官术网_书友最值得收藏!

Preventing brute-force password attacks

Amazingly enough, this is another topic that engenders a bit of controversy. I mean, nobody denies the wisdom of automatically locking out user accounts that are under attack. The controversial part concerns the number of failed login attempts that we should allow before locking the account.

Back in the stone age of computing, so long ago that I still had a full head of hair, the early Unix operating systems only allowed users to create a password with a maximum of eight lowercase letters. So in those days, it was possible for early man to brute-force someone else's password just by sitting down at the keyboard and typing in random passwords. That's when the philosophy started of having user accounts get locked out after only three failed login attempts. Nowadays, with strong passwords, or better yet, a strong passphrase, setting a lockout value of three failed login attempts will do three things:

  • It will unnecessarily frustrate users
  • It will cause extra work for help desk personnel
  • If an account really is under attack, it will lock the account before you've had a chance to gather information about the attacker

Setting the lockout value to something more realistic, like 100 failed login attempts, will still provide good security, while still giving you enough time to gather information about the attackers. Just as importantly, you won't cause undue frustration to users and help desk personnel.

Anyway, regardless of how many failed login attempts your employer allows you to allow, you'll still need to know how to set it all up. So, let's dig in.

主站蜘蛛池模板: 收藏| 广元市| 宜宾市| 杨浦区| 延吉市| 拜泉县| 永济市| 曲水县| 自贡市| 宝应县| 张家川| 贞丰县| 洛阳市| 东港市| 韶山市| 凉山| 上饶市| 西林县| 无为县| 云南省| 临漳县| 灌南县| 舞阳县| 新龙县| 青海省| 东城区| 海盐县| 富裕县| 晋中市| 丰原市| 油尖旺区| 介休市| 淮南市| 濮阳市| 和林格尔县| 石棉县| 乃东县| 自贡市| 肥城市| 新乡市| 云和县|