Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Roundcube
  3. Setting ['login_rate_limit'] to prevent brute force login attacks in Roundcube

Setting ['login_rate_limit'] to prevent brute force login attacks in Roundcube

Scheduled Pinned Locked Moved Roundcube
8 Posts 4 Posters 2.4k Views 4 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • d19dotcaD Offline
      d19dotcaD Offline
      d19dotca
      wrote on last edited by d19dotca
      #1

      I realized recently that there's a setting in Roundcube that can help prevent brute force login attacks.

      I went to see if this was set in the Roundcube package to figure if it was adequate or if I should add it into the customization file.

      I didn't find anything in the Cloudron Roundcube App config template which contains $config['login_rate_limit'] = 3; (which is the default in Roundcube apparently, according to their repo on GitHub).

      So I am just wondering two things...

      1. Is this setting actually enabled in the Roundcube package and I just missed it?

      2. Is the brute-force attack limited by other Cloudron security settings perhaps which means it's not necessary in the app itself?

      3. If it's not set, should it be perhaps considered in the app package?

      I'll set it manually in the custom config file if needed, but wanted to check on this first with just what I found from some quick research.

      --
      Dustin Dauncey
      www.d19.ca

      murgeroM 1 Reply Last reply
      2
      • d19dotcaD d19dotca

        I realized recently that there's a setting in Roundcube that can help prevent brute force login attacks.

        I went to see if this was set in the Roundcube package to figure if it was adequate or if I should add it into the customization file.

        I didn't find anything in the Cloudron Roundcube App config template which contains $config['login_rate_limit'] = 3; (which is the default in Roundcube apparently, according to their repo on GitHub).

        So I am just wondering two things...

        1. Is this setting actually enabled in the Roundcube package and I just missed it?

        2. Is the brute-force attack limited by other Cloudron security settings perhaps which means it's not necessary in the app itself?

        3. If it's not set, should it be perhaps considered in the app package?

        I'll set it manually in the custom config file if needed, but wanted to check on this first with just what I found from some quick research.

        murgeroM Offline
        murgeroM Offline
        murgero
        App Dev
        wrote on last edited by
        #2

        @d19dotca I don't use this in my roundcube but wouldn't setting a rate limit in LDAP (obviously only apps that support LDAP login would work here) be a better option?

        --
        https://urgero.org
        ~ Professional Nerd. Freelance Programmer. ~

        d19dotcaD 1 Reply Last reply
        1
        • murgeroM murgero

          @d19dotca I don't use this in my roundcube but wouldn't setting a rate limit in LDAP (obviously only apps that support LDAP login would work here) be a better option?

          d19dotcaD Offline
          d19dotcaD Offline
          d19dotca
          wrote on last edited by d19dotca
          #3

          @murgero I agree, however it doesn’t seem that Cloudron’s built-in rate limiting helps cover this use-case.

          145E0C90-BC44-4B48-90C8-CAC0386C7F10.jpeg

          Am I maybe missing a configuration that covers that?

          --
          Dustin Dauncey
          www.d19.ca

          murgeroM 1 Reply Last reply
          0
          • d19dotcaD d19dotca

            @murgero I agree, however it doesn’t seem that Cloudron’s built-in rate limiting helps cover this use-case.

            145E0C90-BC44-4B48-90C8-CAC0386C7F10.jpeg

            Am I maybe missing a configuration that covers that?

            murgeroM Offline
            murgeroM Offline
            murgero
            App Dev
            wrote on last edited by
            #4

            @d19dotca The bit that says "Cloudron Password Verification Routes" I believe covers LDAP logins @girish is this a valid statement?

            --
            https://urgero.org
            ~ Professional Nerd. Freelance Programmer. ~

            d19dotcaD 1 Reply Last reply
            0
            • murgeroM murgero

              @d19dotca The bit that says "Cloudron Password Verification Routes" I believe covers LDAP logins @girish is this a valid statement?

              d19dotcaD Offline
              d19dotcaD Offline
              d19dotca
              wrote on last edited by
              #5

              @murgero Ah okay. If true, that seems way too low of a rate limit to really be effective at all. Because that’d mean that one user could try to login 10 times per second? I’d think it should be at least 10 times per minute especially since it’s per IP. If almost prefer it to be more like 5 a minute tops, personally.

              --
              Dustin Dauncey
              www.d19.ca

              imc67I 1 Reply Last reply
              0
              • d19dotcaD d19dotca

                @murgero Ah okay. If true, that seems way too low of a rate limit to really be effective at all. Because that’d mean that one user could try to login 10 times per second? I’d think it should be at least 10 times per minute especially since it’s per IP. If almost prefer it to be more like 5 a minute tops, personally.

                imc67I Offline
                imc67I Offline
                imc67
                translator
                wrote on last edited by
                #6

                @d19dotca said in Setting ['login_rate_limit'] to prevent brute force login attacks in Roundcube:

                If almost prefer it to be more like 5 a minute tops, personally

                That’s why I suggested in this post https://forum.cloudron.io/topic/4723/what-s-coming-in-cloudron-6-3/4 to make all the rate limiting configurable 😀

                d19dotcaD 1 Reply Last reply
                1
                • imc67I imc67

                  @d19dotca said in Setting ['login_rate_limit'] to prevent brute force login attacks in Roundcube:

                  If almost prefer it to be more like 5 a minute tops, personally

                  That’s why I suggested in this post https://forum.cloudron.io/topic/4723/what-s-coming-in-cloudron-6-3/4 to make all the rate limiting configurable 😀

                  d19dotcaD Offline
                  d19dotcaD Offline
                  d19dotca
                  wrote on last edited by d19dotca
                  #7

                  @imc67 Ah okay, that’s actually what got me looking into Roundcube in particular and led me down this path. Haha. I agree, the rate limiting needs to be customizable. I just thought maybe I can do it at the app level (which seems like I can for Roundcube at least but not sure if this is overwritten by the system settings). Maybe I’ll just wait until it’s baked into Cloudron to configure properly down the road. 🙂

                  --
                  Dustin Dauncey
                  www.d19.ca

                  1 Reply Last reply
                  1
                  • girishG Offline
                    girishG Offline
                    girish
                    Staff
                    wrote on last edited by
                    #8

                    Some part of this like rate limits and notifications of hitting rate limits (for API, LDAP etc) are part of our focus in 6.3. We want to review all our current security settings before going multi-host.

                    1 Reply Last reply
                    3
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • Bookmarks
                      • Search