK in the I-mscp panel now ... or what do you think about it?


    The resolution still works, should the IPv6 also be into /etc/hosts?

    You do not have to - it is only for "monitoring" the services over the I-MSCP backend - some kind of status page within I-MSCP.


    But I suggest to add the address under:

    * Settings -> Address Management

    Thank you!

    the problem is, I can not select eth0:0 and with eth0 it shows some info icons to change afterwards.

    auto eth0:0
    iface eth0:0 inet6 static