官术网_书友最值得收藏!

Preventing brute-force password attacks

Amazingly enough, this is another topic that engenders a bit of controversy. I mean, nobody denies the wisdom of automatically locking out user accounts that are under attack. The controversial part concerns the number of failed login attempts that we should allow before locking the account.

Back in the stone age of computing, so long ago that I still had a full head of hair, the early Unix operating systems only allowed users to create a password with a maximum of eight lowercase letters. So in those days, it was possible for early man to brute-force someone else's password just by sitting down at the keyboard and typing in random passwords. That's when the philosophy started of having user accounts get locked out after only three failed login attempts. Nowadays, with strong passwords, or better yet, a strong passphrase, setting a lockout value of three failed login attempts will do three things:

  • It will unnecessarily frustrate users
  • It will cause extra work for help desk personnel
  • If an account really is under attack, it will lock the account before you've had a chance to gather information about the attacker

Setting the lockout value to something more realistic, like 100 failed login attempts, will still provide good security, while still giving you enough time to gather information about the attackers. Just as importantly, you won't cause undue frustration to users and help desk personnel.

Anyway, regardless of how many failed login attempts your employer allows you to allow, you'll still need to know how to set it all up. So, let's dig in.

主站蜘蛛池模板: 措勤县| 胶南市| 镇坪县| 宁安市| 吕梁市| 广灵县| 黎川县| 龙胜| 夏津县| 保定市| 休宁县| 嘉义县| 恩平市| 衡水市| 丰顺县| 合水县| 含山县| 天等县| 津南区| 青浦区| 阳信县| 虞城县| 宁陕县| 尼勒克县| 东宁县| 小金县| 探索| 临漳县| 即墨市| 阳信县| 绥滨县| 长岭县| 中超| 凤冈县| 洪湖市| 山阴县| 武胜县| 临桂县| 厦门市| 镇安县| 华池县|