• Resolved organisator

    (@organisator)


    Hi,

    now and then I receive emails telling me, that users have been locked out from my website. Sometimes they name real user names, sometimes it is just a guess obviously.

    When I set up my website I chose a username for the admin which was not “admin” and is not easy to guess, so I am confident that I don′t have to worry about any login attempts with the username “admin”.

    But the attackers even found out my admin′s username and I keep getting emails which tell me that the admin was locked out. Luckily this never was the case, I was always able to log in to my website despite getting these emails.

    Apparently there are a lot of bots in internet doing nothing else than trying to login to any wordpress websites.

    In which cases can I just switch off these emails and in which cases should I continue getting and checking them?

    Thank you!

    The page I need help with: [log in to see the link]

Viewing 15 replies - 1 through 15 (of 15 total)
  • Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi, have you enabled any of the Brute Force features in the plugin?

    Thank you

    Thread Starter organisator

    (@organisator)

    Hi,

    not up to now.

    (Yesterday I blocked XML-RPC and still received three site lockout notifications. This is much better than the bursts of 20 or 30 which came in within a few minutes in some of the last days but maybe just happened by chance and not by blocking XML-RPC?).

    Now I activated the honeypot.

    If possible I would prefer to keep away from those features with which I might lock out myself by mistake. ??

    Thank you

    Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi,

    If possible I would prefer to keep away from those features with which I might lock out myself by mistake. ??

    Yes, I understand what you mean. However keep in mind that the Brute Force features are second to none when it comes to protecting your login form from brute force.

    Kind regards

    Thread Starter organisator

    (@organisator)

    Hi,

    to me it seems the features are arranged from left to right in descending order of danger of locking oneself out by mistake.

    So I activated Google reCaptcha for all three given options now.

    What about whitelisting?
    Where can I find out how to use this option?
    For example it is very unlikely that somebody outside of Europe might be interested in my website but it does not seem to be easy if possible at all to name all european IP-addresses?
    Additionally it seems to be possible for attackers to imitate any IP address they want?

    Which message does a real person get who tries to log in to a form with an IP address not whitelisted?

    Thank you very much!

    And one recommendation: To me it seems to be more intuitive to arrange the different dangerous options in AScending order from left to right as most people will start to check the options from the left.

    Thread Starter organisator

    (@organisator)

    Apparently I locked out myself by activating Google reCaptcha?

    When I try to log in with my admin username I get an error message “Mistake: Your answer was wrong – please try again”

    Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi,

    For example it is very unlikely that somebody outside of Europe might be interested in my website but it does not seem to be easy if possible at all to name all european IP-addresses?
    Additionally it seems to be possible for attackers to imitate any IP address they want?

    In that case you might be interested in the following addon country-blocking-addon.

    Kind regards

    Thread Starter organisator

    (@organisator)

    Apparently I locked out myself by activating Google reCaptcha?

    When I try to log in with my admin username I get an error message “Mistake: Your answer was wrong – please try again”

    How can I resolve this?

    Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi,

    When I try to log in with my admin username I get an error message “Mistake: Your answer was wrong – please try again”

    That means you are entering the captcha value incorrectly or captcha is not working correctly in your site.

    Try the following. FTP into your site and rename the plugin’s folder. Log into your site and while you are logged in, rename the plugin’s folder back to its original name. Then activate the plugin and check to make sure you can log in again without any errors. If you do receive a captcha error again, carry out the above steps again but this time disable the captcha option for your login form.

    Let me know how you go.

    Thank you

    Thread Starter organisator

    (@organisator)

    Hi,

    apparently the math captcha works, the Google reCaptcha is not working correctly:

    When I logged in to my webhoster I noticed an error message which said

    The deactivation of a wordpress plugin was unsuccessful. The “ultimate-member” plugin could not be found.

    From this error message page I had the possibility to deactivate any of my wordpress plugins so I deactivated AIO-WPS from this point instead of trying to use ftp (because I am not familiar with ftp). Then I was able to login the usual way (I was asked to confirm that the admin email address was still correct).

    From the wordpress dashboard I activated AIO-WPS, logged out, tried to log in and again received the error message

    Mistake: Your answer was wrong – please try again

    without having seen any hint of a captcha.

    Again I deactivated AIO-WPS from my webhosters control panel, logged in to wordpress, activated AIO-WPS, disabled Google reCaptcha and saved the settings. There was a question:

    Do you want that AIO-WP-S&F inserts those security rules again to your .htaccess-file which were erased when deactivating the plugin?

