Topic: fail2ban is failing to ban
==== Required information ====
- iRedMail version (check /etc/iredmail-release): v0.9.6
- Linux/BSD distribution name and version: Ubuntu 16.04.02 ?xenial
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Web server (Apache or Nginx): Apache
- Manage mail accounts with iRedAdmin-Pro? No
- [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
====
As per the title really, fail2ban is failing to ban.
This is a fresh install of iredmail with no other significant installations. I used a minimal Ubuntu 16.04.02 server as the base and installed a copy of iredmail onto that. Letsencrypt was then added to gain a public certified certificate.
The only other additions (other than apt-get upgrade and updates) have been an alternative webmail service and a calendar service for backward compatability for some users. SOGo and Roundcube have been kept untouched. I have not as yet added any fail2ban entries for these two services.
Everything other than fail2ban is working perfectly.
As can be seen from the iptables -L -n outputs, the various iptables chains specified in the fail2ban.local config file do not seem to be being activated other than [sshd]
I modified the ignoreip parameter so that only one local net ip address is ignored so I could both test fail2ban and ensure I did not lock myself out (as I noted in the comment ahead of the modified line)
I have included below, copies of the following
iptables -L -n outputs, both
- prior to deliberate mal logons
- post deliberate mal logons
fail2ban.local config file
fail2ban.conf config file
fail2ban/filter.d/sogo-auth.conf config file (and full path just in case that matters)
sogo log
Note that Roundcube and every other service I tested is also NOT banning. ONLY sshd seems to be working.
This is the only thing stopping me putting this into service now, so any help in getting to the bottom of it would be very welcome. I have searched the net high and low, and while I have found a great deal of information on fail2ban and similar issues, I cannot seem to locate anything quite close enough to help me get to the bottom of the issues.
Thank you.
================================
prior to deliberate mal logons
(looks identical after 7+ failed logons for any service other than sshd)
================================
root@mail2:~# iptables -L -n
Chain INPUT (policy DROP)
target prot opt source destination
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 22
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:25
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:587
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:110
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:995
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:993
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain f2b-sshd (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0
================================
post deliberate mal logons on sshd
================================
root@mail2:~# iptables -L -n
Chain INPUT (policy DROP)
target prot opt source destination
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 22
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:25
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:587
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:110
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:995
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:993
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain f2b-sshd (1 references)
target prot opt source destination
REJECT all -- 172.16.1.127 0.0.0.0/0 reject-with icmp-port-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0
==============
fail2ban.local
==============
# Refer to /etc/fail2ban/jail.conf for more examples.
[DEFAULT]
# time is in seconds. 3600 = 1 hour, 86400 = 24 hours (1 day)
findtime = 3600
bantime = 3600
maxretry = 5
# This is the default inoreip line
#ignoreip = 127.0.0.1 127.0.0.0/8 172.16.0.0/12
# The following line is a modification of the above default line
# I am using it to test blocking by fail2ban. It only ignores one
# desktop test machine and loopback block.
# Every other IP should be blocked
# if the failure parameters are exceeded
ignoreip = 127.0.0.1 127.0.0.0/8 172.16.1.124
[sshd]
enabled = true
filter = sshd
action = iptables-multiport[name=sshd, port="22", protocol=tcp]
logpath = /var/log/auth.log
[sshd-ddos]
enabled = true
filter = sshd-ddos
action = iptables-multiport[name=sshd-ddos, port="22", protocol=tcp]
logpath = /var/log/auth.log
[roundcube-iredmail]
enabled = true
filter = roundcube.iredmail
action = iptables-multiport[name=roundcube, port="http,https,smtp,submission,pop3,pop3s,imap,imaps,sieve", prot$
logpath = /var/log/mail.log
findtime = 3600
[dovecot-iredmail]
enabled = true
filter = dovecot.iredmail
action = iptables-multiport[name=dovecot, port="http,https,smtp,submission,pop3,pop3s,imap,imaps,sieve", protoc$
logpath = /var/log/dovecot.log
/var/log/dovecot-imap.log
/var/log/dovecot-pop3.log
/var/log/dovecot-sieve.log
[postfix-iredmail]
enabled = true
filter = postfix.iredmail
action = iptables-multiport[name=postfix, port="http,https,smtp,submission,pop3,pop3s,imap,imaps,sieve", protoc$
logpath = /var/log/mail.log
[postfix-sasl]
enabled = true
filter = postfix-sasl
action = iptables-multiport[name=postfix, port="http,https,smtp,submission,pop3,pop3s,imap,imaps,sieve", protoc$
logpath = /var/log/mail.log
[sogo-iredmail]
enabled = true
filter = sogo-auth
action = iptables-multiport[name=sogo, port="http,https,smtp,submission,pop3,pop3s,imap,imaps,sieve", protocol=$
logpath = /var/log/sogo/sogo.log
==============
fail2ban.conf
==============
# Fail2Ban main configuration file
#
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
#
# Changes: in most of the cases you should not modify this
# file, but provide customizations in fail2ban.local file, e.g.:
#
# [Definition]
# loglevel = DEBUG
#
[Definition]
# Option: loglevel
# Notes.: Set the log level output.
# CRITICAL
# ERROR
# WARNING
# NOTICE
# INFO
# DEBUG
# Values: [ LEVEL ] Default: ERROR
#
loglevel = INFO
# Option: logtarget
# Notes.: Set the log target. This could be a file, SYSLOG, STDERR or STDOUT.
# Only one log target can be specified.
# If you change logtarget from the default value and you are
# using logrotate -- also adjust or disable rotation in the
# corresponding configuration file
# (e.g. /etc/logrotate.d/fail2ban on Debian systems)
# Values: [ STDOUT | STDERR | SYSLOG | FILE ] Default: STDERR
#
logtarget = SYSLOG
# Option: syslogsocket
# Notes: Set the syslog socket file. Only used when logtarget is SYSLOG
# auto uses platform.system() to determine predefined paths
# Values: [ auto | FILE ] Default: auto
syslogsocket = auto
# Option: socket
# Notes.: Set the socket file. This is used to communicate with the daemon. Do
# not remove this file when Fail2ban runs. It will not be possible to
# communicate with the server afterwards.
# Values: [ FILE ] Default: /var/run/fail2ban/fail2ban.sock
#
socket = /var/run/fail2ban/fail2ban.sock
# Option: pidfile
# Notes.: Set the PID file. This is used to store the process ID of the
# fail2ban server.
# Values: [ FILE ] Default: /var/run/fail2ban/fail2ban.pid
#
pidfile = /var/run/fail2ban/fail2ban.pid
# Options: dbfile
# Notes.: Set the file for the fail2ban persistent data to be stored.
# A value of ":memory:" means database is only stored in memory
# and data is lost when fail2ban is stopped.
# A value of "None" disables the database.
# Values: [ None :memory: FILE ] Default: /var/lib/fail2ban/fail2ban.sqlite3
dbfile = /var/lib/fail2ban/fail2ban.sqlite3
# Options: dbpurgeage
# Notes.: Sets age at which bans should be purged from the database
# Values: [ SECONDS ] Default: 86400 (24hours)
dbpurgeage = 86400
=================================
fail2ban/filter.d/sogo-auth.conf
=================================
# Fail2ban filter for SOGo authentcation
#
# Log file usually in /var/log/sogo/sogo.log
[Definition]
failregex = ^ sogod \[\d+\]: SOGoRootPage Login from '<HOST>' for user '.*' might not have worked( - password policy: \d* grace: -?\d* expire: -?\d* bound: -?\d*)?\s*$
ignoreregex =
#
# DEV Notes:
#
# The error log may contain multiple hosts, whereas the first one
# is the client and all others are poxys. We match the first one, only
#
# Author: Arnd Brandes
=========
sogo log
=========
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be11a1d60[WOWatchDogChild]> sending terminate signal to pid 1818
Jun 05 10:08:02 sogod [1620]: <0x0x555be11a1540[WOWatchDogChild]> sending terminate signal to pid 1817
Jun 05 10:08:02 sogod [1620]: <0x0x555be11a8c90[WOWatchDogChild]> sending terminate signal to pid 1816
Jun 05 10:08:02 sogod [1620]: <0x0x555be1198360[WOWatchDogChild]> sending terminate signal to pid 1815
Jun 05 10:08:02 sogod [1620]: <0x0x555be11972d0[WOWatchDogChild]> sending terminate signal to pid 1814
Jun 05 10:08:02 sogod [1620]: <0x0x555be1197090[WOWatchDogChild]> sending terminate signal to pid 1813
Jun 05 10:08:02 sogod [1620]: <0x0x555be11969a0[WOWatchDogChild]> sending terminate signal to pid 1812
Jun 05 10:08:02 sogod [1620]: <0x0x555be1196500[WOWatchDogChild]> sending terminate signal to pid 1811
Jun 05 10:08:02 sogod [1620]: <0x0x555be1196170[WOWatchDogChild]> sending terminate signal to pid 1810
Jun 05 10:08:02 sogod [1620]: <0x0x555be119d860[WOWatchDogChild]> sending terminate signal to pid 1809
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be11969a0[WOWatchDogChild]> child 1812 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be11a1d60[WOWatchDogChild]> child 1818 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be1196170[WOWatchDogChild]> child 1810 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be119d860[WOWatchDogChild]> child 1809 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be1196500[WOWatchDogChild]> child 1811 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be11a8c90[WOWatchDogChild]> child 1816 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be11972d0[WOWatchDogChild]> child 1814 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be11a1540[WOWatchDogChild]> child 1817 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be1198360[WOWatchDogChild]> child 1815 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> Terminating with SIGINT or SIGTERM
Jun 05 10:08:02 sogod [1620]: <0x0x555be1197090[WOWatchDogChild]> child 1813 exited
Jun 05 10:08:02 sogod [1620]: <0x0x555be0e92920[WOWatchDog]> all children exited. We now terminate.
