#5775 - Review behaviour of brute force logins with IP address
| Identifier | #5775 |
|---|---|
| Issue type | Feature request or suggestion |
| Title | Review behaviour of brute force logins with IP address |
| Status | Open |
| Tags |
Roadmap: Over the horizon (custom) Type: Security (custom) |
| Handling member | Deleted |
| Addon | core_cns |
| Description | The current behaviour with failed logins is that brute force compares to exact IP address. Is this secure enough? Perhaps we should compare to the first three(six) parts instead so it is more tolerant of botnets trying to target a specific user account. Or, do away with IP checking completely. |
| Steps to reproduce | |
| Additional information | The current set-up allows an army of botnets on different IP addresses (especially IPv6) to mass-attempt logging in to a user's account. While still very difficult to do if the user has a good password and brute force security is strong (likely to run out of IPs from brute force banning before a success happens), I think we can do better than comparing full IP address on every attempt. |
| Funded? | No |
The system will post a comment when this issue is modified (e.g., status changes). To be notified of this, click "Enable comment notifications".


Comments