On Thu, Nov 15, 2012 at 1:32 AM, Lukasz Brodziak <lukasz.brodz...@gmail.com>wrote:
> 2012/11/15 Craig Ringer <cr...@2ndquadrant.com> > > Another option would be to monitor syslog or the csvlog and lock the > > user out by changing their password or revoking CONNECT rights if they > > trip the threshold. It wouldn't be as responsive to high-rate brute > > forcing attempts but your IDS should be handing those already. > > > > -- > > Craig Ringer http://www.2ndQuadrant.com/ > > PostgreSQL Development, 24x7 Support, Training & Services > > > > I wouldn't go with password change approach, at least not > automatically... > Or never. Locking users out invites denial-of-service attacks. All you have to do is figure out someone's username and you can lock them out of the system by deliberately failing login. A far better approach is an escalating delay. Check the number of failed login attempts N and delay (for example) N^2 seconds before responding again. Legitimate users are mildly inconvenienced, and hackers are severely hampered. Craig