%PDF- %PDF-
Direktori : /www/varak.net/nextcloud.varak.net/apps_old/apps/bruteforcesettings/appinfo/ |
Current File : //www/varak.net/nextcloud.varak.net/apps_old/apps/bruteforcesettings/appinfo/info.xml |
<?xml version="1.0"?> <info xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd"> <!-- SPDX-FileCopyrightText: 2016 Roeland Jago Douma <roeland@famdouma.nl> SPDX-License-Identifier: AGPL-3.0-or-later --> <id>bruteforcesettings</id> <name>Brute-force settings</name> <summary>Whitelist IPs</summary> <description><![CDATA[Brute-force protection is meant to protect Nextcloud servers from attempts to guess account passwords in various ways. Besides the obvious "*let's try a big list of commonly used passwords*" attack, it also makes it harder to use slightly more sophisticated attacks via the reset password form or trying to find app password tokens. If triggered, brute-force protection makes requests coming from an IP on a brute-force protected controller with the same API slower for a 24 hour period. With this app, the admin can exempt an IP address or range from this protection which can be useful for testing purposes or when there are false positives due to a lot of accounts on one IP address.]]></description> <version>3.0.0</version> <licence>agpl</licence> <author>Roeland Jago Douma</author> <namespace>BruteForceSettings</namespace> <category>security</category> <website>https://github.com/nextcloud/bruteforcesettings</website> <bugs>https://github.com/nextcloud/bruteforcesettings/issues</bugs> <repository type="git">https://github.com/nextcloud/bruteforcesettings.git</repository> <screenshot>https://raw.githubusercontent.com/nextcloud/bruteforcesettings/master/screenshots/1.png</screenshot> <dependencies> <nextcloud min-version="30" max-version="30" /> </dependencies> <settings> <admin>OCA\BruteForceSettings\Settings\IPWhitelist</admin> </settings> </info>