-
Notifications
You must be signed in to change notification settings - Fork 812
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Brute Force Protection: Do not log failed attempt logging on password validation failure #41941
base: add/account-protection
Are you sure you want to change the base?
Conversation
Are you an Automattician? Please test your changes on all WordPress.com environments to help mitigate accidental explosions.
Interested in more tips and information?
|
Thank you for your PR! When contributing to Jetpack, we have a few suggestions that can help us test and review your patch:
This comment will be updated as you work on your PR and make changes. If you think that some of those checks are not needed for your PR, please explain why you think so. Thanks for cooperation 🤖 The e2e test report can be found here. Please note that it can take a few minutes after the e2e tests checks are complete for the report to be available. Follow this PR Review Process:
Still unsure? Reach out in #jetpack-developers for guidance! |
Code Coverage SummaryCoverage changed in 6 files. Only the first 5 are listed here.
10 files are newly checked for coverage. Only the first 5 are listed here.
Full summary · PHP report · JS report Add label
I don't care about code coverage for this PR
|
Fixes #
Currently when password validation fails during the Account Protection login password detection flow, we throw a unique error, capture it in the
wp_login_failed
action and redirect accordingly. Just so happens BFP uses this same hook to log failed attempts and currently logs one every time password validation fails. It would take a significant number of failed validations over a short period of time to trigger a BFP block but it can be done. This PR addresses that possibility and ensures that when our particular error is thrown, we will not log that attempt as failed.Other information:
Jetpack product discussion
Does this pull request change what data or activity we track or use?
Testing instructions:
Brute_Force_Protection::log_failed_attempt()
with the new check this PR adds