You are viewing a plain text version of this content. The canonical link for it is here.
Posted to user@guacamole.apache.org by khmadhu <kh...@gmail.com> on 2023/09/30 05:09:47 UTC

Captcha protection to stop brute force attacks

Hi,
I am looking for a feature that can prevent brute force attacks or stopping
bots, is there a possibility  that captcha /recaptcha can be integrated
with any module?.






-- 
Thanks & Regards
Madhusudan

AW: Captcha protection to stop brute force attacks

Posted by Joachim Lindenberg <gu...@lindenberg.one>.
Hi Molina,

 

can you please do us a favor and explain what cloudflare can do to protect against brute force attacks?

 

Hi Madhusudan,

 

afaik captchas are solved faster by AI than by humans.

 

afaik the standard approach to stop brute force attacks is to use something like fail2ban or similiar, blocking the source IP or network of any bots after some failed attempts. Go the extra mile and block not just locally but also at your outer perimeter firewall. Obviously there is the risk to block regular users in the same network. 

Another approach is to use the device cookie approach published by OWASP, but due to the complexity you probably want to do this only with single-sign-on-solutions.

 

Regards, 

Joachim

 

 

Von: Molina de la Iglesia, Manuel <ma...@veolia.com.INVALID> 
Gesendet: Sonntag, 1. Oktober 2023 11:58
An: user@guacamole.apache.org
Betreff: Re: Captcha protection to stop brute force attacks

 

You could use cloudflare.

 

El sáb, 30 sept 2023 7:10, khmadhu <khmadhu@gmail.com <ma...@gmail.com> > escribió:

Hi,

I am looking for a feature that can prevent brute force attacks or stopping bots, is there a possibility  that captcha /recaptcha can be integrated with any module?.

 

 

 

 




 

-- 

Thanks & Regards
Madhusudan

 


Re: Captcha protection to stop brute force attacks

Posted by "Molina de la Iglesia, Manuel" <ma...@veolia.com.INVALID>.
You could use cloudflare.

El sáb, 30 sept 2023 7:10, khmadhu <kh...@gmail.com> escribió:

> Hi,
> I am looking for a feature that can prevent brute force attacks or
> stopping bots, is there a possibility  that captcha /recaptcha can be
> integrated with any module?.
>
>
>
>
>
>
> --
> Thanks & Regards
> Madhusudan
>
>

Re: Captcha protection to stop brute force attacks

Posted by khmadhu <kh...@gmail.com>.
Hi Zhukov,

Thanks for the regex, this works as expected. :-)







On Sat, Sep 30, 2023 at 7:14 PM Евгений Н. Жуков <eu...@gmail.com>
wrote:

