Skip to content

Conversation

@LaurenceJJones
Copy link
Member

Description

  • Reduce bitwarden-bf capacity from 5 to 3 for faster detection
  • Add new crowdsecurity/bitwarden-slow-bf conditional scenario
    • Detects 3 failed logins over 2-30 minute intervals using MedianInterval helper
    • Catches attackers who deliberately slow their attempts to evade rate limiting
  • Add slow-bf scenario to bitwarden collection

Checklist

  • I have read the contributing guide
  • I have tested my changes locally
  • For new parsers or scenarios, tests have been added
  • I have run the hub linter and no issues were reported (see contributing guide)
  • Automated tests are passing
  • AI was used to generate any/all content of this PR

- Reduce bitwarden-bf capacity from 5 to 3 for faster detection
- Add new crowdsecurity/bitwarden-slow-bf conditional scenario
  - Detects 3 failed logins over 2-30 minute intervals using MedianInterval helper
  - Catches attackers who deliberately slow their attempts to evade rate limiting
- Add slow-bf scenario to bitwarden collection
…y change

- Add new test for crowdsecurity/bitwarden-slow-bf scenario
  - Tests 3 failed logins over 2-20 minute intervals
  - Verifies MedianInterval detection logic works correctly
- Update bitwarden-bf assertions for reduced capacity (5->3)
  - Now triggers after 3 failures instead of 5
- Remove upper bound from MedianInterval check (leakspeed naturally caps it)
- Keep lower bound at 2m (no slow-bf variant for bitwarden to overlap with)
- Update documentation to clarify leakspeed naturally caps maximum interval
- Regenerate test assertions
- All tests passing
Copy link
Contributor

@sabban sabban left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

- Restore original capacity of 5 in bitwarden-bf scenario
- Update documentation to reflect capacity 5
- Regenerate test assertions for capacity 5 behavior
@LaurenceJJones
Copy link
Member Author

lgtm

updated from the conversation we had this morning, @blotus can you check the slow variant, instead of creating our older leaky with higher capacity and leakspeed. using the median interval.

@LaurenceJJones LaurenceJJones changed the title bitwarden: improve bruteforce detection and add slow-bf scenario bitwarden: add slow-bf scenario using new time helpers Nov 5, 2025
- Update markdown to reference correct capacity 5 for standard bitwarden-bf
- Adjust timing description to ~100 seconds (5 failures × 20s leakspeed)
@LaurenceJJones LaurenceJJones marked this pull request as draft November 5, 2025 11:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants