Skip to main content
Help us improve PyPI by participating in user testing. All experience levels needed!

UNKNOWN

Project description

A project that uses overrides the Django authentication function to track
failed login attempts on a per-user basis. Code is based on BruteBuster
(http://code.google.com/p/django-brutebuster/) but is simplified because of
the dropped requirement of tracking IP addresses. Django-Axes is another
source of inspiration (http://code.google.com/p/django-axes/).

Installation
1. Add failedloginblocker to your INSTALLED_APPS list in settings.py
2. Add failedloginblocker.middleware.FailedLoginBlockerMiddleware to
MIDDLEWARE_CLASSES in settings.py
3. Run 'python manage.py syncdb'
4. Restart your web server, if necessary.

Settings (set in settings.py if you want to override the defaults)
FLB_MAX_FAILURES - Number of failures to allow before blocking logins.
Default is set to 5.
FLB_BLOCK_INTERVAL - The interval from the last failed attempt to determine
whether the current login attempt is to count as a failure.
By default, decorators.py clears the failed logins if this interval
has expired.
Default is set to 1440 minutes (or 1 day).

Project details


Release history Release notifications

This version
History Node

1.0.1

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Filename, size & hash SHA256 hash help File type Python version Upload date
django-failedloginblocker-1.0.1.tar.gz (3.8 kB) Copy SHA256 hash SHA256 Source None Aug 16, 2013

Supported by

Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging CloudAMQP CloudAMQP RabbitMQ AWS AWS Cloud computing Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page