> This works for me
> [L_catalina]
> failregex = ^.*WARN  o\.a\.g\.r\.auth\.AuthenticationService -
> Authentication attempt from <HOST> for user "[^"]*" failed\.$
>
> datepattern = ^%%H:%%M:%%S.%%f
>
> сб, 30 сент. 2023 г. в 13:11, khmadhu <kh...@gmail.com>:
>
>>
>> Tried modifying filter's in /etc/fail2ban/filter.d/guacamole.conf but no
>> luck.
>>
>> #default regex
>> #failregex = ^.*\nWARNING: Authentication attempt from <HOST> for user
>> "[^"]*" failed\.$
>>
>> tried below.
>> failregex = \bAuthentication attempt from \[<HOST>(?:,.*)?\] for user
>> ".*" failed\.
>> #failregex = +\b[Aa]uthentication attempt from \[<HOST>(?:,[^\]]*)?\]
>> (?:for user (?:"[^"]*" )?)?failed\.\s*$
>>
>>
>>
>> On Sat, Sep 30, 2023 at 2:39 PM David Barber <md...@aol.com.invalid>
>> wrote:
>>
>>> I came across the same issue a few years ago, fwir the default regex for
>>> guacamole in fail2ban was at fault and amending that i got it to work but i
>>> don't rem any details other than that sorry.
>>>
>>> --
>>> Regards
>>> David Barber
>>>
>>>
>>>
>>> khmadhu wrote:
>>>
>>> Hi,
>>> In catalina.out file the failed attempts its logging.
>>>
>>> [2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] INFO
>>>  o.a.g.a.l.AuthenticationProviderService - User "gkhjk" did not
>>> successfully authenticate against any LDAP server.
>>> [2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] WARN
>>>  o.a.g.r.auth.AuthenticationService - Authentication attempt from  *IP*
>>> for user "gkhjk" failed.
>>>
>>> In the fail2ban log file its not.
>>>
>>> 023-09-30 08:18:16,015 fail2ban.filter         [212019]: INFO    Added
>>> logfile: '/var/log/tomcat9/catalina.out' (pos = 78668031, hash = 87a1ded384)
>>> 2023-09-30 08:18:16,016 fail2ban.jail           [212019]: INFO    Jail
>>> 'sshd' started
>>> 2023-09-30 08:18:16,017 fail2ban.jail           [212019]: INFO    Jail
>>> 'guacamole' started
>>>
>>>
>>>
>>>
>>> On Sat, Sep 30, 2023 at 1:51 PM Robert Dinse <na...@eskimo.com.invalid>
>>> <na...@eskimo.com.invalid> wrote:
>>>
>>>>
>>>>      Did you look in the logs to see if its picking up the attempts?
>>>>
>>>>
>>>> -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
>>>>   Eskimo North Linux Friendly Internet Access, Shell Accounts, and
>>>> Hosting.
>>>>     Knowledgeable human assistance, not telephone trees or script
>>>> readers.
>>>>   See our web site: http://www.eskimo.com/ (206) 812-0051 or (800)
>>>> 246-6874.
>>>>
>>>> On Sat, 30 Sep 2023, khmadhu wrote:
>>>>
