diff --git a/interface/web/login/index.php b/interface/web/login/index.php index 5d0d5db9b8f0fe0411e2e19a7f5eb849ff74af6f..d72038d2f33f8bbe2aeb2685eea7266c74321815 100644 --- a/interface/web/login/index.php +++ b/interface/web/login/index.php @@ -175,7 +175,7 @@ function process_login_request(app $app, &$error, $conf, $module) if ($app->db->errorMessage != '') $error .= '<br />'.$app->db->errorMessage != ''; $app->plugin->raiseEvent('login_failed', $username); - $app->auth_log('Failed login for user \''. $username .'\ from '. $_SERVER['REMOTE_ADDR'] .' at '. date('Y-m-d H:i:s'); + $app->auth_log('Failed login for user \''. $username .'\ from '. $_SERVER['REMOTE_ADDR'] .' at '. date('Y-m-d H:i:s')); } } diff --git a/interface/web/login/otp.php b/interface/web/login/otp.php index d85eb7123ed7aa97f23bb4247c5b2238a2609abc..5d3e497a96b03f465653168bcfdd27ec50635895 100644 --- a/interface/web/login/otp.php +++ b/interface/web/login/otp.php @@ -94,7 +94,7 @@ if(isset($_POST['code']) && strlen($_POST['code']) == $otp_recovery_code_length //* Begin 2fa via Email if($_SESSION['otp']['type'] == 'email') { - + //* Email 2fa handler settings $max_code_resend = 3; $max_time = 600; // time in seconds until the code gets invalidated @@ -103,7 +103,7 @@ if($_SESSION['otp']['type'] == 'email') { if(isset($_POST['code']) && strlen($_POST['code']) == $code_length && isset($_SESSION['otp']['code'])) { if(strlen($_SESSION['otp']['code']) != $code_length) die(); // wrong code lenght, this should never happen - + $user = $app->db->queryOneRecord('SELECT otp_attempts FROM sys_user WHERE userid = ?',$_SESSION['s_pending']['user']['userid']); //* Check if we reached limits