Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adaptive allowance of failed attempts #76

Open
codeling opened this issue Mar 19, 2014 · 2 comments
Open

Adaptive allowance of failed attempts #76

codeling opened this issue Mar 19, 2014 · 2 comments
Assignees
Milestone

Comments

@codeling
Copy link
Owner

As elaborated a bit in this comment, one or more policies determining an adaptive number of allowed failed attempts might be useful against distributed brute force attacks.

@codeling
Copy link
Owner Author

Current Ideas for adapting the allowed numbers of failed logins include:

  • if IP is whitelisted for given user (whitelisted -> allow more attempts, see also white_list #24 (comment))
  • if geolocation of IP is close to that of the IP of the server (farther away -> allow less attempts)
  • if a common user name (e.g. 'admin') is used (common user name is used -> allow less attempts)
  • current overall amount of failed logins (e.g. in the last hour) (if more overall failed logins -> reduce number of attempts before blocking)
  • if IP does not resolve to a proper host name via nslookup, allow less atempts (block IP addresses that do not yield a host name by nslookup #103)

@codeling
Copy link
Owner Author

codeling commented Nov 3, 2021

This would more or less follow similar ideas as Risk-Based Authentication (RBA).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant