You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
There doesn't seem to be a straightforward way to disable brute force protection, or at least is not that easy to find in the documentation.
Linux host 6.2.0-36-generic #37~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Mon Oct 9 15:34:04 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
KasmVNC Details
Provide the filename of the package you installed KasmVNC with. The filename includes important details like the OS, architecture, and commit sha.
Provide the output of this command.
Xvnc -version
Xvnc KasmVNC 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489 - built Mar 15 2024 09:25:50
Copyright (C) 1999-2018 KasmVNC Team and many others (see README.me)
See http://kasmweb.com for information on KasmVNC.
Underlying X server release 12008000, The X.Org Foundation
To Reproduce
Steps to reproduce the behavior (for non-installation issues):
Try to disable brute force protection.
Expected behavior
A specific configuration parameter to do so.
Additional context
A workaround I've seen is to set security.brute_force_protection.blacklist_threshold option to a high value in kasmvnc.yaml, but seems kind of hacky.
The text was updated successfully, but these errors were encountered:
Describe the bug
There doesn't seem to be a straightforward way to disable brute force protection, or at least is not that easy to find in the documentation.
System Description
cat /etc/os-release
outputuname -a
outputKasmVNC Details
Provide the filename of the package you installed KasmVNC with. The filename includes important details like the OS, architecture, and commit sha.
Provide the output of this command.
Xvnc -version Xvnc KasmVNC 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489 - built Mar 15 2024 09:25:50 Copyright (C) 1999-2018 KasmVNC Team and many others (see README.me) See http://kasmweb.com for information on KasmVNC. Underlying X server release 12008000, The X.Org Foundation
To Reproduce
Steps to reproduce the behavior (for non-installation issues):
Expected behavior
A specific configuration parameter to do so.
Additional context
A workaround I've seen is to set
security.brute_force_protection.blacklist_threshold
option to a high value inkasmvnc.yaml
, but seems kind of hacky.The text was updated successfully, but these errors were encountered: