Skip to content

Commit 0e3bc2b

Browse files
authored
Throttling disclaimer (#8403)
* Throttling disclaimer * Expand throttling disclaimer.
1 parent a53e523 commit 0e3bc2b

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

docs/api-guide/throttling.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ Multiple throttles can also be used if you want to impose both burst throttling
1919

2020
Throttles do not necessarily only refer to rate-limiting requests. For example a storage service might also need to throttle against bandwidth, and a paid data service might want to throttle against a certain number of a records being accessed.
2121

22+
**The application-level throttling that REST framework provides should not be considered a security measure or protection against brute forcing or denial-of-service attacks. Deliberately malicious actors will always be able to spoof IP origins, and application-level throttling is intended for implementing policies such as different business tiers and basic protections against service over-use.**
23+
2224
## How throttling is determined
2325

2426
As with permissions and authentication, throttling in REST framework is always defined as a list of classes.
@@ -79,7 +81,7 @@ Throttle classes set in this way will override any viewset level class settings.
7981
}
8082
return Response(content)
8183

82-
## How clients are identified
84+
## How clients are identified
8385

8486
The `X-Forwarded-For` HTTP header and `REMOTE_ADDR` WSGI variable are used to uniquely identify client IP addresses for throttling. If the `X-Forwarded-For` header is present then it will be used, otherwise the value of the `REMOTE_ADDR` variable from the WSGI environment will be used.
8587

0 commit comments

Comments
 (0)