Rate Limiting

This feature is similar to that of websites that block login attempts for a “cooldown period” to prevent brute force attacks.

It applies to LDAP bind operations.

Example configuration:

1[behaviors]
2 LimitFailedBinds = true
3 NumberOfFailedBinds = 3
4 PeriodOfFailedBinds = 10
5 BlockFailedBindsFor = 60
6 PruneSourceTableEvery = 600
7 PruneSourcesOlderThan = 600
ConfigurationMeaning
LimitFailedBindsWhen enabled, rate limiting will apply after a number of failed authentication attempts
NumberOfFailedBindsNumber of consecutive failed auth attempts required to trigger rate limiting
PeriodOfFailedBindsWindow (in seconds) to detect failed auth attempts
BlockFailedBindsForNumber of seconds to block the source IP address
PruneSourceTableEvery(Housekeeping) clean up monitored IP addresses after this many seconds
PruneSourcesOlderThanClean up IP addresses last seen this many seconds ago
Copyright 2021