Open Annihilater opened 3 months ago
Perhaps this could be achieved by parsing some kind of log file with fail2ban
Ideally this is something you want to do by parsing the log file with fail2ban, then setting the ban on the reverse proxy level to stop the request as soon as possible.
Background
I have noticed an issue where my deployed website is experiencing repeated brute force attacks. Below are some log entries showing multiple failed login attempts from the same IP address:
Request
I propose the implementation of a feature that bans an IP address for 30 days after it fails to verify credentials 3 times within a 5-minute window. This feature would help prevent brute force attacks and improve the security of the website. Proposed Changes
Example Implementation
Here is an example of how the proposed feature could be implemented:
Benefits
Improved Security: This feature would help mitigate brute force attacks by automatically banning suspicious IP addresses. Flexibility: Administrators can manually add IPs to the ban list if they notice any suspicious activity.
Example JSON Configuration
Conclusion
Implementing this feature would significantly enhance the security of the website by preventing repeated brute force login attempts. Thank you for considering this request.
Given that this project is aimed at security, implementing a feature to prevent brute force attacks is essential.