Feature request on brute force on Magento

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • 2webmaster
    Senior Member
    Forum ExplorerTechnical AssociateSolutions Developer
    • Mar 2021
    • 101

    #1

    Feature request on brute force on Magento

    Hello,

    I just tested to brute force a Magento admin/downloader url, but was not blocked.
    We also have Comodo WAF, but either cwaf or Imunify did block the brute force attack.

    Could you please get a rule to block ip after 10 attempts within 2 minutes or something?

  • apb
    Senior Member
    • Feb 2018
    • 386

    #2
    1) Please check whether brute force testing is performed from the same IP you are connecting to WHM (as it is auto-whitelisted)
    2) Were any incidents added while you were brute force testing Magento?

    Comment

    • morten
      Senior Member
      • Aug 2017
      • 129

      #3
      1. I tried different IPs trough VPN and none of those had been listed on the server in anyway.
      2. No. I guess you dont have any rule for that yet.

      Comment

      • oshchukin
        Junior Member
        • Apr 2017
        • 25

        #4
        Hi Morten,

        I am sorry for turning back so late. We are working on adding the rule (internal task tracker id: DEFA-110) and will post the update 10/27/17, the latest.

        Comment

        • morten
          Senior Member
          • Aug 2017
          • 129

          #5
          Thanks Oleksiy!
          But I cannot see it yet and not in 2.6.1 either...

          Comment

          • oshchukin
            Junior Member
            • Apr 2017
            • 25

            #6
            Hi Morten,

            Our dev for task DEFA-110 is on sickleave thus I regret to inform that ETA for this task was shifted to 10/3/2017.

            We will keep you updated.

            Comment

            • morten
              Senior Member
              • Aug 2017
              • 129

              #7
              Any new update?

              Comment

              Working...