Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Léo-Paul Géneau
gitlab-ce
Commits
3dbf83fe
Commit
3dbf83fe
authored
Nov 20, 2018
by
Illan RUL-DA CUNHA
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Precisions about the times specified in gitlab.rb for Rack Attack
parent
d179ffc2
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
6 additions
and
6 deletions
+6
-6
doc/security/rack_attack.md
doc/security/rack_attack.md
+6
-6
No files found.
doc/security/rack_attack.md
View file @
3dbf83fe
...
@@ -35,9 +35,9 @@ For more information on how to use these options check out
...
@@ -35,9 +35,9 @@ For more information on how to use these options check out
gitlab_rails['rack_attack_git_basic_auth'] = {
gitlab_rails['rack_attack_git_basic_auth'] = {
'enabled' => true,
'enabled' => true,
'ip_whitelist' => ["127.0.0.1"],
'ip_whitelist' => ["127.0.0.1"],
'maxretry' => 10,
'maxretry' => 10,
# Limit the number of Git HTTP authentication attempts per IP
'findtime' => 60,
'findtime' => 60,
# Reset the auth attempt counter per IP after 60 seconds
'bantime' => 3600
'bantime' => 3600
# Ban an IP for one hour (3600s) after too many auth attempts
}
}
```
```
...
@@ -55,9 +55,9 @@ The following settings can be configured:
...
@@ -55,9 +55,9 @@ The following settings can be configured:
-
`maxretry`
: The maximum amount of times a request can be made in the
-
`maxretry`
: The maximum amount of times a request can be made in the
specified time.
specified time.
-
`findtime`
: The maximum amount of time failed requests can count against an IP
-
`findtime`
: The maximum amount of time failed requests can count against an IP
before it's blacklisted.
before it's blacklisted
(in seconds)
.
-
`bantime`
: The total amount of time that a blacklisted IP will be blocked in
-
`bantime`
: The total amount of time that a blacklisted IP will be blocked
(
in
seconds.
seconds
)
.
**Installations from source**
**Installations from source**
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment