Hi,
Thank you for the prompt response.
The issue with 2FA it doesn’t stop attempt login attempts. The brute force feature is a must and works very well, but with thousands of IP addresses attempting daily, it does cause a lot of server-side requests.
Rate limiting is also a useful feature, but that’s on the assumption one particular IP address is attacking, and even with throttles, an attack of thousands of bots still adds up thousand of server-side requests.
Please do forward my suggestions. These particular bots often follow word lists and use the most common logins, such as Admin, administrator, Administrator, adminwp, Adminwp, admin1, Admin1, etc, and having to fill them in twice because they are case sensitive is time consuming, causes clutter etc. A simple admin* should be a feature to block all of those attempts, and ban that BOT before it even gets throttled, or brute force blocked.
Even with brute force attacks, using low numbers, and setting a low ban of 5 attempts with lockout, 1,000 ip addresses is 5,000 attacks.
I know you also have the feature where you can simply ban users that do not exist, problem with this it can be cumbersome for real users, and the idea of unblocking through the URL feature is something I don’t personally like.
Again, thanks for getting back to me, and hope the feedback team does consider allowing * wildcards, and option of applying ignore case sensitive on usernames when adding bad usernames.
Kind regards.
-
This reply was modified 2 years, 5 months ago by Bybe.