Brute Force Protection in Nauthilus
This document explains how brute force protection works in Nauthilus and provides detailed instructions on how administrators can free users from brute force protection when necessary.
How Brute Force Protection Works
Nauthilus implements brute force protection to prevent attackers from guessing user credentials through repeated login attempts. When a user fails to authenticate multiple times, Nauthilus will block further authentication attempts from the IP address that was used for these failed attempts.
The brute force protection system works as follows:
- Nauthilus tracks failed authentication attempts by IP address.
- When the number of failed attempts exceeds a configured threshold within a specified time period, the IP address is blocked.
- Blocked IP addresses are stored in Redis with information about which brute force rule triggered the block.
- User accounts that have been affected by brute force attempts are also tracked in Redis.
Adaptive Toleration (v1.7.7)
Starting with version 1.7.7, Nauthilus introduces an adaptive toleration mechanism that dynamically adjusts the tolerance threshold for failed authentication attempts based on the volume of successful authentications.