You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What steps will reproduce the problem?
Regardless of which authentication mechanism you implement, a user can attempt
to login and fail as many times as they like, leading the application's
authentication module open to brute force attacks.
What is the expected output? What do you see instead?
Would be nice to implement as either a core feature, or a wrapper
authentication plugin, the ability to lock out, or temporarily disable further
authentication attempts if a certain configurable (both time and attempt count
based) threshold has been reached. For example, keep a history of sequential
authentication failures, say after 5 failed attempts the account is locked out
and disabled. This could lead to denial-of-service attacks, where a brute
force attacker could intentionally disable all known usernames, especially the
default administrator account (although best practice would be to disable that
anyway after the initial user-based accounts with admin role are setup) and
render the application unusable. Because of this, maybe the lockout should be
time-based, and configurable, so it only disables the account for an hour, or
day, or permanently.
Original issue reported on code.google.com by joshdrum...@gmail.com on 9 Dec 2010 at 1:51
The text was updated successfully, but these errors were encountered:
Original issue reported on code.google.com by
joshdrum...@gmail.com
on 9 Dec 2010 at 1:51The text was updated successfully, but these errors were encountered: