This interface allows you to configure cPHulk, a service that provides protection for your server against brute force attacks. A brute force attack is a hacking method that uses an automated system to guess the password to your web server or services.
When cPHulk blocks an IP address or account, it does not identify itself as the source of the block. Instead, the login page displays the following warning message: The login is invalid.
Important:
We strongly recommend that you add your own IP address or addresses to the whitelist to avoid a lockout of the root
user account.
Notes:
-
cPHulk does not affect public key authentication to the server. If cPHulk locks an account or all accounts out of the server, you may still use public keys and access hashes to authenticate to your server.
-
cPHulk does not consider multiple login attempts that use the same IP address, username, and password to be separate failures if they occur within the same six-hour period.
- To manage cPHulk from the command line, read our cPHulk Management on the Command Line documentation.
Enable cPHulk
If cPHulk is disabled on the server, this interface only displays an Off toggle. Click Off to move the toggle to On and enable cPHulk.
Note:
By default, your server sets the UseDNS
setting to enabled
in the /etc/ssh/sshd_config
file. The UseDNS
setting sends the hostname to the Password Authentication Module (PAM) for SSH session authentication. cPHulk also requests authentication information from PAM when it determines whether a login attempt is a brute force attack.
If an attacker spoofs a DNS pointer record to impersonate a trusted hostname, the UseDNS
setting and cPHulk’s whitelist will conflict. This allows the attacker to brute force attack the server with an unlimited number of login attempts. Therefore, the system disables the UseDNS
setting when you enable cPHulk.
Configure cPHulk
Configuration Settings
You can configure the following Configuration Settings options:
Setting
|
Description
|
Default
|
---|---|---|
Username-based Protection |
Whether to enable the username-based protection settings. Click the toggle to enable or disable the Username-based Protection setting. Username-based protection tracks login attempts for user accounts. When you disable cPHulk, existing account locks will remain. Note: You must click Save to implement any change to this setting. |
On |
Brute Force Protection Period (in minutes) |
The number of minutes during which cPHulk measures all login attempts on a specific user's account. If several attackers attempt to log in, and they reach the account's Maximum Failures by Account value within this period, cPHulk considers this to be a brute force attempt. cPHulk blocks logins from any IP addresses to that account, regardless of the attackers' IP address or addresses. |
5 |
Maximum Failures by Account |
The maximum number of failures that cPHulk allows per account within the Brute Force Protection Period (in minutes) time range.
|
15 |
Apply protection to local addresses only |
Whether to limit username-based protection to trigger only on requests that originate from the local system. This ensures that a user cannot brute force other accounts on the same server. | This setting defaults to selected. |
Apply protection to local and remote addresses | Whether to allow username-based protection to trigger for all requests, regardless of their origin. | This setting defaults to deselected. |
IP Address-based Protection |
Whether to enable the IP address-related protection settings. Click the toggle to enable or disable the IP Address-based Protection setting. IP address-based protection tracks login attempts from specific IP addresses. When you disable cPHulk existing account locks will remain. Note: You must click Save to implement any change to this setting. |
On |
IP Address-based Brute Force Protection Period (in minutes) |
The number of minutes during which cPHulk blocks an attacker's IP address. If attackers on a specific IP address attempt to log in repeatedly with different usernames or passwords, and they reach the Maximum Failures per IP Address value, cPHulk considers this to be a brute force attack.