>>>> > Date: Sat, 30 Sep 2023 13:49:04 +0530
>>>> > From: khmadhu <kh...@gmail.com>
>>>> > Reply-To: user@guacamole.apache.org
>>>> > To: user@guacamole.apache.org
>>>> > Subject: Re: Captcha protection to stop brute force attacks
>>>> >
>>>> > Hi Ivan,
>>>> > I tried below in fail2ban default config jail.conf file, but after 5
>>>> > attempts it's still not blocking!, anything missing?.
>>>> >
>>>> > [guacamole]
>>>> > enabled = true
>>>> > bantime = 86400
>>>> > maxretry = 5
>>>> > port     = http,https,8080
>>>> > logpath  = /var/log/tomcat9/catalina.out
>>>> >
>>>> >
>>>> >> From below command I checked the fail2ban guacamole client status
>>>> > fail2ban-client status guacamole
>>>> > output:
>>>> >
>>>> > Status for the jail: guacamole
>>>> > |- Filter
>>>> > |  |- Currently failed: 0
>>>> > |  |- Total failed: 0
>>>> > |  `- File list: /var/log/tomcat9/catalina.out
>>>> > `- Actions
>>>> >   |- Currently banned: 0
>>>> >   |- Total banned: 0
>>>> >   `- Banned IP list:
>>>> >
>>>> >
>>>> >
>>>> >
>>>> >
>>>> > On Sat, Sep 30, 2023 at 1:24 PM khmadhu <kh...@gmail.com> wrote:
>>>> >
>>>> >> Hi Ivan,
>>>> >>
>>>> >> Thanks for the link, looks like fail2ban is the way to go for now.
>>>> >>
>>>> >>
>>>> >> On Sat, Sep 30, 2023 at 12:18 PM Ivanmarcus
>>>> <iv...@yahoo.com.invalid> <iv...@yahoo.com.invalid>
>>>> >> wrote:
>>>> >>
>>>> >>> As far as I'm aware there isn't any work being done on this
>>>> presently,
>>>> >>> however it was discussed back in 2020. The following link may be of
>>>> some
>>>> >>> interest:
>>>> >>>
>>>> >>> https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm
>>>> >>>
>>>> >>>
>>>> >>>
>>>> ---------------------------------------------------------------------
>>>> >>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>>>> >>> For additional commands, e-mail: user-help@guacamole.apache.org
>>>> >>>
>>>> >>>
>>>> >>
>>>> >> --
>>>> >> Thanks & Regards
>>>> >> Madhusudan
>>>> >> 9844117475
>>>> >> Bengaluru-12.
>>>> >>
>>>> >
>>>> >
>>>> > --
>>>> > Thanks & Regards
>>>> > Madhusudan
>>>> > 9844117475
>>>> > Bengaluru-12.
>>>> >
>>>>
>>>> ---------------------------------------------------------------------
>>>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>>>> For additional commands, e-mail: user-help@guacamole.apache.org
>>>
>>>
>>>
>>> --
>>> Thanks & Regards
>>> Madhusudan
>>> 9844117475
>>> Bengaluru-12.
>>>
>>>
>>>
>>>
>>
>> --
>> Thanks & Regards
>> Madhusudan
>> 9844117475
>> Bengaluru-12.
>>
>
>
>

--

Re: Captcha protection to stop brute force attacks

Posted by "Евгений Н. Жуков" <eu...@gmail.com>.
This works for me
[L_catalina]
failregex = ^.*WARN  o\.a\.g\.r\.auth\.AuthenticationService -
Authentication attempt from <HOST> for user "[^"]*" failed\.$

datepattern = ^%%H:%%M:%%S.%%f

сб, 30 сент. 2023 г. в 13:11, khmadhu <kh...@gmail.com>:

>
> Tried modifying filter's in /etc/fail2ban/filter.d/guacamole.conf but no
> luck.
>
> #default regex
> #failregex = ^.*\nWARNING: Authentication attempt from <HOST> for user
> "[^"]*" failed\.$
>
> tried below.
> failregex = \bAuthentication attempt from \[<HOST>(?:,.*)?\] for user ".*"
> failed\.
> #failregex = +\b[Aa]uthentication attempt from \[<HOST>(?:,[^\]]*)?\]
> (?:for user (?:"[^"]*" )?)?failed\.\s*$
>
>
>
> On Sat, Sep 30, 2023 at 2:39 PM David Barber <md...@aol.com.invalid>
> wrote:
>
>> I came across the same issue a few years ago, fwir the default regex for
>> guacamole in fail2ban was at fault and amending that i got it to work but i
>> don't rem any details other than that sorry.
>>
>> --
>> Regards
>> David Barber
>>
>>
>>
>> khmadhu wrote:
>>
>> Hi,
>> In catalina.out file the failed attempts its logging.
>>
>> [2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] INFO
>>  o.a.g.a.l.AuthenticationProviderService - User "gkhjk" did not
>> successfully authenticate against any LDAP server.
>> [2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] WARN
>>  o.a.g.r.auth.AuthenticationService - Authentication attempt from  *IP*
>> for user "gkhjk" failed.
>>
>> In the fail2ban log file its not.
>>
>> 023-09-30 08:18:16,015 fail2ban.filter         [212019]: INFO    Added
>> logfile: '/var/log/tomcat9/catalina.out' (pos = 78668031, hash = 87a1ded384)
>> 2023-09-30 08:18:16,016 fail2ban.jail           [212019]: INFO    Jail
>> 'sshd' started
>> 2023-09-30 08:18:16,017 fail2ban.jail           [212019]: INFO    Jail
>> 'guacamole' started
>>
>>
>>
>>
>> On Sat, Sep 30, 2023 at 1:51 PM Robert Dinse <na...@eskimo.com.invalid>
>> <na...@eskimo.com.invalid> wrote:
>>
>>>
>>>      Did you look in the logs to see if its picking up the attempts?
>>>
>>>
>>> -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
>>>   Eskimo North Linux Friendly Internet Access, Shell Accounts, and
>>> Hosting.
>>>     Knowledgeable human assistance, not telephone trees or script
>>> readers.
>>>   See our web site: http://www.eskimo.com/ (206) 812-0051 or (800)
>>> 246-6874.
>>>
>>> On Sat, 30 Sep 2023, khmadhu wrote:
>>>
>>> > Date: Sat, 30 Sep 2023 13:49:04 +0530
>>> > From: khmadhu <kh...@gmail.com>
>>> > Reply-To: user@guacamole.apache.org
>>> > To: user@guacamole.apache.org
>>> > Subject: Re: Captcha protection to stop brute force attacks
>>> >
>>> > Hi Ivan,
>>> > I tried below in fail2ban default config jail.conf file, but after 5
>>> > attempts it's still not blocking!, anything missing?.
>>> >
>>> > [guacamole]
>>> > enabled = true
>>> > bantime = 86400
>>> > maxretry = 5
>>> > port     = http,https,8080
>>> > logpath  = /var/log/tomcat9/catalina.out
>>> >
>>> >
>>> >> From below command I checked the fail2ban guacamole client status
>>> > fail2ban-client status guacamole
>>> > output:
>>> >
>>> > Status for the jail: guacamole
>>> > |- Filter
>>> > |  |- Currently failed: 0
>>> > |  |- Total failed: 0
>>> > |  `- File list: /var/log/tomcat9/catalina.out
>>> > `- Actions
>>> >   |- Currently banned: 0
>>> >   |- Total banned: 0
>>> >   `- Banned IP list:
>>> >
>>> >
>>> >
>>> >
>>> >
>>> > On Sat, Sep 30, 2023 at 1:24 PM khmadhu <kh...@gmail.com> wrote:
>>> >
>>> >> Hi Ivan,
>>> >>
>>> >> Thanks for the link, looks like fail2ban is the way to go for now.
>>> >>
>>> >>
>>> >> On Sat, Sep 30, 2023 at 12:18 PM Ivanmarcus
>>> <iv...@yahoo.com.invalid> <iv...@yahoo.com.invalid>
>>> >> wrote:
>>> >>
>>> >>> As far as I'm aware there isn't any work being done on this
>>> presently,
>>> >>> however it was discussed back in 2020. The following link may be of
>>> some
>>> >>> interest:
>>> >>>
>>> >>> https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm
>>> >>>
>>> >>>
>>> >>> ---------------------------------------------------------------------
>>> >>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>>> >>> For additional commands, e-mail: user-help@guacamole.apache.org
>>> >>>
>>> >>>
>>> >>
>>> >> --
>>> >> Thanks & Regards
>>> >> Madhusudan
>>> >> 9844117475
>>> >> Bengaluru-12.
>>> >>
>>> >
>>> >
>>> > --
>>> > Thanks & Regards
>>> > Madhusudan
>>> > 9844117475
>>> > Bengaluru-12.
>>> >
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>>> For additional commands, e-mail: user-help@guacamole.apache.org
>>
>>
>>
>> --
>> Thanks & Regards
>> Madhusudan
>> 9844117475
>> Bengaluru-12.
>>
>>
>>
>>
>
> --
> Thanks & Regards
> Madhusudan
> 9844117475
> Bengaluru-12.
>

