Skip to content

A project that uses overrides the Django authentication function to track failed login attempts on a per-user basis. Will block user access after a specified number of failed logins is reached.

License

Notifications You must be signed in to change notification settings

drewvolpe/django-failedloginblocker

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

A project that uses overrides the Django authentication function to track
failed login attempts on a per-user basis.  Code is based on BruteBuster
(http://code.google.com/p/django-brutebuster/) but is simplified because of
the dropped requirement of tracking IP addresses.  Django-Axes is another
source of inspiration (http://code.google.com/p/django-axes/).

Installation
  1. Add failedloginblocker to your INSTALLED_APPS list in settings.py
  2. Run 'python manage.py syncdb'
  3. Restart your web server, if necessary.
 
Settings (set in settings.py if you want to override the defaults)
  FLB_MAX_FAILURES - Number of failures to allow before blocking logins.
      Default is set to 5.
  FLB_BLOCK_INTERVAL - The interval from the last failed attempt to determine 
      whether the current login attempt is to count as a failure.  
      By default, decorators.py clears the failed logins if this interval 
      has expired.
      Default is set to 1440 minutes (or 1 day). 
  

About

A project that uses overrides the Django authentication function to track failed login attempts on a per-user basis. Will block user access after a specified number of failed logins is reached.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages

  • Python 100.0%