Issues
- Admin Console Login allows Brute Force LoginJM-1014Resolved issue: JM-1014Daniel Henninger
- Multiple Connection in Http binding is failingJM-955Resolved issue: JM-955Alex Wenckus
- If HTTP Binding Wait Exceded Session Timeout Clients Would Be Disconnected PrematurelyJM-945Resolved issue: JM-945Alex Wenckus
- Fix NPE in server certificates pageJM-940Resolved issue: JM-940Gaston Dombiak
- Clicking on login link from setup can fail with 404JM-928Resolved issue: JM-928Gaston Dombiak
5 of 5
Admin Console Login allows Brute Force Login
Fixed
Description
Environment
Every Plataform
Details
Assignee
Daniel HenningerDaniel HenningerReporter
Thiago Rocha CamargoThiago Rocha CamargoOriginal estimate
Time tracking
No time logged1d remainingComponents
Fix versions
Priority
Major
Details
Details
Assignee
Daniel Henninger
Daniel HenningerReporter
Thiago Rocha Camargo
Thiago Rocha CamargoOriginal estimate
Time tracking
No time logged1d remaining
Components
Fix versions
Priority
Created March 26, 2007 at 10:20 PM
Updated August 26, 2008 at 3:50 AM
Resolved August 26, 2008 at 3:50 AM
Activity
Show:
LGApril 22, 2007 at 12:51 AM
Adding a random delay of 1-3 seconds is never a fault if the password is wrong before returning an error.
An option to limit the remote addresses (e.g. 10.0.0.0/24 or *.dialin.provider.com) would help a lot.
Thiago Rocha CamargoApril 21, 2007 at 12:00 AM
An day has 86400 seconds. A week 604800. I don't think that it's sufficient. In 3 months it's very easy to get in. I don't think admins change admin password every month. Or at least we MUST not trust in it.
This is a Best Pratices issue.
Johannes GrimmApril 20, 2007 at 9:31 PM
perhaps a simple delaying the error msg would sufficant ... so bruteforce takes really long .. (0.5 or 1 sec should be enough)
Openfire Admin Console allows brute force login.
It MUST implement some security verifications and listeners that monitors login attempts.
Limit login attempts per IP in a time period.
Limit login attempts in a time period.
Test Cases ( Optional )