Skip to content

Commit 41c222e

Browse files
Merge pull request #11913 from nextcloud/fix/bfp-db-backend-and-log-examples
docs(security): remove db reference in bruteforce + add logs
2 parents 64bfd6e + b42199f commit 41c222e

File tree

1 file changed

+18
-9
lines changed

1 file changed

+18
-9
lines changed

admin_manual/configuration_server/bruteforce_configuration.rst

Lines changed: 18 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -121,22 +121,31 @@ Troubleshooting
121121
Overview
122122
~~~~~~~~
123123

124-
On most setups Nextcloud will work out of the box without any issues. If you
125-
run into a situation where logging in or connecting is often very slow for multiple users, the first
126-
step is to check your Nextcloud Server logs to see what IP addresses are being detected (you may need
127-
adjust your logging to INFO level temporarily to do so).
124+
On most setups Nextcloud will work out of the box without any issues. If you run into a situation where
125+
logging in or connecting is often very slow for multiple users, the first step is to check your Nextcloud
126+
Server logs to see what IP addresses are being detected (you will need to adjust your ``loglevel`` to ``1``
127+
temporarily to do so).
128+
129+
Look for entries that start with any of the following:
130+
131+
- `Bruteforce attempt from` [...]
132+
- `IP address throttled` [...]
133+
- `IP address blocked` [...]
128134

129135
If all clients appear to be coming from the same IP address and that IP address happens to be your
130-
proxy, you need to review your ``trusted_proxies`` configuration. If it is a common connection point,
131-
such as a multi-user office location, it is possible whitelisting is appropriate.
136+
proxy, you need to review your ``trusted_proxies`` configuration.
137+
138+
If the IP address is a common connection point, such as a multi-user office location, it can be an option to whitelist it,
139+
with the draw back that users have to be trust-worthy.
132140

133141
For testing purposes you want want to whitelist your own IP address to see if the problem disappears.
134142
If it does - and assuming your proxy configuration is correct - you may have a client/device in your
135143
network that is misbehaving and generating invalid login attempts from your IP address.
136144

137-
For detailed troubleshooting, you may wish to inspect the `bruteforce_attempts` database table. There
138-
you can see which IP addresses are throttled and any other metadata stored about their attempts to
139-
connect.
145+
You can use the `occ security:bruteforce:attempts` command to check the realtime status for a given IP address.
146+
147+
.. note:: The `bruteforce_attempts` database table will be empty if you're using a distributed memory
148+
cache since the database backend is no longer used unless it is the only option available.
140149

141150
Excluding IP addresses from brute force protection
142151
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

0 commit comments

Comments
 (0)