Re: not even sure it's the right list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 09/26/16 03:42 +0300, Alexandru N. Barloiu via Cyrus-sasl wrote:
i've been interested lately to log a little bit more about the entries
that concern wrong passwords. both in cyrus and in postfix. 

We use fail2ban to block brute force attempts.
so i hacked a bit lib/server.c and plugins/plain.c to log password as
well. but it's still an ugly hack. 

i was wondering if anyone else thought about this. i have millions of
queries daily, and some are right on the money. like the right user,
the right domain. and after a few weeks of trying this i figured out,
sometimes they even have an old password. 

all sorts of weird IPs. like from china, north korea, ukraine, russia
and so on. i know it's a bad idea to log passwords, but in this case,
it's a good thing to know which passwords are compromised. 

How do you use logging passwords as a way to correlate a compromised
account? Isn't is sufficient just to know where where the connections are
coming, or finding spam through some analysis?

--
Dan White



[Index of Archives]     [Info Cyrus]     [Squirrel Mail]     [Linux Media]     [Yosemite News]     [gtk]     [KDE]     [Gimp on Windows]     [Steve's Art]

  Powered by Linux