    I had to guess, my answer then was No.

    I logged out and was presented a login mask with a simple math captcha.

    Thank you very much for bringing me back to my wordpress dashboard! ??

    Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi, thank you for sharing that information. Is your issue resolved?

    Regards

    Thread Starter organisator

    (@organisator)

    Yes, I am able to log in to my WordPress Dashboard and did not receive any Site Lockout Notifications since yesterday.

    What About the Question

    Do you want that AIO-WP-S&F inserts those security rules again to your .htaccess-file which were erased when deactivating the plugin?

    Should I try to reach this again and answer it with “Yes”
    or
    may I leave it as it is?

    Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi,

    Do you want that AIO-WP-S&F inserts those security rules again to your .htaccess-file which were erased when deactivating the plugin?

    This option is available if you want to insert your previous settings after deactivating and reactivating the plugin. This is entirely up to you. Most users always say No to reinserting the previous settings. This is to prevent the previous issue from happening again.

    Regards

    Thread Starter organisator

    (@organisator)

    Thank you!

    Hi,
    Reading this post, I see a problem with the wrong robots.
    For that, I found a solution, initially given for Prestashop, by Webbax, but which I use in exactly the same way on WordPress, and it works of thunder.
    For this to work, you must have access to the site’s log files, in order to find the user agents of the bots. In Notepad ++ (for example), I look for the words “bot” or else “crawl” to find them. Then, I just add them in the code that I put you
    And it is acting directly at the level of the index.php file in order to act above all

    You must replace the entire index.php file with the content of the code I give you after (in fact, the code I put you contains all the code to put: that of Webbax + riginal code of the file “index.php “WordPress), that’s why you have to replace all the content. If you are afraid of making a mistake, first save your original index.php file.

    In production, at the root of the site, a “RobotsDebug.txt” file will be created which will list all the robot connections. Compared to the method of Webbax, I added a code allowing to recover in addition, the IP address of the robot, in order, possibly, to be able to make precise blockings of robots & hackers (even if they use proxy servers …)

    <?php
    /**
     * Front to the WordPress application. This file doesn't do anything, but loads
     * wp-blog-header.php which does and tells WordPress to load the theme.
     *
     * @package WordPress
     */
    
    /**
     * Tells WordPress to load the WordPress theme and output it.
     *
     * @var bool
     */
    
    /* Webbax - TUTO 69 - Sécurité antibots */
    $logs = true;
    if($logs){
        $filename = "robotsDEBUG.txt";
        $log_file = fopen($filename, "a+") or die("Unable to open file!");
    }
    
    $bad_bots = array('AhrefsBot','SEOkicks','SemrushBot','MJ12bot','YandexBot','istellabot','Seekport Crawler','MegaIndex','ZoominfoBot','Sogou web spider','CCBot','Go-http-client','SearchAtlas','SeznamBot','Nimbostratus-Bot','SEOkicks','AspiegelBot','serpstatbot','CATExplorador','MojeekBot','crawler4j','https://sar-pravo.ru/','https://avtolombard-voronezh.ru/','https://go.mail.ru/help/robots','VelenPublicWebCrawler','Specificfeeds','SiteLockSpider','Datanyze','Dataprovider','Pandalytics','rc-crawler','AlphaBot','google-xrawler','zgrab','alibaba');
    $user_agent = $_SERVER['HTTP_USER_AGENT']."\n";
    $ip = $_SERVER["REMOTE_ADDR"];
     if ($deep_detect) {
                if (filter_var(@$_SERVER['HTTP_X_FORWARDED_FOR'], FILTER_VALIDATE_IP))
                    $ip = $_SERVER['HTTP_X_FORWARDED_FOR'];
                if (filter_var(@$_SERVER['HTTP_CLIENT_IP'], FILTER_VALIDATE_IP))
                    $ip = $_SERVER['HTTP_CLIENT_IP'];
            }
            
    if($logs){
        fwrite($log_file,date('Y-m-d H:i:s').' - '.$user_agent. $ip.' - ');
        fclose($log_file);
    }
    
    foreach($bad_bots as $bad_bot){
        if(strpos($user_agent,$bad_bot)!==false){
            if($logs){
                $log_file = fopen($filename,"a+") or die("Unable to open file!");
                fwrite($log_file,date('Y-m-d H:i:s').' - '."BLOCKED : ".$bad_bot."\n");
                fclose($log_file);
            }
            die('blocked bot');
        }
    }
    /* --- */ 
    
    require(dirname(__FILE__).'/config/config.inc.php');
    Dispatcher::getInstance()->dispatch();
    

    In the code, there is the line $bad_bots = array('AhrefsBot','SEOkicks','SemrushBot','MJ12bot','YandexBot','istellabot','Seekport Crawler','MegaIndex','ZoominfoBot','Sogou web spider','CCBot','Go-http-client','SearchAtlas','SeznamBot','Nimbostratus-Bot','SEOkicks','AspiegelBot','serpstatbot','CATExplorador','MojeekBot','crawler4j','https://sar-pravo.ru/','https://avtolombard-voronezh.ru/','https://go.mail.ru/help/robots','VelenPublicWebCrawler','Specificfeeds','SiteLockSpider','Datanyze','Dataprovider','Pandalytics','rc-crawler','AlphaBot','google-xrawler','zgrab','alibaba');

    This is where the robots to be blocked are listed.
    When you have a robot to block, at the end of the last one – alibaba in my list – you only have to add a comma, then, the quotes of key 4, the name of the bot to block then close the quotes, which gives for example:, ‘bot’
    For example, if I wanted to add Google to the list of robots to block – but do not do that if you value your SEO – the code in this line would become:
    $bad_bots = array('AhrefsBot','SEOkicks','SemrushBot','MJ12bot','YandexBot','istellabot','Seekport Crawler','MegaIndex','ZoominfoBot','Sogou web spider','CCBot','Go-http-client','SearchAtlas','SeznamBot','Nimbostratus-Bot','SEOkicks','AspiegelBot','serpstatbot','CATExplorador','MojeekBot','crawler4j','https://sar-pravo.ru/','https://avtolombard-voronezh.ru/','https://go.mail.ru/help/robots','VelenPublicWebCrawler','Specificfeeds','SiteLockSpider','Datanyze','Dataprovider','Pandalytics','rc-crawler','AlphaBot','google-xrawler','zgrab','alibaba','google');

    Regularly monitor the RobotsDEBUG.txt file because it will quickly become huge (it all depends on the number of visitors to your site).
    Leave the file for example, over a week to see which bots are passing on your site in order to block it.
    In the robotsDEBUG.txt file, you will find lines like this:

    2020-04-20 01:24:49 - Mozilla/5.0 (compatible; YandexBot/3.0; +https://yandex.com/bots)
    2020-04-20 01:24:49 - BLOCKED : YandexBot

    At the bottom, the name of the blocked robot and above, the list of blockings of this robot.
    Add all the robots you want to block here.
    When you think you have them all, in the code in the index.php file, replace $logs=true; with $logs=false;. This will stop event logging and the robotsDEBUG.txt file will no longer grow.

    There are regular new bots, so re-enable the robotsDEBUG.txt file from time to time to find the new bots.
    As you see in the example that I use on one of my client sites, we can also block url directly (usually from Russia or China)

    Si vous voulez lire l’article et voir la vidéo (en Fran?ais – Suisse), je vous mets le lien.
    Ces explications seront plus claires que les miennes surement.
    Mais en tout ca, ca fonctionne parfaitement bien.

    If you want to read the article and see the video (in French – Switzerland), I put the link.
    These explanations will be clearer than mine surely (https://www.webbax.ch/2019/02/14/prestashop-1-7-boostez-hebergement-ep-69/)
    But in all of that, it works perfectly well (and don’t foreget : he explains for Prestashop, but it also works with WordPress).

    Yep, something else: once you have finished modifying your index.php file, save it because each time WordPress is updated, you will have to restore it since WordPress, when updating, remits its own index.php file.
    Well, I hope it will help some.

    Thread Starter organisator

    (@organisator)

    Hi jgd24,

    thank you very much for your comprehensive post!

    “once you have finished modifying your index.php file, save it because each time WordPress is updated, you will have to restore it since WordPress, when updating, remits its own index.php file.”

    If possible I would rather refrain from a method which forces me to think of it again each time.

    The Site Lockout Notifications are coming in again, so I need to change something.

    Maybe I will come back to your posting later.

    • This reply was modified 4 years, 7 months ago by organisator.
Viewing 15 replies - 1 through 15 (of 15 total)
  • The topic ‘Site Lockout Notifications’ is closed to new replies.