🕵 Allow admins to configure the brute force settings
Перейти к файлу
Nextcloud bot b20a61026e
Fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2024-11-21 00:31:39 +00:00
.github
.tx
LICENSES
appinfo
js chore(assets): Recompile assets 2024-11-18 20:42:21 +00:00
l10n Fix(l10n): Update translations from Transifex 2024-11-21 00:31:39 +00:00
lib
screenshots
src
templates
tests
.eslintrc.js
.gitattributes
.gitignore
.l10nignore
.nextcloudignore
.php-cs-fixer.dist.php
CHANGELOG.md
LICENSE
README.md
REUSE.toml
babel.config.js
composer.json
composer.lock
krankerl.toml
package-lock.json Chore(deps-dev): Bump cross-spawn from 7.0.3 to 7.0.6 2024-11-18 22:37:58 +00:00
package.json Chore(deps): Bump @nextcloud/dialogs from 6.0.0 to 6.0.1 2024-11-18 20:35:32 +00:00
stylelint.config.js
webpack.js

README.md

💪 Nextcloud Brute Force Settings

REUSE status

This app makes it possible (via the Web UI) to view the status of a connection and modify certain parameters of the brute force protection built into Nextcloud Server.

Screenshot of configuration

Currently an admin can view the status of the IP address they are connecting from as well as specify IPv4 or IPv6 addresses and ranges to exempt from brute force protection.

Additional enhancements may be made in the future, within this app and/or in combination with Nextcloud Server for additional monitoring or behavior adjustments related to brute force protection.

[!TIP] Most nuisance triggering of brute force protection can be resolved through proper configuration of reverse proxies. In other cases, select IP addresses that need to be whitelisted can be configured within this app (while leaving brute force protection enabled). This can be useful for testing purposes or when there are a lot of people (or devices) connecting from a known, single IP address.

[!IMPORTANT] Disabling this app merely removes your ability to adjust brute force related settings - it does not disable brute force protection in Nextcloud Server itself. If that is your goal, you must set a special value in your Nextcloud config.php to disable brute force protection.

Background

Brute force protection is meant to protect Nextcloud servers from attempts to guess passwords and tokens in various ways. Besides the obvious "let's try a big list of commonly used passwords" attack, it also makes it harder to use slightly more sophisticated attacks via the reset password form or trying to find app password tokens.

If triggered, brute force protection makes requests - coming from an IP on a brute force protected controller - slower for up to a 24 hour period

Installation

Nextcloud 25 and newer

The app is shipped and comes with the installation of Nextcloud Server. No additional steps are necessary to install.

Nextcloud 24 and older

Old versions of this remain available through the app store. They can be installed through Nextcloud's app management UI.

[!NOTE] Newer versions of the app are not included in the app store since it is now a shipped app.

Releases and CHANGELOGs

As a shipped app:

  • changes are posted within the Nextcloud Server changelog.
  • releases are not posted in this GitHub repository, but they are tagged for code perusal.
  • it is automatically kept up-to-date with each Nextcloud Server release.

Usage

  • The user interface added by this app is found under Administration settings -> Security under the Brute-force IP whitelist heading.

How it works

This application merely manages some of the settings associated with brute force protection. To understand how that protection works, review the How it works section of Brute Porce Protection chapter in the Administration Manual.

Documentation

Help & Contributing

Keep in mind that the brute force protection implementation is primarily within Nextcloud Server itself so for some details it may be more appropriate to look there.