Skip to main content

Brute Force Protection

What

BeginningStarting within FileWave 16.3.0, FileWave Central and FileWave Anywhere include brute force protection is available for FileWavesign-in Central and FileWave Anywhere to reduce password-guessing and dictionary-attack risk.attempts.

When this protectionit is enabled, FileWaverepeated temporarilyfailed lockslogins aplace that user account afteron repeateda failedtemporary sign-inlockout attempts.timer. The lockout is username-based,tied to the username, not IP-based,the source IP address, and the delaytimer increases withafter additional failed attempts.

AIf one account is locked, other accounts are not affected unless they also hit the failed-attempt threshold. The lockout affects only the user account that triggered it. It does not lock out other users, and itclears automatically clears when the timer expires.

By default, the feature is enabled.

TheThis setting is configuredenabled by default. You can find it in FileWave Central > Preferences > General, and it applies to sign-in attempts for both Central and Anywhere.

When/Why

ThisLeave featurethis shouldenabled generallyin remainmost enabled.environments.

It ismatters especiallymost useful ifwhen FileWave Central or FileWave Anywhere can be reached from publicthe internet or otherwiseanother untrustednetwork networks,you includingdo thenot Internet.fully trust. In that kind of exposure,situation, it helpsslows protectdown accountspassword-guessing and dictionary attacks against repeated password-guessing, brute-force, and dictionary-styleexposed login attempts without requiring additional manual intervention.pages.

You may also seerun thisinto behaviorit during testing or troubleshooting if the wrong password is entered repeatedly.several Intimes. That usually means the protection is working as designed, not that case, the lockoutserver is expected behavior, not necessarily a system fault.broken.

WithDefault the default settingsvalues shown in FileWave 16.3.0:

  • Allowed failed attempts: 5
  • First lockout time: 60 seconds
  • Lockout increase factor: 2.00
  • Maximum lockout time: 900 seconds

ThatWith meansthose settings, the first lockout beginslasts at 1 minuteminute. byIf default and escalates with additional incorrect loginfailed attempts continue after that, the lockout time increases until it reaches the configured maximum.

If

Note:you Thedisable the feature can be disabled, but this is not recommended excepttemporarily for atroubleshooting, deliberate,turn temporaryit troubleshootingback need.on afterward.

How

Configure brute force protection

  1. Open FileWave Central.Central.
  2. Go to Preferences.Preferences.
  3. Stay onOn the General tab.
tab, Scrollscroll to the Brute Force Protection section. ConfirmReview or change the feature is enabled and review the configured values.settings. Click OK to save any changes.save.

Available options

The Brute Force Protection section includes the following settings:

  • Enabled

    • Turns brute force protection on or off.
    • DefaultEnabled by default in 16.3.0: enabled.0.
  • Allowed Failed Attempts

    • DefinesSets how many failed logins are allowed before a lockout begins.starts.
    • Value shown in the 16.3.0 UI example: 5.5.
  • First Lockout Time

    • DefinesSets the initiallength lockoutof duration.the first lockout.
    • Value shown in the 16.3.0 UI example: 60 seconds.seconds.
  • Lockout Increase Factor

    • Multiplies the lockout durationtime forafter repeatedlater failed attempts after the first lockout.attempts.
    • Value shown in the 16.3.0 UI example: 2.00.00.
  • Maximum Lockout Time

    • CapsSets the longest lockout durationtime that can be reached.
    • Value shown in the 16.3.0 UI example: 900 seconds.seconds.

FileWave Central Admin Preferences showing the Brute Force Protection settings

What users see when a lockout occurs

WhenAfter the failed-attempt threshold is exceeded,reached, the user sees a lockout message showing that the account has been locked duebecause toof too many unsuccessful sign-in attempts.

The dialogmessage also shows how long remains before the account will remain locked.unlocks. In the example below, the accounttimer unlocksis in 1 minute,minute, which matches the default first lockout time.

This lockout applies only toOnly that user account foris the duration of the timer.locked. Other users arecan notstill lockedsign outin unless they separately trigger their own failed-attempt threshold.lockout.

Example lockout dialog after repeated failed login attempts

  • Leave brutethe force protectionsetting enabled unless you have a specific, temporaryspecific reason to disablechange it.
  • If a usersomeone reports beinga lockedlockout, out, first confirmcheck whether that account had repeated failed password attempts occurred for that specific account.attempts.
  • Remember that thisthe lockout is aper per-user and timer-basedbased. lockout,It is not an IP-based lockout affecting all users.block.
  • If you change the defaults, documentrecord the new values so support and administrators know what to expect.
  • When testingtesting, loginkeep behavior,in accountmind for escalatingthat lockout delaystimes increase after repeated failures.

Digging Deeper

This feature is a straightforwardsmall hardening control,setting, but it mattersdoes becausereal itwork changes the default login behavior for both administrators and users after repeated failures.

Its main security value is simple: ifwhen a FileWave server is reachable over public networks,networks. thisIt adds afriction default control that makesto repeated login attempts materially harder and slowergives for an attacker. It should be described asyou a protectivesafer hardeningdefault feature, not as a guarantee that anon exposed system cannot be compromised.

For support and internal documentation, it helps to call out four things clearly:

    This is enabled by default sign-in 16.3.0. The lockout is per user and timer-based, not IP-based. The lockout starts at 1 minute with default settings. The delay escalates with additional failed attempts up to the configured maximum.

    Public error messaging behavior

    pages.

    Public-facing error messagingmessages isare designedalso handled carefully. During normal failed logins, the response does not to disclose whether an account existsexists. duringThe normal failed login handling.

    Theone exception is when the system reports an active lockout,lockout, because that state is intentionally account-tied to a specific by design.account.

    Audit logging

    Each failedFailed login attemptattempts and each lockout eventevents isare written to the server audit loglog. withEach detailsentry thatincludes canthe helpusername, administratorsthe investigate repeated login failures.

    Logged details include:

      username client typetype, the source IP address,address when available on a best-effort basisbasis, and the lockout expiry time time.

      Log file location:

      /usr/local/filewave/log/audit.log
      

      To monitorwatch the audit log in real time on the server:

      tail -f /usr/local/filewave/log/audit.log
      

      API

      If examplesyou

      Administratorswant can alsoto review or automatetest testingthe and configurationbehavior through the API, you can use the authentication endpoints.endpoints below.

      Set the lockout parameters:

      curl -s -X PUT \
        -H "Authorization: ${APPTOKEN}" \
        -H "Content-Type: application/json" \
        https://${HOSTNAME}:20445/auth/admin-lockout-params \
        -d '{"enabled":true,"threshold":6,"base":51,"multiplier":4,"maximum":900}'
      

      Test a login attempt:

      curl -s \
        -H "Content-Type: application/json" \
        https://${HOSTNAME}:20445/auth/login \
        -d '{"username":"fwadmin","password":"test"}'
      

      That keeps the article useful for admins configuring the setting, support teams responding to lockout questions, and anyone reviewing the security intent and operational behavior behind the feature.