Hi,
as i’ve stated in the title, i tried to test the threat shield banning feature, with the following patterns: “Exit before auth from” and “authentication failed for user” which are the default ones.
The latter should monitor/ban any ip when it does more than 3 attempts to access the webui.
I’ve tested this by trying to login into the webui with random (non correct) credentials.
While i can see the failed auth attempts in the logs, threat shield seems to fail in banning the IP, as i can still see the webui/try to login after 3 attempts.
As a side note, would including “AUTH_FAILED” be a good enough pattern to block attempts on OpenVPN RW connections? Would it cause false positives?
I also noticed the lack of a webui regarding banned ip and a toggle to unban them; I’m aware that i can do that via CLI, but i’m asking about a GUI. Will that ever be available?
I confirm, I also noticed the problem, in the logs the banned IP is correctly indicated but you can continue to make attempts in the UI.
However, I noticed that after a while, the UI is correctly blocked.
So I imagine that after a while banip is restarted and works.
Let’s see what the nethesis guys say
@giacomo this seems like a bug. Do you think you could open an issue for it?
I’ve closed the issue regarding the conntrack not banning the IPs that are invalid. After investigation the issue wasn’t related to banip not banning, however it resides on conntrack keeping the connection active, so that something like this happens after a while:
This seems nothing we can do about at the moment, and considering how conntrack handles connections and all the different combination of cases to support, the issue has been closed
It works, see 2 posts up. I tested a non existent account and a disabled account and pulled errors from the log. AUTH_FAILED is triggered from a disabled account, the other two from a non existent.