Re: Captcha protection to stop brute force attacks

Posted by khmadhu <kh...@gmail.com>.
Tried modifying filter's in /etc/fail2ban/filter.d/guacamole.conf but no
luck.

#default regex
#failregex = ^.*\nWARNING: Authentication attempt from <HOST> for user
"[^"]*" failed\.$

tried below.
failregex = \bAuthentication attempt from \[<HOST>(?:,.*)?\] for user ".*"
failed\.
#failregex = +\b[Aa]uthentication attempt from \[<HOST>(?:,[^\]]*)?\]
(?:for user (?:"[^"]*" )?)?failed\.\s*$



On Sat, Sep 30, 2023 at 2:39 PM David Barber <md...@aol.com.invalid> wrote:

> I came across the same issue a few years ago, fwir the default regex for
> guacamole in fail2ban was at fault and amending that i got it to work but i
> don't rem any details other than that sorry.
>
> --
> Regards
> David Barber
>
>
>
> khmadhu wrote:
>
> Hi,
> In catalina.out file the failed attempts its logging.
>
> [2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] INFO
>  o.a.g.a.l.AuthenticationProviderService - User "gkhjk" did not
> successfully authenticate against any LDAP server.
> [2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] WARN
>  o.a.g.r.auth.AuthenticationService - Authentication attempt from  *IP*
> for user "gkhjk" failed.
>
> In the fail2ban log file its not.
>
> 023-09-30 08:18:16,015 fail2ban.filter         [212019]: INFO    Added
> logfile: '/var/log/tomcat9/catalina.out' (pos = 78668031, hash = 87a1ded384)
> 2023-09-30 08:18:16,016 fail2ban.jail           [212019]: INFO    Jail
> 'sshd' started
> 2023-09-30 08:18:16,017 fail2ban.jail           [212019]: INFO    Jail
> 'guacamole' started
>
>
>
>
> On Sat, Sep 30, 2023 at 1:51 PM Robert Dinse <na...@eskimo.com.invalid>
> <na...@eskimo.com.invalid> wrote:
>
>>
>>      Did you look in the logs to see if its picking up the attempts?
>>
>>
>> -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
>>   Eskimo North Linux Friendly Internet Access, Shell Accounts, and
>> Hosting.
>>     Knowledgeable human assistance, not telephone trees or script readers.
>>   See our web site: http://www.eskimo.com/ (206) 812-0051 or (800)
>> 246-6874.
>>
>> On Sat, 30 Sep 2023, khmadhu wrote:
>>
>> > Date: Sat, 30 Sep 2023 13:49:04 +0530
>> > From: khmadhu <kh...@gmail.com>
>> > Reply-To: user@guacamole.apache.org
>> > To: user@guacamole.apache.org
>> > Subject: Re: Captcha protection to stop brute force attacks
>> >
>> > Hi Ivan,
>> > I tried below in fail2ban default config jail.conf file, but after 5
>> > attempts it's still not blocking!, anything missing?.
>> >
>> > [guacamole]
>> > enabled = true
>> > bantime = 86400
>> > maxretry = 5
>> > port     = http,https,8080
>> > logpath  = /var/log/tomcat9/catalina.out
>> >
>> >
>> >> From below command I checked the fail2ban guacamole client status
>> > fail2ban-client status guacamole
>> > output:
>> >
>> > Status for the jail: guacamole
>> > |- Filter
>> > |  |- Currently failed: 0
>> > |  |- Total failed: 0
>> > |  `- File list: /var/log/tomcat9/catalina.out
>> > `- Actions
>> >   |- Currently banned: 0
>> >   |- Total banned: 0
>> >   `- Banned IP list:
>> >
>> >
>> >
>> >
>> >
>> > On Sat, Sep 30, 2023 at 1:24 PM khmadhu <kh...@gmail.com> wrote:
>> >
>> >> Hi Ivan,
>> >>
>> >> Thanks for the link, looks like fail2ban is the way to go for now.
>> >>
>> >>
>> >> On Sat, Sep 30, 2023 at 12:18 PM Ivanmarcus
>> <iv...@yahoo.com.invalid> <iv...@yahoo.com.invalid>
>> >> wrote:
>> >>
>> >>> As far as I'm aware there isn't any work being done on this presently,
>> >>> however it was discussed back in 2020. The following link may be of
>> some
>> >>> interest:
>> >>>
>> >>> https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm
>> >>>
>> >>>
>> >>> ---------------------------------------------------------------------
>> >>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>> >>> For additional commands, e-mail: user-help@guacamole.apache.org
>> >>>
>> >>>
>> >>
>> >> --
>> >> Thanks & Regards
>> >> Madhusudan
>> >> 9844117475
>> >> Bengaluru-12.
>> >>
>> >
>> >
>> > --
>> > Thanks & Regards
>> > Madhusudan
>> > 9844117475
>> > Bengaluru-12.
>> >
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>> For additional commands, e-mail: user-help@guacamole.apache.org
>
>
>
> --
> Thanks & Regards
> Madhusudan
> 9844117475
> Bengaluru-12.
>
>
>
>

-- 
Thanks & Regards
Madhusudan
9844117475
Bengaluru-12.

Re: Captcha protection to stop brute force attacks

Posted by David Barber <md...@aol.com.INVALID>.
I came across the same issue a few years ago, fwir the default regex for 
guacamole in fail2ban was at fault and amending that i got it to work 
but i don't rem any details other than that sorry.

