AWS Cognito用户池如何防御暴力破解攻击 [英] How AWS Cognito User Pool defends against bruteforce attacks

查看:165
本文介绍了AWS Cognito用户池如何防御暴力破解攻击的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我将使用AWS Cognito用户池产品作为应用程序的用户目录,并有几个问题:


  1. Amazon节流请求是否Cognito用户池,如果可以,则限制通话的速率限制是什么?

  2. Cognito如何防御登录/密码的暴力攻击?


解决方案

几个小时的搜索后,我在源代码中发现了这两个例外:


TooManyFailedAttemptsException当
用户对给定操作进行过多尝试失败(例如,登录
)时,将引发此异常。



HTTP状态码:400



TooManyRequestsException当用户让
对给定操作进行过多请求时,抛出此异常。 p>

HTTP状态码:400


此外,我尝试使用错误的登录名测试限制的凭据,我得到 N otAuthorizedException:尝试5次后超出密码尝试次数。



在类似情况下,我尝试强行忘记密码,但10次失败尝试我得到 LimitExceededException:尝试次数超出限制,请稍后再尝试。



我认为这是他们的工作方式


I am going to use AWS Cognito User Pool product as user directory for application and have several questions:

  1. Is Amazon throttle request to Cognito User Pool and if yes what is the rate limit of calls to get throttled?
  2. How Cognito defends against bruteforce attack on login/password?

解决方案

After couple of hours search I found this two exceptions in source code:

TooManyFailedAttemptsException This exception gets thrown when the user has made too many failed attempts for a given action (e.g., sign in).

HTTP Status Code: 400

TooManyRequestsException This exception gets thrown when the user has made too many requests for a given operation.

HTTP Status Code: 400

Also, I tried to log in with wrong credentials to test limits, I get NotAuthorizedException: Password attempts exceeded exception after 5. attempt.

In a similar scenario, I tried to brute force to forgot password but after 10 failed attempt I got LimitExceededException: Attempt limit exceeded, please try after some time.

I think that is how they do it.

这篇关于AWS Cognito用户池如何防御暴力破解攻击的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