@@ -121,22 +121,31 @@ Troubleshooting
121121Overview
122122~~~~~~~~
123123
124- On most setups Nextcloud will work out of the box without any issues. If you
125- run into a situation where logging in or connecting is often very slow for multiple users, the first
126- step is to check your Nextcloud Server logs to see what IP addresses are being detected (you may need
127- adjust your logging to INFO level temporarily to do so).
124+ On most setups Nextcloud will work out of the box without any issues. If you run into a situation where
125+ logging in or connecting is often very slow for multiple users, the first step is to check your Nextcloud
126+ Server logs to see what IP addresses are being detected (you will need to adjust your ``loglevel `` to ``1 ``
127+ temporarily to do so).
128+
129+ Look for entries that start with any of the following:
130+
131+ - `Bruteforce attempt from ` [...]
132+ - `IP address throttled ` [...]
133+ - `IP address blocked ` [...]
128134
129135If all clients appear to be coming from the same IP address and that IP address happens to be your
130- proxy, you need to review your ``trusted_proxies `` configuration. If it is a common connection point,
131- such as a multi-user office location, it is possible whitelisting is appropriate.
136+ proxy, you need to review your ``trusted_proxies `` configuration.
137+
138+ If the IP address is a common connection point, such as a multi-user office location, it can be an option to whitelist it,
139+ with the draw back that users have to be trust-worthy.
132140
133141For testing purposes you want want to whitelist your own IP address to see if the problem disappears.
134142If it does - and assuming your proxy configuration is correct - you may have a client/device in your
135143network that is misbehaving and generating invalid login attempts from your IP address.
136144
137- For detailed troubleshooting, you may wish to inspect the `bruteforce_attempts ` database table. There
138- you can see which IP addresses are throttled and any other metadata stored about their attempts to
139- connect.
145+ You can use the `occ security:bruteforce:attempts ` command to check the realtime status for a given IP address.
146+
147+ .. note :: The `bruteforce_attempts` database table will be empty if you're using a distributed memory
148+ cache since the database backend is no longer used unless it is the only option available.
140149
141150Excluding IP addresses from brute force protection
142151~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
0 commit comments