|
15 |
Maximum Failures per IP Address |
The maximum number of times that a potential attacker at a specific IP address can fail to log in before cPHulk blocks that IP address. When you set this value to |
5 |
Command to Run When an IP Address Triggers Brute Force Protection |
The full path to a command that you want the system to run when an IP address triggers brute force protection. For a list of variables to use in this command, read the Command variables section below. |
(none) |
Block IP addresses at the firewall level if they trigger brute force protection |
Whether you wish to automatically add IP addresses that trigger brute force protection to the firewall. Notes:
|
This checkbox defaults to deselected. |
Maximum Failures per IP Address before the IP Address is Blocked for One Day | The maximum number of times that a potential attacker at a specific IP address can fail to log in before cPHulk blocks that IP address for a one-day period. | 30 |
Command to Run When an IP Address Triggers a One-Day Block |
The full path to a command that you want the system to run when the system blocks an IP address for a one-day period. For a list of variables to use in this command, read the Command variables section below. |
(none) |
Block IP addresses at the firewall level if they trigger a one-day block |
Whether you wish to automatically add IP addresses that trigger a one-day block to the firewall. This option writes a new Notes:
|
This checkbox defaults to selected. |
Duration for Retaining Failed Logins (in minutes) | The number of minutes that the system allows for an attacker to reach the Maximum Failures per IP Address setting. | 360 |
Send a notification upon successful root login when the IP address is not on the whitelist |
Whether you wish to receive a notification when the Note: The system only sends a notification once in any 24-hour window for a specific username, service, and IP address combination. |
This checkbox defaults to deselected. |
Send a notification upon successful root login when the IP address is not on the whitelist, but from a known netblock | Whether you wish to receive a notification when the root user successfully logs in from an IP address that is not on the whitelist, but is from a known netblock. |
This checkbox defaults to deselected. |
Send a notification when the system detects a brute force user | Whether you wish to receive a notification when cPHulk detects a brute force attack. | This checkbox defaults to selected. |
Note:
Click Save to save your settings.
Command variables
You can use the following variables in commands that you enter for the Command to Run When an IP Address Triggers Brute Force Protection andCommand to Run When an IP Address Triggers a One-Day Block settings:
Variable
|
Description
|
---|---|
%exptime% |
When cPHulk will release the ban. |
%max_allowed_failures% |
The maximum number of allowed failures to trigger cPHulk (excessive or non-excessive failures). |
%current_failures% |
The number of current failures. |
%excessive_failures% |
When the one-day block triggers, this boolean is true. |
%reason% |
The reason for the ban. |
%remote_ip% |
The IP address to ban. |
%authservice% |
The last service to request authentication (for example, webmaild ). |
%user% |
The last username to request authentication. |
%logintime% |
The time of the request. |
%ip_version% |
The IP version, either IPv4 or IPv6. |
Example behavior
The following table contains variables for different hacking scenarios, and cPHulk's response if you use the default settings:
Scenario | cPHulk's response | ||||
---|---|---|---|---|---|
Address | Account | Password | Attempts | Time range | |
192.168.0.1 |
username |
N/A | One. | N/A | No response. |
192.168.0.1 |
|
The same password each time. | Five or more. | Five minutes. | No response. |
192.168.0.1 |
|
Different passwords each time. | Five or more. | Five minutes. | Lock the username account for five minutes. |
192.168.0.1 |
|
Different passwords each time. | Five or more. | 20 minutes. | No response. |
192.168.0.1 |
|
Different passwords each time. | 10 or more. | 15 minutes. | Block 192.168.0.1 for 15 minutes. |
192.168.0.1 |
|
Different passwords each time. | 30 or more. | 10 minutes. | Block 192.168.0.1 for two weeks. |
Various | username |
N/A | Five or more. | Five minutes. | Lock the username account for five minutes. |
Various | Various | N/A | Five or more. | Five minutes. | No response. |
192.168.0.1 |
Various | N/A | Five or more. | Five minutes. | No response. |
192.168.0.1 |
Various | N/A | 10 or more. | Five minutes. | Block 192.168.0.1 for 15 minutes. |
192.168.0.1 |
Various | N/A | 30 or more. | Five minutes. | Block 192.168.0.1 for two weeks. |
Note:
The settings that you choose determine cPHulk's behavior in these scenarios.
Whitelist Management
The Whitelist Management options allow you to manage the IP addresses on your server's whitelist. The whitelist specifies IP addresses for which cPHulkalways allows logins to your server.
Important:
We strongly recommend that you add your own IP address to the whitelist to avoid lockouts of the root
account. cPHulk sends a notification if the whitelist does not include your IP address. Click Add to Whitelist in the notification to automatically add your IP address.
New Whitelist Records
To add IP addresses to cPHulk's whitelist, perform the following steps:
-
Enter one or more IP addresses, one per line, in the New Whitelist Records text box.
Note:
Enter IP addresses individually (IPv4 or IPv6) or in CIDR format.
- Enter any desired comments in the Comment text box. This comment will display for each of the IP addresses that you entered.
- Click Add.
Delete an IP address
To delete a single IP address from the whitelist, click Delete to the right of that IP address.
