2013-02-20 19:17:33 +04:00
|
|
|
<?php
|
|
|
|
/*
|
|
|
|
* This file is part of the Roundcube plugin: roundcube-defense.
|
|
|
|
*
|
|
|
|
* @author Steve Allison <roundcube-defense@nooblet.org>
|
|
|
|
*
|
|
|
|
* roundcube-defense is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* roundcube-defense is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with roundcube-defense. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2013-02-21 00:58:58 +04:00
|
|
|
/* Whitelist and blacklist (processed in that order)
|
|
|
|
* Whitelisted IPs will never be banned
|
|
|
|
* Blacklisted IPs will receive HTTP 403 Forbidden
|
|
|
|
* Example: array('10.0.0.1', '192.168.0.1/24', '172.16.0.0/12');
|
|
|
|
* To only allow access to whitelisted IPs, set blacklist to: array('0.0.0.0/0');
|
|
|
|
*/
|
2013-02-20 19:17:33 +04:00
|
|
|
$rcmail_config['defense_whitelist'] = array('127.0.0.1');
|
|
|
|
$rcmail_config['defense_blacklist'] = array();
|
2013-02-21 01:04:36 +04:00
|
|
|
|
|
|
|
|
2013-02-21 00:49:57 +04:00
|
|
|
/* IP is banned when there are <defense_fail_max> failed
|
|
|
|
* login attempts within <defense_fail_reset> seconds */
|
2013-02-21 01:04:36 +04:00
|
|
|
|
2013-02-21 00:49:57 +04:00
|
|
|
// Number of failed attempts until ban. Set to 0 to never ban (why would you do that?)
|
2013-02-20 19:17:33 +04:00
|
|
|
$rcmail_config['defense_fail_max'] = 5;
|
2013-02-21 01:04:36 +04:00
|
|
|
|
2013-02-20 19:17:33 +04:00
|
|
|
// Reset fail counter after this number of seconds
|
|
|
|
$rcmail_config['defense_fail_reset'] = 600;
|
2013-02-21 01:04:36 +04:00
|
|
|
|
2013-02-20 19:17:33 +04:00
|
|
|
// Default ban period
|
|
|
|
$rcmail_config['defense_ban_period'] = 120;
|
2013-02-21 01:04:36 +04:00
|
|
|
|
2013-02-21 01:20:42 +04:00
|
|
|
/* Ban with HTTP status
|
|
|
|
* If set to true: Banned IPs are treated as blacklisted, and will receive
|
|
|
|
* a HTTP 403 Forbidden response instead of a login screen
|
|
|
|
* If set to false (default): Banned IPs receive login screen with red warning
|
|
|
|
* showing duration of ban remaining */
|
|
|
|
$rcmail_config['defense_ban_httpstatus'] = false;
|
|
|
|
|
2013-02-21 00:49:57 +04:00
|
|
|
// Repeated offenders have their banperiod multiplied, set to 1 to not multiply
|
2013-02-20 19:17:33 +04:00
|
|
|
$rcmail_config['defense_repeat_multiplier'] = 4;
|
2013-02-21 01:04:36 +04:00
|
|
|
|
2013-02-20 19:17:33 +04:00
|
|
|
// Reset repeat offender count after this number of seconds or
|
|
|
|
// multiply last ban period by <defense_repeat_multiplier>, whichever is greater
|
|
|
|
|
2013-02-21 01:04:36 +04:00
|
|
|
$rcmail_config['defense_repeat_reset'] = 86400;
|
2013-02-20 19:17:33 +04:00
|
|
|
// Name of table in database
|
2013-02-21 00:49:57 +04:00
|
|
|
$rcmail_config['defense_db_table'] = 'defense';
|
2013-02-21 01:04:36 +04:00
|
|
|
|
2013-02-21 00:49:57 +04:00
|
|
|
// Expire database entries more than X days old. Set to 0 to never expire
|
|
|
|
$rcmail_config['defense_db_expire'] = 30;
|
2013-02-21 01:04:36 +04:00
|
|
|
|
2013-02-21 00:49:57 +04:00
|
|
|
// Log attempted passwords (could be insecure, disabled by default)
|
|
|
|
$rcmail_config['defense_log_pwd'] = false;
|
2013-02-20 19:17:33 +04:00
|
|
|
?>
|