-
Notifications
You must be signed in to change notification settings - Fork 2.5k
mosquitto cannot prevent brute force password attack #2076
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Firstly, a "password" in MQTT is up to 65535 bytes of data. So its up to you to set it to what you want, and then ensure you can enter the same data on the client. It is only brute forceable if you choose to use a weak password, as MQTT supports 2^524280 permutations of passwords, which is absolutely not brute forceable. If you are using 'weak' passwords, "mosquitto_passwd" has a (undocumented?) Thirdly if you are still worried about security, you should issue each client a client certificate. Mosquitto can be set to authenticate clients via certificates. |
OK,thank you very much. I'll think about it again. |
This isn't on my list of priorities right now, but I agree it would be useful. If you're interested in making it happen I can offer guidance. It might actually be well suited to being a plugin. |
fail2ban or similar could be used but the problem is that the disconnect log entry is missing client's IP address. |
To use fail2ban, the mosquitto log file entry needs some kind of unique connection identificator, to reliable detect attacker. More info at fail2ban/fail2ban#3427 What about adding IP address to disconnect line? Something as ` Dec 06 19:49:05: Client 192.168.0.100:39608 disconnected, not authorised. Thank you |
+1 |
This enables tools like fail2ban to work. Reference: fail2ban/fail2ban#3427 (comment) Closes: eclipse-mosquitto#2076
As we know, mosquitto cannot prevent brute force password attack. So I want to know whether wo have a plan to prevent brute force password attack. Wish you all well, thank you!
The text was updated successfully, but these errors were encountered: