Linux 软件免费装

Login Security Solution

开发者 convissor
更新时间 2016年8月14日 01:19
捐献地址: 去捐款
PHP版本: 3.3 及以上
WordPress版本: 3.4.1

标签

cookie security login maintenance authentication users password lock ban brute force lockdown hack attack passwords brute force password strength strength strong strong passwords timeout auth idle

下载

0.18.0 0.26.0 0.6.1 0.0.4 0.1.0 0.10.0 0.11.0 0.12.0 0.13.0 0.14.0 0.15.0 0.16.0 0.17.0 0.19.0 0.2.1 0.20.0 0.20.1 0.20.2 0.21.0 0.22.0 0.23.0 0.24.0 0.25.0 0.27.0 0.28.0 0.28.1 0.29.0 0.3.0 0.30.0 0.4.0 0.5.0 0.6.0 0.7.0 0.8.0 0.9.0

详情介绍:

A simple way to lock down login security for multisite and regular WordPress installations. Improvements Over Similar WordPress Plugins For reference, the similar plugins include: Compatibility with Other Plugins Some plugins provide similar functionality. These overlaps can lead to conflicts during program execution. Please read the FAQ! Translations Why Strong, Unique Passwords Are Important Yeah, creating, storing/remembering, and using a different, strong password for each site you use is a hassle. But it is absolutely necessary. Password lists get stolen on a regular basis from big name sites (like Linkedin for example!). Criminals then have unlimited time to decode the passwords. In general, 50% of those passwords are so weak they get figured out in a matter of seconds. Plus there are computers on the Internet dedicated to pounding the sites with login attempts, hoping to get lucky. Many people use the same password for multiple sites. Once an attacker figures out your password on one site, they'll try it on your accounts at other sites. It gets ugly very fast. But don't despair! There are good, free tools that make doing the right thing a piece of cake. For example: KeePassX, KeePass, or 1Password Securing Your WordPress Site is Important You're probably thinking "There's nothing valuable on my website. No one will bother breaking into it." What you need to realize is that attackers are going after your visitors. They put stealth code on your website that pushes malware into your readers' browsers.
According to SophosLabs more than 30,000 websites are infected every day and 80% of those infected sites are legitimate. Eighty-five percent of all malware, including viruses, worms, spyware, adware and Trojans, comes from the web. Today, drive-by downloads have become the top web threat. -- Security Threat Report 2012
So if your site does get cracked, not only do you waste hours cleaning up, your reputation gets sullied, security software flags your site as dangerous, and worst of all, you've inadvertently helped infect the computers of your clients and friends. Oh, and if the attack involves malware, that malware has probably gotten itself into your computer.

安装:

  1. Before installing this plugin, read the FAQ!
  2. If your WP install is behind a proxy or load balancer, please be aware that this plugin uses the REMOTE_ADDR provided by the web server (as does WordPress' new comment functionality and the Akismet plugin). If you want our brute force tracking to work, we advise adjusting your wp-config.php file to manually set the REMOTE_ADDR to a data source appropriate for your environment. For example:
$_SERVER['REMOTE_ADDR'] = preg_replace('/^([^,]+).*$/', '\1', $_SERVER['HTTP_X_FORWARDED_FOR']); 1. Download the Login Security Solution zip file from WordPress' plugin site: http://wordpress.org/extend/plugins/login-security-solution/ 1. Unzip the file. 1. Our existing tests are very effective, catching all of the 2 million entries in the Dazzlepod password list. But if you need to block specific passwords that my tests miss, this plugin offers the ability to provide your own dictionary files. Add a file to the pw_dictionaries directory and place those passwords in it. One password per line. Please be aware that checking the password files is computationally expensive. The following script runs through each of the password files and weeds out passwords caught by the other tests: php utilities/reduce-dictionary-files.php 1. If your website has a large number of non-English-speaking users: Unit Tests A thorough set of unit tests are found in the tests directory. The plugin needs to be installed and activated before running the tests. To execute the tests, cd into this plugin's directory and call phpunit tests Please note that the tests make extensive use of database transactions. Many tests will be skipped if your wp_options and wp_usermeta tables are not using the InnoDB storage engine. Removal
  1. This plugin offers the ability to remove all of this plugin's settings from your database. Go to WordPress' "Plugins" admin interface and click the "Settings" link for this plugin. In the "Deactivate" entry, click the "Yes, delete the damn data" button and save the form.
  2. Use WordPress' "Plugins" admin interface to and click the "Deactivate" link.
  3. Remove the login-security-solution directory.