-- 
Regards
David Barber



khmadhu wrote:
> Hi,
> In catalina.out file the failed attempts its logging.
>
> [2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] INFO 
>  o.a.g.a.l.AuthenticationProviderService - User "gkhjk" did not 
> successfully authenticate against any LDAP server.
> [2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] WARN 
>  o.a.g.r.auth.AuthenticationService - Authentication attempt from  
> *IP*  for user "gkhjk" failed.
>
> In the fail2ban log file its not.
>
> 023-09-30 08:18:16,015 fail2ban.filter         [212019]: INFO    Added 
> logfile: '/var/log/tomcat9/catalina.out' (pos = 78668031, hash = 
> 87a1ded384)
> 2023-09-30 08:18:16,016 fail2ban.jail           [212019]: INFO    Jail 
> 'sshd' started
> 2023-09-30 08:18:16,017 fail2ban.jail           [212019]: INFO    Jail 
> 'guacamole' started
>
>
>
>
> On Sat, Sep 30, 2023 at 1:51 PM Robert Dinse 
> <na...@eskimo.com.invalid> wrote:
>
>
>          Did you look in the logs to see if its picking up the attempts?
>
>     -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
>       Eskimo North Linux Friendly Internet Access, Shell Accounts, and
>     Hosting.
>         Knowledgeable human assistance, not telephone trees or script
>     readers.
>       See our web site: http://www.eskimo.com/ (206) 812-0051 or (800)
>     246-6874.
>
>     On Sat, 30 Sep 2023, khmadhu wrote:
>
>     > Date: Sat, 30 Sep 2023 13:49:04 +0530
>     > From: khmadhu <khmadhu@gmail.com <ma...@gmail.com>>
>     > Reply-To: user@guacamole.apache.org
>     <ma...@guacamole.apache.org>
>     > To: user@guacamole.apache.org <ma...@guacamole.apache.org>
>     > Subject: Re: Captcha protection to stop brute force attacks
>     >
>     > Hi Ivan,
>     > I tried below in fail2ban default config jail.conf file, but after 5
>     > attempts it's still not blocking!, anything missing?.
>     >
>     > [guacamole]
>     > enabled = true
>     > bantime = 86400
>     > maxretry = 5
>     > port     = http,https,8080
>     > logpath  = /var/log/tomcat9/catalina.out
>     >
>     >
>     >> From below command I checked the fail2ban guacamole client status
>     > fail2ban-client status guacamole
>     > output:
>     >
>     > Status for the jail: guacamole
>     > |- Filter
>     > |  |- Currently failed: 0
>     > |  |- Total failed: 0
>     > |  `- File list: /var/log/tomcat9/catalina.out
>     > `- Actions
>     >   |- Currently banned: 0
>     >   |- Total banned: 0
>     >   `- Banned IP list:
>     >
>     >
>     >
>     >
>     >
>     > On Sat, Sep 30, 2023 at 1:24 PM khmadhu <khmadhu@gmail.com
>     <ma...@gmail.com>> wrote:
>     >
>     >> Hi Ivan,
>     >>
>     >> Thanks for the link, looks like fail2ban is the way to go for now.
>     >>
>     >>
>     >> On Sat, Sep 30, 2023 at 12:18 PM Ivanmarcus
>     <iv...@yahoo.com.invalid>
>     >> wrote:
>     >>
>     >>> As far as I'm aware there isn't any work being done on this
>     presently,
>     >>> however it was discussed back in 2020. The following link may
>     be of some
>     >>> interest:
>     >>>
>     >>> https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm
>     >>>
>     >>>
>     >>>
>     ---------------------------------------------------------------------
>     >>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>     <ma...@guacamole.apache.org>
>     >>> For additional commands, e-mail:
>     user-help@guacamole.apache.org <ma...@guacamole.apache.org>
>     >>>
>     >>>
>     >>
>     >> --
>     >> Thanks & Regards
>     >> Madhusudan
>     >> 9844117475
>     >> Bengaluru-12.
>     >>
>     >
>     >
>     > --
>     > Thanks & Regards
>     > Madhusudan
>     > 9844117475
>     > Bengaluru-12.
>     >
>
>     ---------------------------------------------------------------------
>     To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>     <ma...@guacamole.apache.org>
>     For additional commands, e-mail: user-help@guacamole.apache.org
>     <ma...@guacamole.apache.org>
>
>
>
> -- 
> Thanks & Regards
> Madhusudan
> 9844117475
> Bengaluru-12.



Re: Captcha protection to stop brute force attacks

Posted by khmadhu <kh...@gmail.com>.
Hi,
In catalina.out file the failed attempts its logging.

[2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] INFO
 o.a.g.a.l.AuthenticationProviderService - User "gkhjk" did not
successfully authenticate against any LDAP server.
[2023-09-30 08:22:20] [info] 08:22:20.043 [http-nio-8080-exec-12] WARN
 o.a.g.r.auth.AuthenticationService - Authentication attempt from  *IP*
for user "gkhjk" failed.

