Is OMV web interface protected against bruteforce attacks?

  • Hi,


    I couldn't find such information anywhere, either on the website or here in the forums and I'm just curious if the web interface is protected against brute-force attacks when someone tries to login multiple times and fails, maybe blocking their IP address in the hosts.deny file or something. Is this something, or similar, that it's currently implemented?


    Thanks.

  • Not (yet) implemented, but it is planned to add "fail2ban" via a plugin by the third party plugin developers. This Plugin could take care of such attacks.


    BTW: Before you now say something like "why don't gets this implemented into the core?". Think about the target of OpenMediaVault. It is designed for home/soho environment. Therefore such feature would be overkill for this 'target'.


    Greetings
    David

    "Well... lately this forum has become support for everything except omv" [...] "And is like someone is banning Google from their browsers"


    Only two things are infinite, the universe and human stupidity, and I'm not sure about the former.

    Upload Logfile via WebGUI/CLI
    #openmediavault on freenode IRC | German & English | GMT+1
    Absolutely no Support via PM!

  • Glad to know about that :)


    Zitat von "davidh2k"

    BTW: Before you now say something like "why don't gets this implemented into the core?".


    I never said that though. Still, for home or not, basic security precautions is never overkill IMO.


    Thanks for your response :)

  • Zitat von "davidh2k"

    ..... Think about the target of OpenMediaVault. It is designed for home/soho environment. Therefore such feature would be overkill for this 'target'.


    OMV can do it's job not only in these environments, it is absolutely able to serve in enterprise environments, but this is not the point. A NAS is a storage device and not meant to replace a full featured firewall, even at home. It has a basic firewall to manage tcp ports, but this is IMHO sufficient for a storage device. I would never connect a NAS directly to the web, it's place is in the inner network or in a DMZ, but always behind a firewall device.

    Homebox: Bitfenix Prodigy Case, ASUS E45M1-I DELUXE ITX, 8GB RAM, 5x 4TB HGST Raid-5 Data, 1x 320GB 2,5" WD Bootdrive via eSATA from the backside
    Companybox 1: Standard Midi-Tower, Intel S3420 MoBo, Xeon 3450 CPU, 16GB RAM, 5x 2TB Seagate Data, 1x 80GB Samsung Bootdrive - testing for iSCSI to ESXi-Hosts
    Companybox 2: 19" Rackservercase 4HE, Intel S975XBX2 MoBo, C2D@2200MHz, 8GB RAM, HP P212 Raidcontroller, 4x 1TB WD Raid-0 Data, 80GB Samsung Bootdrive, Intel 1000Pro DualPort (Bonded in a VLAN) - Temp-NFS-storage for ESXi-Hosts

  • Zitat von "datadigger"


    OMV can do it's job not only in these environments, it is absolutely able to serve in enterprise environments, but this is not the point. A NAS is a storage device and not meant to replace a full featured firewall, even at home. It has a basic firewall to manage tcp ports, but this is IMHO sufficient for a storage device. I would never connect a NAS directly to the web, it's place is in the inner network or in a DMZ, but always behind a firewall device.


    Of course it even is able to serve small to medium Office requirements. But Volker choose that target for OpenMediaVault, because of that some business type features won't be implemented by Volker into the core or as a core plugin.


    Greetings
    David

    "Well... lately this forum has become support for everything except omv" [...] "And is like someone is banning Google from their browsers"


    Only two things are infinite, the universe and human stupidity, and I'm not sure about the former.

    Upload Logfile via WebGUI/CLI
    #openmediavault on freenode IRC | German & English | GMT+1
    Absolutely no Support via PM!

  • Zitat von "tekkbebe"

    Well, I don't think the interface should be opened to the internet. Keep it behind a firewall and when the openvpn plugin is done connect via it.


    Perhaps, but sometimes it might be useful to get external access to the web interface.


    I was not aware of that openvpn plugin. Looks like a better solution :)

  • Yes ... for example OwnCloud must be enabled from ALL. But how to secure this? Bruteforce attack is expected.


    Zitat von "Nazgulled"


    Perhaps, but sometimes it might be useful to get external access to the web interface.


    I was not aware of that openvpn plugin. Looks like a better solution :)

    • Offizieller Beitrag
    Zitat von "WastlJ"

    AFAIK there is no option via owncloud itself. BUT it is also possible via fail2ban.


    Which SVS is working on the plugin :)

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

  • fail2ban and similar solution have little problem - small posibilities OMV firewall webgui. It does not allow to define own chains and jump target.


    IPSET framework is also very useful - external scripts wrote into ipset, not into netfilter tables. And iptables loading (iptables-restore binary called internally from WEBGUI) not affect this rules.
    Ipset also very, very fast ... comparing to large netfilter tables.

  • If you are paranoid don't open the web-gui to the net, period. Use an OpenVPN plugin. Access your lan via that. Then if you still paranoid have the http access to the web-gui limited to the lan via 192.168.1.0/24 (source lan or source ip) in your firerwall rule. Don't limit the https access in this manner and you can access the web-gui via ssl while connected to your lan via openvpn, while not having port 443 open to the internet.


    Easy.

  • Zitat von "tekkbebe"

    If you are paranoid don't open the web-gui to the net, period. Use an OpenVPN plugin.


    yes ... install openvpn everywhere! You are insane? Many users need access (secure ...) from many devices. Windows, linux, android, ios, firefoxos ... media players, and so on. Most devices are in environment without root permissions (for example in employment).


    Password-only authorization is not very secure, if bruteforce attack is possible.


    If you don't see requirement of this feature, don't answer ... many others of us have this need. Period.

  • Zitat von "ludvik"

    yes ... install openvpn everywhere! You are insane? Many users need access (secure ...) from many devices. Windows, linux, android, ios, firefoxos ... media players, and so on. Most devices are in environment without root permissions (for example in employment).


    Password-only authorization is not very secure, if bruteforce attack is possible.


    If you don't see requirement of this feature, don't answer ... many others of us have this need. Period.


    ...so viel Wut. :evil: Ich mache mir Sorgen um dich.


    Windows, Linux, Android and IOS all have clients for OpenVPN. Any browser works through a VPN connection so I don't get what you mean by Firefox. If your workplace locks down it's computers and you cannot install a client why don't you just say so. Then maybe we help you find another solution.


    I suggest what I do because I know it is secure.


    PS- I use OpenVPN from/to my workplace.

Jetzt mitmachen!

Sie haben noch kein Benutzerkonto auf unserer Seite? Registrieren Sie sich kostenlos und nehmen Sie an unserer Community teil!