DescriptionGiven sufficient time and patience, an attacker could identify valid usernames by repeatedly trying to authenticate and seeing which usernames lead to his IP being banned.
The system currently only logs a failed attempt (and eventually blocks the IP) if the username is valid
Activity
2014-08-07 01:11:30
2014-08-07 01:11:39
2014-08-07 01:11:39
2014-08-07 01:11:45