Distributed detection of brute forcing of passwords
https://github.com/PowerDNS/weakforced
The goal of 'wforced' is to detect brute forcing of passwords across many
servers, services and instances. In order to support the real world, brute
force detection policy can be tailored to deal with "bulk, but legitimate"
users of your service, as well as botnet-wide slowscans of passwords.
The aim is to support the largest of installations, providing services to
hundreds of millions of users. The current version of weakforced is not quit
there yet.
-
1
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout server:mail/weakforced && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
build.patch | 0000000811 811 Bytes | |
local.usr.sbin.wforce | 0000000000 0 Bytes | |
optional-docker.patch | 0000001271 1.24 KB | |
regexes.yaml | 0000165757 162 KB | |
usr.sbin.wforce | 0000000392 392 Bytes | |
weakforced-1.4.4.tar.xz | 0000197880 193 KB | |
weakforced.changes | 0000006879 6.72 KB | |
weakforced.spec | 0000006038 5.9 KB | |
wforce-no-download.patch | 0000000968 968 Bytes |
Revision 13 (latest revision is 29)
Wolfgang Rosenauer (wrosenauer)
accepted
request 623091
from
Wolfgang Rosenauer (wrosenauer)
(revision 13)
- update to version 1.4.4 * Fixed a memory leak in the GeoIP lookupCity() Lua function. Each invocation of the function was leaking up to 200 bytes in the return information from the function, which could cause memory exhaustion over time, leading to a process restart.
Comments 0