---------- Forwarded message ---------- From: George C. Aquino <aquinogeor...@gmail.com> Date: Thu, Apr 26, 2018 at 9:43 AM Subject: Re: [SOGo] webmail login attacks - captcha? To: users@sogo.nu
Dear Sir, Good morning and glad to being connected within here and can you help me to log in correctly coz I could not do so far. Thnx, Gery. On Wed, Apr 25, 2018 at 1:00 PM, Christoph Kreutzer <users@sogo.nu> wrote: > Hi, > > If the IPs are all 127.0.0.1 in SOGos log, then you did not correctly > configure Apache to forward the IPs like proxies do. I think that is > mentioned in the manual. > > Christoph > > Am 24.04.2018 um 21:48 schrieb Sergio Cesar winc (ser...@winc.net) < > users@sogo.nu>: > > I wonder if one could user the webserver authentication and pass it to > SOGo or roundcube. Than fail2ban will catch the ip from the http log. > > SC > > > From: Sebastián Meyer > Sent: Tuesday, April 24, 9:51 AM > Subject: [SOGo] webmail login attacks - captcha? > To: users@sogo.nu > > > Hi, > > I have a couple of compromissed webmail accounts, passwords wheren't easy > to guess. > > I'd like to add an increasing delay for failed logins and a captcha, is it > possible? > > For IMAP and SMTP access I use fail2ban, but using it for for webmail > access DoS attacks would be unacceptable frequently, all logins are from > localhost (127.0.0.1) > > TIA, > > -- > Seb > -- > users@sogo.nu > https://inverse.ca/sogo/lists > > > -- > users@sogo.nu > https://inverse.ca/sogo/lists > > -- > users@sogo.nu > https://inverse.ca/sogo/lists > -- users@sogo.nu https://inverse.ca/sogo/lists