Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create a brute force login protection module set #94

Open
jasonmunro opened this issue Jun 28, 2016 · 8 comments
Open

Create a brute force login protection module set #94

jasonmunro opened this issue Jun 28, 2016 · 8 comments
Assignees
Labels
enhancement suggest an improvement new module set requires a new module set Security security related

Comments

@jasonmunro
Copy link
Member

lots of great ideas on this here:
https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks

@jasonmunro jasonmunro added the enhancement suggest an improvement label Jun 28, 2016
@jasonmunro jasonmunro self-assigned this Jun 28, 2016
@jasonmunro jasonmunro added the new module set requires a new module set label Sep 25, 2018
@marclaporte marclaporte assigned Danelif and unassigned jasonmunro May 7, 2024
@marclaporte
Copy link
Member

@Danelif please advise.

@marclaporte marclaporte added the Security security related label May 7, 2024
@Danelif
Copy link
Member

Danelif commented May 7, 2024

Alright

@Danelif
Copy link
Member

Danelif commented May 7, 2024

I have read this article carefully https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks and found it very relevant. But some techniques are not included in it.
If we want to create brute-force login protection, consider including the (2-3) FA technique (2-3 Factor Authentication). The user might provide a unique OTP sent to his email address or mobile phone once the username/password is correct.
Also, The limitation of attempting to log in can be considered from a single IP address. If the limit is reached we can suggest the user to recover it password by emailing an OTP to the email in our database.

@marclaporte
Copy link
Member

@Danelif Thank you, please look at how it is done in Tiki to get some more good ideas.

@Danelif
Copy link
Member

Danelif commented May 16, 2024

@marclaporte In tiki 2FA is done using Google2FA php library. Good idea indeed. Instead of using OTP, in Tiki, we use TOTP. But the only problem is that there is not much documentation and usage I wonder why?

@marclaporte
Copy link
Member

Some docs:

TOTP uses time, so the code changes every 30 seconds.

@Danelif
Copy link
Member

Danelif commented Jul 10, 2024

@marclaporte I have seen how 2FA works in tiki. It could be great to to the same in cypht

@marclaporte
Copy link
Member

ok, please proceed as a medium priority. High priority is fixing bugs before adding new features.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement suggest an improvement new module set requires a new module set Security security related
Projects
None yet
Development

No branches or pull requests

3 participants