1
0
forked from 0ad/0ad
0ad/source/lobby
Angen 16a91c37e9 Limit possibility of brute force attacks when guessing password
As suggested by elexis, 1a8de6d2b8 should get some protection against
brute force attacks on password.

This is supposed to prevent attackers from getting connection data by
guessing the password.

Each failed attempt increases the counter.
XmppClient on the server side checks for the users with certain number
of failed attempts, determined in CNetServer, and refuses to check the
password, answering with banned message.
So they cant guess again in given match. Effect of this block will
dissapear after new match is created.

Differential revision: D3467
Comments by: wraitii, Stan
Tested by: Stan, Freagarach
Ref: #5913

This was SVN commit r24794.
2021-01-26 20:20:48 +00:00
..
glooxwrapper Officially drop support for Visual Studio 2013, which stopped working after 3a839517ce, fixes #5379. 2020-01-12 20:04:22 +00:00
scripting Improve JS Exception handling. 2020-11-15 18:29:17 +00:00
Globals.cpp Fix building with --without-lobby. Fixes #2249. 2013-11-08 15:28:44 +00:00
IXmppClient.h Hide ip and port from users until they want to join, add optional password 2021-01-20 18:31:39 +00:00
StanzaExtensions.cpp Hide ip and port from users until they want to join, add optional password 2021-01-20 18:31:39 +00:00
StanzaExtensions.h Hide ip and port from users until they want to join, add optional password 2021-01-20 18:31:39 +00:00
XmppClient.cpp Limit possibility of brute force attacks when guessing password 2021-01-26 20:20:48 +00:00
XmppClient.h Hide ip and port from users until they want to join, add optional password 2021-01-20 18:31:39 +00:00