To delete multiple IP addresses from the whitelist, perform the following steps:
- Select the checkboxes to the left of each IP address that you wish to remove, or select the checkbox to the left of the IP Address heading to select them all.
-
Click the gear icon on the top right of the list and click Delete Selected.
To delete all of the IP addresses from the whitelist, you can also click the gear icon to the top right of the list and click Delete All.
Edit a comment
To modify an IP address's comment, perform the following steps:
- Click Edit to the right of that IP address. A Comment text box will appear to the left of the list.
- Enter the new comment in the Comment text box.
- Click Update to save your change, or Cancel to reject it.
Example behavior
The following table contains variables for different hacking scenarios, and cPHulk's response if you use the default settings:
Scenario | cPHulk's response | ||||
---|---|---|---|---|---|
Address | Account | Password | Attempts | Time range | |
192.168.0.1 |
username |
N/A | One. | N/A | No response. |
192.168.0.1 |
|
The same password each time. | Five or more. | Five minutes. | No response. |
192.168.0.1 |
|
Different passwords each time. | Five or more. | Five minutes. | Lock the username account for five minutes. |
192.168.0.1 |
|
Different passwords each time. | Five or more. | 20 minutes. | No response. |
192.168.0.1 |
|
Different passwords each time. | 10 or more. | 15 minutes. | Block 192.168.0.1 for 15 minutes. |
192.168.0.1 |
|
Different passwords each time. | 30 or more. | 10 minutes. | Block 192.168.0.1 for two weeks. |
Various | username |
N/A | Five or more. | Five minutes. | Lock the username account for five minutes. |
Various | Various | N/A | Five or more. | Five minutes. | No response. |
192.168.0.1 |
Various | N/A | Five or more. | Five minutes. | No response. |
192.168.0.1 |
Various | N/A | 10 or more. | Five minutes. | Block 192.168.0.1 for 15 minutes. |
192.168.0.1 |
Various | N/A | 30 or more. | Five minutes. | Block 192.168.0.1 for two weeks. |
Note:
The settings that you choose determine cPHulk's behavior in these scenarios.
Blacklist Management
The Blacklist Management options allow you to manage the IP addresses on your server's blacklist. The blacklist specifies IP addresses for which cPHulknever allows logins to your server.
New Blacklist Records
To add IP addresses to cPHulk's blacklist, perform the following steps:
-
Enter one or more IP addresses, one per line, in the New Blacklist Records text box.
Note:
Enter IP addresses individually (IPv4 or IPv6) or in CIDR format.
- Enter any desired comments in the Comment text box. This comment will display for each of the IP addresses that you entered.
- Click Add.
Delete an IP address
To delete a single IP address from the blacklist, click Delete to the right of that IP address.
To delete multiple IP addresses from the blacklist, perform the following steps:
- Select the checkboxes to the left of each IP address that you wish to remove, or select the checkbox to the left of the IP Address heading to select them all.
-
Click the gear icon on the top right of the list and click Delete Selected.
To delete all of the IP addresses from the blacklist, you can also click the gear icon to the top right of the list and click Delete All.
Edit a comment
To modify an IP address's comment, perform the following steps:
- Click Edit to the right of that IP address. A Comment text box will appear to the left of the list.
- Enter the new comment in the Comment text box.
- Click Update to save your change, or Cancel to reject it.
Example behavior
The following table contains variables for different hacking scenarios, and cPHulk's response if you use the default settings:
Scenario | cPHulk's response | ||||
---|---|---|---|---|---|
Address | Account | Password | Attempts | Time range | |
192.168.0.1 |
username |
N/A | One. | N/A | No response. |
192.168.0.1 |
|
The same password each time. | Five or more. | Five minutes. | No response. |
192.168.0.1 |
|
Different passwords each time. | Five or more. | Five minutes. | Lock the username account for five minutes. |
192.168.0.1 |
|
Different passwords each time. | Five or more. | 20 minutes. | No response. |
192.168.0.1 |
|
Different passwords each time. | 10 or more. | 15 minutes. | Block 192.168.0.1 for 15 minutes. |
192.168.0.1 |
|
Different passwords each time. | 30 or more. | 10 minutes. | Block 192.168.0.1 for two weeks. |
Various | username |
N/A |
Понудени резултати |