Your first line of defence against brute force attacks.
BFF is your first line of defence against brute force attacks. It has been designed with a focus on low resource usage and high concurrency. It’s open source and has simple APIs for several common languages.
The core of the system is a lightweight application that tracks repeated requests for usernames, passwords and any other type of data that can be tracked in a request (such as the attacker’s IP address). You’re notified anytime you receive a request that appears to be an attack. The actual algorithms used can be found in this paper published in the 8th IEEE International Conference on Privacy, Security and Trust.
It’s important to note that BFF only tells you which requests look like attacks and not what to do about it. For more information on how to deal with brute force attacks, see here.
BFF is designed to be as flexible as possible by imposing as few requirements as possible. Unless you compile from source, there are no dependencies to run BFF.
There are binaries available for download for 64-bit Linux, Mac OS X and Windows on the release page. For other operating systems or architectures, you’ll need to build from source.
To build BFF from source, you’ll need to have the Go compiler and GCC. Once you have those, simply run:
make DEST_DIR=/usr/local/bff
This will build the system and output the binaries to the /usr/local/bff
directory. It's also recommended that you add /usr/local/bff
to your PATH variable.
See the wiki.