New in Symfony 5.2: Login Throttling
Contributed by
Wouter De Jong
in #38204.
A common brute-force attack against web applications consists of an attacker submitting a login form many times with the hope of eventually guessing the password of some user account.
One of the best countermeasures to these attacks is called “login throttling”, which denies a user from attempting logins after a certain number of failed attempts. Thanks to the recently added RateLimiter component, Symfony 5.2 will provide login throttling out of the box.
First, make sure that you are using the new Authenticator-based Security. Then, add the following configuration to your firewall:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 | # config/packages/security.yaml
security:
firewalls:
default:
# by default, the feature allows 5 login attempts per minute
login_throttling: ~
# configuring the maximum login attempts (per minute)
login_throttling:
max_attempts: 1
# you can even use a custom rate limiter via its service ID
login_throttling:
limiter: app.my_login_rate_limiter
|
That’s all. Next time an attacker tries to make too many login attempts, your Symfony application will start blocking them.
As with any Open-Source project, contributing code or documentation is the most common way to help, but we also have a wide range of sponsoring opportunities.
New in Symfony 5.2: Login Throttling symfony.com/blog/new-in-symfony-5-2-login-throttling
Tweet thisComments
Comments are closed.
To ensure that comments stay relevant, they are closed for old posts.
Wesley Abbenhuis said on Oct 16, 2020 at 12:33 #1