Topic: Protecting iRedAdmin with Fail2Ban
Hi,
Does anyone have an idea how to protect iRedAdmin with Fail2Ban? I do not know how to protect something in Fail2Ban that logs to a database instead of a file.
The one option can think of is using a htpasswd file before getting to the iRedAdmin login page as these attempts can be logged in a file.
"iRedAdmin" must to be listed as an Apache alias somewhere but couldn't find where. Finding this file I think is first step towards protecting iRedAdmin with Fail2Ban. At the very least could change the "iRedAdmin" alias to make the login page a little harder to find.
The iRedAdmin files are here:
-on RHEL/CentOS, it's /var/www/iredadmin/settings.py.
-on Debian/Ubuntu, it's /opt/www/iredadmin/settings.py (in recent iRedMail releases) or /usr/share/apache2/iredadmin/settings.py (in old iRedMail releases).
-on FreeBSD, it's /usr/local/www/iredadmin/settings.py.
-on OpenBSD, it's /var/www/iredadmin/settings.py.
Does anyone have any suggestions or anything to add or another way to use Fail2Ban with iRedAdmin?
==== Required information ====
- iRedMail version (check /etc/iredmail-release): 0.9.4
- Linux/BSD distribution name and version: Ubuntu 14 LTS
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MariaDB
- Web server (Apache or Nginx): Apache
- Manage mail accounts with iRedAdmin-Pro? No
- Related log if you're reporting an issue: NA
====
----
Spider Email Archiver: On-Premises, lightweight email archiving software developed by iRedMail team. Supports Amazon S3 compatible storage and custom branding.