In the fail2ban log file its not.

023-09-30 08:18:16,015 fail2ban.filter         [212019]: INFO    Added
logfile: '/var/log/tomcat9/catalina.out' (pos = 78668031, hash = 87a1ded384)
2023-09-30 08:18:16,016 fail2ban.jail           [212019]: INFO    Jail
'sshd' started
2023-09-30 08:18:16,017 fail2ban.jail           [212019]: INFO    Jail
'guacamole' started




On Sat, Sep 30, 2023 at 1:51 PM Robert Dinse <na...@eskimo.com.invalid>
wrote:

>
>      Did you look in the logs to see if its picking up the attempts?
>
>
> -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
>   Eskimo North Linux Friendly Internet Access, Shell Accounts, and Hosting.
>     Knowledgeable human assistance, not telephone trees or script readers.
>   See our web site: http://www.eskimo.com/ (206) 812-0051 or (800)
> 246-6874.
>
> On Sat, 30 Sep 2023, khmadhu wrote:
>
> > Date: Sat, 30 Sep 2023 13:49:04 +0530
> > From: khmadhu <kh...@gmail.com>
> > Reply-To: user@guacamole.apache.org
> > To: user@guacamole.apache.org
> > Subject: Re: Captcha protection to stop brute force attacks
> >
> > Hi Ivan,
> > I tried below in fail2ban default config jail.conf file, but after 5
> > attempts it's still not blocking!, anything missing?.
> >
> > [guacamole]
> > enabled = true
> > bantime = 86400
> > maxretry = 5
> > port     = http,https,8080
> > logpath  = /var/log/tomcat9/catalina.out
> >
> >
> >> From below command I checked the fail2ban guacamole client status
> > fail2ban-client status guacamole
> > output:
> >
> > Status for the jail: guacamole
> > |- Filter
> > |  |- Currently failed: 0
> > |  |- Total failed: 0
> > |  `- File list: /var/log/tomcat9/catalina.out
> > `- Actions
> >   |- Currently banned: 0
> >   |- Total banned: 0
> >   `- Banned IP list:
> >
> >
> >
> >
> >
> > On Sat, Sep 30, 2023 at 1:24 PM khmadhu <kh...@gmail.com> wrote:
> >
> >> Hi Ivan,
> >>
> >> Thanks for the link, looks like fail2ban is the way to go for now.
> >>
> >>
> >> On Sat, Sep 30, 2023 at 12:18 PM Ivanmarcus
> <iv...@yahoo.com.invalid>
> >> wrote:
> >>
> >>> As far as I'm aware there isn't any work being done on this presently,
> >>> however it was discussed back in 2020. The following link may be of
> some
> >>> interest:
> >>>
> >>> https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm
> >>>
> >>>
> >>> ---------------------------------------------------------------------
> >>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
> >>> For additional commands, e-mail: user-help@guacamole.apache.org
> >>>
> >>>
> >>
> >> --
> >> Thanks & Regards
> >> Madhusudan
> >> 9844117475
> >> Bengaluru-12.
> >>
> >
> >
> > --
> > Thanks & Regards
> > Madhusudan
> > 9844117475
> > Bengaluru-12.
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
> For additional commands, e-mail: user-help@guacamole.apache.org



-- 
Thanks & Regards
Madhusudan
9844117475
Bengaluru-12.

Re: Captcha protection to stop brute force attacks

Posted by Robert Dinse <na...@eskimo.com.INVALID>.
     Did you look in the logs to see if its picking up the attempts?

-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
  Eskimo North Linux Friendly Internet Access, Shell Accounts, and Hosting.
    Knowledgeable human assistance, not telephone trees or script readers.
  See our web site: http://www.eskimo.com/ (206) 812-0051 or (800) 246-6874.