其他记录:

Inspiration and References To Do Source Code, Bugs, and Feature Requests Development of this plugin happens on GitHub. Releases are then squashed and pushed to WordPress' Plugins SVN repository. This division is necessary due having being chastized that "the Plugins SVN repository is a release system, not a development system." Please submit bug and feature requests, pull requests, wiki entries there. Old tickets are in the Plugins Trac.

常见问题:

Compatibility with Other Plugins

  • Better WP Security: Their "Enable Login Limits" and "Enable strong password enforcement" functionality conflict with our features. The good news is we provide more robust protection in those areas and the Better WP Security "Settings" page lets you disable those features in their plugin. This way you get to enjoy even better security than either plugin alone.

Why should I pick a user name other than "admin"?

The WordPress installation process (currently) defaults to having the main administrator's user's name be "admin." Many people don't change it. Attackers know this, so now all they need to do to get into such sites is guess the password. In addition, if you try to log in while your site is being attacked, this plugin will send you through the password reset process in order to verify your identity. While not the end of the world, it's inconvenient.

Where did the "Change All Passwords" interface go?

A link to the page is found in this plugin's entry in the "Plugins" admin interface:

  • Regular sites: Plugins
  • Sites using multisite networks: My Sites | Network Admin | Plugins

I just got hit with 500 failed logins! Why isn't this plugin working?!?

Let's turn the question around: "How long did it take to get in those 500 hits?" Chances are it took hours. (Six hours if they're attacking with one thread, 2 hours if they're coming at you with three threads, etc.) If this plugin wasn't working, they'd have pulled it off under a minute. Similarly, without the slowed responses this plugin provides, an attacker given six hours against your site could probably get in over 170,000 hits. Anyway, my real question for you is "Did they get in?" I'll bet not. The strong passwords this plugin requires from your users lowers the chances of someone breaking in to just about zero. And even if they do get in, Login Security Solution realizes they're miscreants and kicks them right out.

Why use slowdowns instead of lockouts?

The best way to go here is a subject open to debate. (Hey what isn't?) I chose the slowdown approach because it keeps legitimate users and administrators from being inconvenienced. Plus it provides a quick sand trap that ties up attackers' resources instead of immediately tipping them off that the jig is up.

Won't the slowdowns open my website to Denial of Service (DOS) attacks?

Yeah, the DOS potential is there. I mitigated it for the most part by disconnecting the database link (the most precious resource in most situations) before sleeping. But remember, distributed denial of service attacks are fairly easy to initiate these days. If someone really wants to shut down your site, they'll be able to do it without even touching this plugin's login failure process.

Where should I report bugs and feature requests?

Development of this plugin happens on GitHub. Please submit bug and feature requests, pull requests, wiki entries on our GitHub.

How do developers generate the translation files?

To update the POT file, do this:

To produce the machine readable translations used by WordPress' gettext implementation, use the scripts I made for generating all of the .po and .mo files:

更新日志:

0.30.0 (2012-09-17) 0.29.0 (2012-09-17) 0.28.1 (2012-09-15) 0.28.0 (2012-09-15) 0.27.0 (2012-09-04) 0.26.0 (2012-09-01) 0.25.0 (2012-08-30) 0.24.0 (2012-08-29) 0.23.0 (2012-08-24) 0.22.0 (2012-08-17) 0.21.0 (2012-08-07) 0.20.2 (2012-07-12) 0.20.1 (2012-07-12) 0.20.0 (2012-07-12) 0.19.0 (2012-07-11) 0.18.0 (2012-07-11) 0.17.0 (2012-07-09) 0.16.0 (2012-07-08) 0.15.0 (2012-07-06) 0.14.0 (2012-07-05) 0.13.0 (2012-07-01) 0.12.0 (2012-06-30) 0.11.0 (2012-06-28) 0.10.0 (2012-06-16) 0.9.0 (2012-06-16) 0.8.0 (2012-04-29) 0.7.0 (2012-04-25) 0.6.1 (2012-04-19) 0.6.0 (2012-04-18) 0.5.0 (2012-04-18) 0.4.0 (2012-04-17) 0.3.0 (2012-04-04) 0.2.1 (2012-04-03) 0.2.0 (2012-04-03) 0.1.0 (2012-03-26) 0.0.4 (2012-03-22) 0.0.3 0.0.2 0.0.1 (2012-03-19)