Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

VPN Portal unprotected from bruteforce and other attacks?

I can see several brute force attempts in /log/vpnportal.log

just picking a random of those attacking IP, I found 122 attempts in 2 minutes. Most of them were API style attempts where I can see username and the password in the logged header and the source IP in the X-Forwarded-For header.

So many requests in such a short time looks like SFOS 21.0 is not blocking the hacking IPs?

this is enabled:

This suggestion with blackhole NAT can just be a joke: https://support.sophos.com/support/s/article/KBA-000009932?language=en_US

A simple fail2ban approach would massively reduce successful attacks.

What makes it even worse is that I cannot find a single of those hacking IPs in any GUI log. The attacks were 7 hours ago.

What can Sophos say about it?



Edited TAGs
[edited by: Erick Jan at 5:55 AM (GMT -8) on 27 Jan 2025]