this post was submitted on 17 Apr 2024
80 points (97.6% liked)

Cybersecurity

5626 readers
39 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] HubertManne@kbin.social 13 points 6 months ago (5 children)

I thought it was common practice to not allow logins for some period after like half a dozen failures.

[–] Darkassassin07@lemmy.ca 14 points 6 months ago (2 children)

There's a few ways to do it; but if they block based on username it can lockout legitimate users too.

This is what fail2ban is for. Too many failed auths from an IP and that whole IP is blacklisted for a day or two. This can still catchout vpn users, but it's still less disruptive.

[–] SemiAuto@sh.itjust.works 3 points 6 months ago

I went a bit overboard I think with my fail2ban configuration. If you fail 2 times to login in any admin interfaces (ssh, web, etc), you get banned for around 4880 days.. I have too many banned IPs already.. :/

load more comments (1 replies)
load more comments (3 replies)