On Sat, 30 Sep 2023, khmadhu wrote:

> Date: Sat, 30 Sep 2023 13:49:04 +0530
> From: khmadhu <kh...@gmail.com>
> Reply-To: user@guacamole.apache.org
> To: user@guacamole.apache.org
> Subject: Re: Captcha protection to stop brute force attacks
> 
> Hi Ivan,
> I tried below in fail2ban default config jail.conf file, but after 5
> attempts it's still not blocking!, anything missing?.
>
> [guacamole]
> enabled = true
> bantime = 86400
> maxretry = 5
> port     = http,https,8080
> logpath  = /var/log/tomcat9/catalina.out
>
>
>> From below command I checked the fail2ban guacamole client status
> fail2ban-client status guacamole
> output:
>
> Status for the jail: guacamole
> |- Filter
> |  |- Currently failed: 0
> |  |- Total failed: 0
> |  `- File list: /var/log/tomcat9/catalina.out
> `- Actions
>   |- Currently banned: 0
>   |- Total banned: 0
>   `- Banned IP list:
>
>
>
>
>
> On Sat, Sep 30, 2023 at 1:24 PM khmadhu <kh...@gmail.com> wrote:
>
>> Hi Ivan,
>>
>> Thanks for the link, looks like fail2ban is the way to go for now.
>>
>>
>> On Sat, Sep 30, 2023 at 12:18 PM Ivanmarcus <iv...@yahoo.com.invalid>
>> wrote:
>>
>>> As far as I'm aware there isn't any work being done on this presently,
>>> however it was discussed back in 2020. The following link may be of some
>>> interest:
>>>
>>> https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm
>>>
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>>> For additional commands, e-mail: user-help@guacamole.apache.org
>>>
>>>
>>
>> --
>> Thanks & Regards
>> Madhusudan
>> 9844117475
>> Bengaluru-12.
>>
>
>
> -- 
> Thanks & Regards
> Madhusudan
> 9844117475
> Bengaluru-12.
>

Re: Captcha protection to stop brute force attacks

Posted by khmadhu <kh...@gmail.com>.
Hi Ivan,
I tried below in fail2ban default config jail.conf file, but after 5
attempts it's still not blocking!, anything missing?.

[guacamole]
enabled = true
bantime = 86400
maxretry = 5
port     = http,https,8080
logpath  = /var/log/tomcat9/catalina.out


From below command I checked the fail2ban guacamole client status
fail2ban-client status guacamole
output:

Status for the jail: guacamole
|- Filter
|  |- Currently failed: 0
|  |- Total failed: 0
|  `- File list: /var/log/tomcat9/catalina.out
`- Actions
   |- Currently banned: 0
   |- Total banned: 0
   `- Banned IP list:





On Sat, Sep 30, 2023 at 1:24 PM khmadhu <kh...@gmail.com> wrote:

> Hi Ivan,
>
> Thanks for the link, looks like fail2ban is the way to go for now.
>
>
> On Sat, Sep 30, 2023 at 12:18 PM Ivanmarcus <iv...@yahoo.com.invalid>
> wrote:
>
>> As far as I'm aware there isn't any work being done on this presently,
>> however it was discussed back in 2020. The following link may be of some
>> interest:
>>
>> https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm
>>
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
>> For additional commands, e-mail: user-help@guacamole.apache.org
>>
>>
>
> --
> Thanks & Regards
> Madhusudan
> 9844117475
> Bengaluru-12.
>


-- 
Thanks & Regards
Madhusudan
9844117475
Bengaluru-12.

Re: Captcha protection to stop brute force attacks

Posted by khmadhu <kh...@gmail.com>.
Hi Ivan,

Thanks for the link, looks like fail2ban is the way to go for now.


On Sat, Sep 30, 2023 at 12:18 PM Ivanmarcus <iv...@yahoo.com.invalid>
wrote:

> As far as I'm aware there isn't any work being done on this presently,
> however it was discussed back in 2020. The following link may be of some
> interest:
>
> https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
> For additional commands, e-mail: user-help@guacamole.apache.org
>
>

-- 
Thanks & Regards
Madhusudan
9844117475
Bengaluru-12.

Re: Captcha protection to stop brute force attacks

Posted by Ivanmarcus <iv...@yahoo.com.INVALID>.
As far as I'm aware there isn't any work being done on this presently, 
however it was discussed back in 2020. The following link may be of some 
interest:

https://lists.apache.org/thread/5pkbqsyks4g1vdh7vnxv20lzr11jzvnm


---------------------------------------------------------------------
To unsubscribe, e-mail: user-unsubscribe@guacamole.apache.org
For additional commands, e-mail: user-help@guacamole.apache.org