Value in having failed passwords in log files
Posted: 2019-09-26 01:39
I have plain text SMTP authentication disabled, but of course that doesn't stop the bots from trying it. Every now and again I grep my logs for AUTH PLAIN and base64-decode the payload, just to see what the script kiddies are trying these days. Most of these attempts either use generic frequently-used passwords or else passwords gleaned from well-known data breaches.
Recently however I came across a repeated attempt to log in to my account with a specific, long string of random upper and lowercase letters, digits, and special characters. I use a password manager that creates random passwords for every site I use. Out of curiosity I searched my password manager and lo and behold, that string showed up as the password to an obscure forum. Since all my passwords are unique this could have only come from a data breach of this one specific forum. The forum administrators said they were unaware of a data breach, so this was news to them. Useful info!
Of course the vast majority of attacks use AUTH LOGIN, not AUTH PLAIN. Unfortunately the hMS log defaults to replacing the password with asterisks when an AUTH LOGIN is attempted.
Is there a way to record the password in the log, at least for failed login attempts? I understand that there's some security concerns with logging even failed attempts, but it seems like it would be a useful option (and, for that matter, both failed and successful AUTH PLAIN attempts are already getting logged).
Recently however I came across a repeated attempt to log in to my account with a specific, long string of random upper and lowercase letters, digits, and special characters. I use a password manager that creates random passwords for every site I use. Out of curiosity I searched my password manager and lo and behold, that string showed up as the password to an obscure forum. Since all my passwords are unique this could have only come from a data breach of this one specific forum. The forum administrators said they were unaware of a data breach, so this was news to them. Useful info!
Of course the vast majority of attacks use AUTH LOGIN, not AUTH PLAIN. Unfortunately the hMS log defaults to replacing the password with asterisks when an AUTH LOGIN is attempted.
Is there a way to record the password in the log, at least for failed login attempts? I understand that there's some security concerns with logging even failed attempts, but it seems like it would be a useful option (and, for that matter, both failed and successful AUTH PLAIN attempts are already getting logged).