Forum Moderators: phranque
# Joomla Brute Force Protection
<LocationMatch "/administrator/index.php">
SecAction phase:1,nolog,pass,initcol:ip=%{REMOTE_ADDR},initcol:user=%{REMOTE_ADDR},id:00113
SecRule user:bf_block "@gt 0" "deny,status:403,log,id:00114,msg:'IP address blocked for 5 minutes. More than 3 Joomla POST requests within 10 seconds.'"
SecRule REQUEST_METHOD "^POST$" "phase:5,chain,t:none,nolog,pass,setvar:ip.bf_counter=+1,deprecatevar:ip.bf_counter=1/10,id:00115"
SecRule ip:bf_counter "@gt 3" "t:none,setvar:user.bf_block=1,expirevar:user.bf_block=300,setvar:ip.bf_counter=0"
</LocationMatch> /administrator/index.php?option=com_akeeba&view=backup&task=ajax since there are many legitimate operations inside the administrator area that create many requests
I've also tried <location> instead of <locationmatch> but it made no difference.
Under what circumstances would there be even one legitimate external request for /administrator/index.php, with or without query?
it's the login page to Joomla
This is basic Apache stuff, and basic regular expression stuff. Anyone that knows about Apache (or about regular expressions) should be able to answer my question.