Does Radicale have any rate limiting for bots brute forcing credentials? #1800
Answered
by
pbiering
Darin755
asked this question in
Q&A server
-
|
I'm using a LDAP backend and I'm concerned that the bots might start hammering my server. |
Beta Was this translation helpful? Give feedback.
Answered by
pbiering
Jun 12, 2025
Replies: 1 comment 1 reply
-
|
since 3.4.0 an authentication cache is available which can be controlled by options: https://github.com/Kozea/Radicale/blob/master/DOCUMENTATION.md#cache_logins and add also an delay in case of failed auhtentication. But this only prevents single threaded DoS attacks, more sophisticated protection needs to be done outside, e.g. by using https://github.com/Kozea/Radicale/wiki/Fail2Ban-Setup |
Beta Was this translation helpful? Give feedback.
1 reply
Answer selected by
Darin755
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
since 3.4.0 an authentication cache is available which can be controlled by options: https://github.com/Kozea/Radicale/blob/master/DOCUMENTATION.md#cache_logins and add also an delay in case of failed auhtentication.
But this only prevents single threaded DoS attacks, more sophisticated protection needs to be done outside, e.g. by using https://github.com/Kozea/Radicale/wiki/Fail2Ban-Setup