From 8569619a05c68814b9415f5825e39b9c90ae8655 Mon Sep 17 00:00:00 2001 From: Kjeld Schouten-Lebbing Date: Wed, 29 Jan 2020 16:39:46 +0100 Subject: [PATCH] Updated Hardening Guide (WIP) (markdown) --- Hardening-Guide-(WIP).md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/Hardening-Guide-(WIP).md b/Hardening-Guide-(WIP).md index 7c28d45..9b7e05e 100644 --- a/Hardening-Guide-(WIP).md +++ b/Hardening-Guide-(WIP).md @@ -16,4 +16,6 @@ bitwarden_rs displays password hints on the login page to accommodate small/loca ## SMTP hardening -## Brute-force mitigation \ No newline at end of file +## Brute-force mitigation +When two-factor-authentication is not in use, it is (in theory) possible to brute-force user passwords and thus gain access to their account. One, relatively easy, way to mitigate this, is setting up fail2ban which blocks ipadresses after too many failed login attempts. However: Care should be taken when using this behind multiple reverse-proxies (such as cloudflare). +See: [[Fail2Ban Setup|Fail2Ban Setup]] \ No newline at end of file