I can see several brute force attempts in /log/vpnportal.log
just picking a random of those attacking IP, I found 122 attempts in 2 minutes. Most of them were API style attempts where I can see username and the password in the logged header and the source IP in the X-Forwarded-For header.
So many requests in such a short time looks like SFOS 21.0 is not blocking the hacking IPs?
this is enabled:
This suggestion with blackhole NAT can just be a joke: https://support.sophos.com/support/s/article/KBA-000009932?language=en_US
A simple fail2ban approach would massively reduce successful attacks.
What makes it even worse is that I cannot find a single of those hacking IPs in any GUI log. The attacks were 7 hours ago.
What can Sophos say about it?
Edited TAGs
[edited by: Erick Jan at 5:55 AM (GMT -8) on 27 Jan 2025]