Re: saslauth logging

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Wed, 26 Apr 2017, Jobst Schmalenbach wrote:

On Tue, Apr 25, 2017 at 07:14:56PM -0700, Gordon Messmer (gordon.messmer@xxxxxxxxx) wrote:
On 04/25/2017 07:00 PM, Jobst Schmalenbach wrote:
What I want is the IP address and if possible the incorrect password (just
to see how far they are off).  Is this possible?

I hope not.  That's a terrible idea.  Every time a user fat-fingers their
password, your plain-text logs have a copy of their almost-correct
password.


As always there are tradeoffs ...
I have a reasonable strict password policy, so by looking at the failed
passwords I can see how far the tries are off the real thing, so it actually
is a good thing for me. Also I learn which passwords are used for cracking,
which again is a good thing. As for the logged passwords - this is a non
user server, only two people have access ... so reading the logs is
difficult for imap/sendmail users in the company ...

Sorry, listen to Gordon; this is a terrible idea.

You accept a certain amount of password leakage into log files as hard to
avoid (a user puts their password into a username field without noticing), but
deliberately logging typoed passwords, or indeed valid passwords but for the
wrong account into a log file, so you can keep an eye on what's being used is
a step beyond simple bad practice.

If you have a strict password policy, then you should have mechanisms in place
to enforce it, but not human ones.

jh
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos



[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux