• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.

Does Plesk admin login block brute force attacks, or do i need fail2ban

Dan Mikkelsen

Basic Pleskian
Hi

I have installed fail2ban and it is successfully blocking bruteforce attacks on SSH, but what about bruteforce attempts on the plesk admin login? Does plesk take some precautions on this? (if not, that might be a suggestion). Or should 3rd party applications be used for this, because i have no idea on how to set up fail2ban for this (not a linux pro unfortunately), but it seems to be the application of choice for this.
 
Thanks, but this just let me block specific IP addresses. What I was concerned about was if Plesk automatically blocks attempts for some minutes or so when you have entered the wrong information enough times. Or can a person keep trying until I block him myself after checking logfiles (which isn't often).
 
mysql> select * from misc where param='lock_attempts';
+---------------+-----+
| param | val |
+---------------+-----+
| lock_attempts | 5 |
+---------------+-----+
1 row in set (0.00 sec)

Only 5 attempts of login is allowed.
 
You should still look into using something like denyhosts, mod_evasive, fail2ban or something like that - otherwise an attacker could just keep trying once they get unlocked, or worse, keep trying for every and the admin account will always be locked in that you cant get in anymore.
 
hvae it look at the logs, I think the acces_log or error_log should log failed login attempts
 
Back
Top