Jun 05 10:08:38 sogod [1633]: version 3.2.9 (build @shiva.inverse 201706040704) -- starting
Jun 05 10:08:38 sogod [1633]: vmem size check enabled: shutting down app when vmem > 500 MB. Currently at 224 MB
Jun 05 10:08:43 sogod [1633]: <0x0x559a51e0e060[SOGoProductLoader]> SOGo products loaded from '/usr/lib/GNUstep/SOGo':
Jun 05 10:08:43 sogod [1633]: <0x0x559a51e0e060[SOGoProductLoader]> Mailer.SOGo, ActiveSync.SOGo, MainUI.SOGo, CommonUI.SOGo, SchedulerUI.SOGo, Contacts.SOGo, MailerUI.SOGo, ContactsUI.SOGo, Administratio$
Jun 05 10:08:44 sogod [1633]: All products loaded - current memory usage at 278 MB
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> listening on 127.0.0.1:20000
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> watchdog process pid: 1633
Jun 05 10:08:44 sogod [1633]: <0x0x7feae7871100[WOWatchDogChild]> watchdog request timeout set to 60 minutes
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> preparing 10 children
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1805
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1806
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1807
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1808
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1809
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1810
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1811
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1812
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1813
Jun 05 10:08:44 sogod [1633]: <0x0x559a51bfb920[WOWatchDog]> child spawned with pid 1814
Jun 05 10:08:45 sogod [1807]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1811]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1812]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1805]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1813]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1810]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1814]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1806]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1809]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:08:45 sogod [1808]: <0x0x559a52133000[WOHttpAdaptor]> notified the watchdog that we are ready
Jun 05 10:18:43 sogod [1808]: <0x0x559a51dd8ea0[SOGoCache]> Cache cleanup interval set every 300.000000 seconds
Jun 05 10:18:43 sogod [1808]: <0x0x559a51dd8ea0[SOGoCache]> Using host(s) '127.0.0.1' as server(s)
Jun 05 10:18:44 sogod [1808]: [WARN] <0x0x7feae7892cc0[WOxElemBuilder]> could not locate builders: WOxExtElemBuilder,WOxExtElemBuilder
Jun 05 10:18:44 sogod [1808]: 172.16.1.127 "GET /SOGo/ HTTP/1.1" 200 6984/0 0.401 26015 73% 3M
Jun 05 10:18:59 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:18:59 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/74 0.041 - - 0
Jun 05 10:19:07 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:19:07 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/75 0.002 - - 0
Jun 05 10:19:17 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:19:17 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/76 0.002 - - 0
Jun 05 10:19:23 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:19:23 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/77 0.002 - - 0
Jun 05 10:19:32 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:19:32 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/77 0.002 - - 0
Jun 05 10:19:39 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:19:39 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/78 0.002 - - 0
Jun 05 10:19:46 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:19:46 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/79 0.002 - - 0
Jun 05 10:19:52 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:19:52 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/80 0.002 - - 0
Jun 05 10:19:58 sogod [1808]: SOGoRootPage Login from '172.16.1.127' for user 'chris' might not have worked - password policy: 65535 grace: -1 expire: -1 bound: 0
Jun 05 10:19:58 sogod [1808]: 172.16.1.127 "POST /SOGo/connect HTTP/1.1" 403 34/81 0.003 - - 0
----
Spider Email Archiver: On-Premises, lightweight email archiving software developed by iRedMail team. Supports Amazon S3 compatible storage and custom branding.