Skip to content

fix: brute force docs #161

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 21 commits into from
Feb 4, 2025
Merged

fix: brute force docs #161

merged 21 commits into from
Feb 4, 2025

Conversation

ohad-perets
Copy link
Contributor

@ohad-perets ohad-perets commented Feb 3, 2025

Proposed changes

Write a clear and concise description that helps reviewers understand the purpose and impact of your changes. Use the
following format:

Problem: Give a brief overview of the problem or feature being addressed.

Solution: Explain the approach you took to implement the solution, highlighting any significant design decisions or
considerations.

Testing: Describe any testing that you did.

Please focus on (optional): If you any specific areas where you would like reviewers to focus their attention or provide
specific feedback, add them here.

If this PR addresses an issue on GitHub, ensure that you link to it here:

Closes #ISSUE

Checklist

Before merging a pull request, run through this checklist and mark each as complete.

  • I have read the contributing guidelines
  • I have signed the F5 Contributor License Agreement (CLA)
  • I have ensured that documentation content adheres to the style guide
  • If the change involves potentially sensitive changes, I have assessed the possible impact
  • If applicable, I have added tests that prove my fix is effective or that my feature works
  • If applicable, I have checked that any relevant tests pass after adding my changes
  • I have updated any relevant documentation (README.md and CHANGELOG.md)
  • I have rebased my branch onto main
  • I will ensure my PR is targeting the main branch and pulling from my branch from my own fork

Potentially sensitive changes include anything involving code, personally identify information (PII), live URLs or significant amounts of new or revised documentation.

Please refer to our style guide for guidance about placeholder content.

Copy link

github-actions bot commented Feb 3, 2025

Deploy Preview will be available once build job completes!

Name Link
😎 Deploy Preview https://frontdoor-test-docs.nginx.com/previews/docs/161/

@ohad-perets ohad-perets marked this pull request as ready for review February 4, 2025 12:32
@ohad-perets ohad-perets requested a review from a team as a code owner February 4, 2025 12:32
@ohad-perets ohad-perets self-assigned this Feb 4, 2025
Copy link
Contributor

@ADubhlaoich ADubhlaoich left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM: I have some small formatting changes suggested. Happy to merge once accepted.

@ADubhlaoich ADubhlaoich merged commit 58bff0a into main Feb 4, 2025
6 checks passed
@ADubhlaoich ADubhlaoich deleted the brute_force_doc branch February 4, 2025 17:12
@@ -655,15 +655,43 @@ claims['address'] = "{ \"address\": { .... } }" # JSON structs can be accessed u

### Overview

Brute force attacks are attempts to break in to secured areas of a web application by trying exhaustive,
Brute force attacks are attempts to break in to secured areas of a web application by trying exhaustive,
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

in to --> into

with enforced brute force protection. When brute force patterns are detected,
the WAF policy considers it to be an attack if the failed logon rate increased significantly or
if failed logins reached a maximum threshold.
To prevent brute force attacks, NGINX App Protect WAF monitors IP addresses, usernames, and the number of failed login attempts beyond a maximum threshold.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"...and the number of failed login attempts per each one of them. Once the number of attempts crosses a configured maximum threshold, a brute force attack is assumed. (remove "beyond a maximum threshold").

if failed logins reached a maximum threshold.
To prevent brute force attacks, NGINX App Protect WAF monitors IP addresses, usernames, and the number of failed login attempts beyond a maximum threshold.
When brute force patterns are detected, the NGINX App Protect WAF policy either trigger an alarm or block the attack if the failed
login attempts reached a maximum threshold for a specific username or coming from a specific IP address.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Replace "When brute force patterns...IP address" with:
"The detected brute force attack will trigger an alarm, that is, a violation reported in the security logs and may also block any further attempt to login, coming from the IP address that exceeded the login attempt threshold. Note that if it was the username that crossed the threshold then it will not be possible to block because you would not like to lock the legitimate username owner out of his account".

### Brute force policy example

Example1: A single brute force configuration is applied universally to all login pages.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add: "If you configured more than one login page, then the attempts of the same source IP address or username across all the login pages are counted".

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants