How to size buckets for slow ssh invalid user attempts

I have bots trying to slowly ssh as different invalid users. I'd like to get these banned. I have a out the box install with /etc/crowdsec/scenarios/ssh-slow-bf.yaml having a leaky bucket set to leakspeed: 60s capacity: 10 blackhole: 1m this seems to miss the attempt (sample attached)
2 Replies
CrowdSec
CrowdSec4w ago
Important Information
Thank you for getting in touch with your support request. To expedite a swift resolution, could you kindly provide the following information? Rest assured, we will respond promptly, and we greatly appreciate your patience. While you wait, please check the links below to see if this issue has been previously addressed. If you have managed to resolve it, please use run the command /resolve or press the green resolve button below.
Log Files
If you possess any log files that you believe could be beneficial, please include them at this time. By default, CrowdSec logs to /var/log/, where you will discover a corresponding log file for each component.
Guide Followed (CrowdSec Official)
If you have diligently followed one of our guides and hit a roadblock, please share the guide with us. This will help us assess if any adjustments are necessary to assist you further.
Screenshots
Please forward any screenshots depicting errors you encounter. Your visuals will provide us with a clear view of the issues you are facing.
© Created By WhyAydan for CrowdSec ❤️
Loz
Loz4w ago
Take a look at my pending changes to introduce a time-based variant which should detect really slow brute force https://github.com/crowdsecurity/hub/pull/1566
GitHub
ssh: improve bruteforce detection and add time-based-bf scenario by...
Description Reduce ssh-bf capacity from 5 to 3 for faster detection Reduce ssh-slow-bf capacity from 10 to 5 to reduce overlap Add new crowdsecurity/ssh-time-based-bf conditional scenario Detects...

Did you find this page helpful?