Skip to main content

UNKNOWN

Project description

A project that uses overrides the Django authentication function to track
failed login attempts on a per-user basis. Code is based on BruteBuster
(http://code.google.com/p/django-brutebuster/) but is simplified because of
the dropped requirement of tracking IP addresses. Django-Axes is another
source of inspiration (http://code.google.com/p/django-axes/).

Installation
1. Add failedloginblocker to your INSTALLED_APPS list in settings.py
2. Add failedloginblocker.middleware.FailedLoginBlockerMiddleware to
MIDDLEWARE_CLASSES in settings.py
3. Run 'python manage.py syncdb'
4. Restart your web server, if necessary.

Settings (set in settings.py if you want to override the defaults)
FLB_MAX_FAILURES - Number of failures to allow before blocking logins.
Default is set to 5.
FLB_BLOCK_INTERVAL - The interval from the last failed attempt to determine
whether the current login attempt is to count as a failure.
By default, decorators.py clears the failed logins if this interval
has expired.
Default is set to 1440 minutes (or 1 day).

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django-failedloginblocker-1.0.1.tar.gz (3.8 kB view details)

Uploaded Source

File details

Details for the file django-failedloginblocker-1.0.1.tar.gz.

File metadata

File hashes

Hashes for django-failedloginblocker-1.0.1.tar.gz
Algorithm Hash digest
SHA256 81200443a2f089941626c566add445b1dc9b5bf3642827972d6f62bc1288f18d
MD5 63a5ffb0e12bfa7be18df3d034d3b666
BLAKE2b-256 07cfdbbc43de67d6eca039d7a2694ac4262b2f7e5afe3d1597e2bc7af44129aa

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page