[Catalyst] Rate limiting password attacks

Carl Johnstone catalyst at fadetoblack.me.uk
Fri Aug 17 17:18:30 GMT 2007


>    Also considered issuing a redirect to a simple server that will delay
>    the number of failed attempts seconds before redirecting back to the
>    login page. Any smart attacker would get clued about this an not
>    follow that redirect.  Fun anyways, though. ;)

As I just said in the other email, you could use perlbal and not send the 
redirect directly to the client - but to your perlbal proxy, which then 
requests a delay from your stripped http server, which then sends the real 
response.

Carl




More information about the Catalyst mailing list