added: possibility to ban if a client tries to hijack the session cookie added: possibility to ban if a client did not send a session cookie renamed: ezc functions: login_cannot_login -> ipban_is_login_allowed_from_this_ip (and the return value was changed) login_when_available_login -> ipban_current_ip_expires_time added: config options: // after how many broken encoded cookie we should ban the current IP // default: 2 (value in the range <0 - 65535>) size_t broken_encoded_cookie_treshold; // after how many incorrect session identifiers (or session indices) we should ban the current IP // do not set this value too low, as people connecting from the same IP address (from behind a NAT) // would be banned if they have an old session cookie remembered in the browser // default: 128 (value in the range <0 - 65535>) size_t session_hijacking_treshold; // after how many times a client will be banned if it did not send a session cookie // default: 1000 (value in the range <0 - 65535>) size_t no_session_cookie_treshold; git-svn-id: svn://ttmath.org/publicrep/winix/trunk@995 e52654a7-88a9-db11-a3e9-0013d4bc506e
54 lines
1.3 KiB
HTML
54 lines
1.3 KiB
HTML
<div class="winix">
|
|
|
|
<h1>{ipban_header}</h1>
|
|
|
|
[if ipban_tab]
|
|
|
|
<table class="ipban_table">
|
|
|
|
<tr>
|
|
<th>{ipban_col_id}</th>
|
|
<th>{ipban_col_ip_address}</th>
|
|
<th>{ipban_col_login_failures}</th>
|
|
<th>{ipban_col_broken_cookie}</th>
|
|
<th>{ipban_session_hijacking}</th>
|
|
<th>{ipban_no_session_cookie}</th>
|
|
<th>{ipban_col_login_allowed}</th>
|
|
<th>{ipban_col_ban_level}</th>
|
|
<th>{ipban_col_active_flag}</th>
|
|
<th>{ipban_col_last_used}</th>
|
|
<th>{ipban_col_expires}</th>
|
|
<th>{ipban_col_remove}</th>
|
|
</tr>
|
|
|
|
[for ipban_tab]
|
|
|
|
<tr>
|
|
<td>[ipban_tab_id]</td>
|
|
<td>[ipban_tab_ip]</td>
|
|
<td>[ipban_tab_incorrect_login]</td>
|
|
<td>[ipban_tab_broken_encoded_cookie]</td>
|
|
<td>[ipban_tab_session_hijacking]</td>
|
|
<td>[ipban_tab_no_session_cookie]</td>
|
|
<td>[if ipban_tab_is_logging_allowed]{ipban_loggin_allowed}[else]{ipban_loggin_not_allowed}[end]</td>
|
|
<td>[ipban_tab_ban_level]</td>
|
|
<td>[if ipban_tab_has_active_flag]{ipban_has_active_flag}[end]</td>
|
|
<td>[ipban_tab_last_used]</td>
|
|
<td>[ipban_tab_expires]</td>
|
|
<td><a href="[doc_base_url][dir][if item_is][item_url]/[end]ipban/removeip:[ipban_tab_ip]">{ipban_remove_ip}</a></td>
|
|
</tr>
|
|
|
|
[end]
|
|
</table>
|
|
|
|
<p>
|
|
<a href="[doc_base_url][dir][if item_is][item_url]/[end]ipban/removeip:all">{ipban_remove_all_ip}</a>
|
|
</p>
|
|
|
|
[else]
|
|
<p>{ipban_ban_list_empty}</p>
|
|
[end]
|
|
|
|
</div>
|
|
|