!coeAONBrWyDJnYMbMi:nixos.org

NixOS System Operations

583 Members
About system administration for running NixOS systems in production. Declaratively manage your operations. | Room recommendations: #networking:nixos.org163 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
26 Feb 2025
@hexa:lossy.networkhexathe first thought would be fail2ban, maybe crowdsec20:20:26
@hexa:lossy.networkhexabut crowdsec is of course a bit weird 🙂 20:20:51
@hexa:lossy.networkhexaI don't want to trust a random community of people20:21:04
@hexa:lossy.networkhexaanother idea would of course be a bastion host20:22:11
@hexa:lossy.networkhexabut that would make accessing the host a bit more tedious, given ssh jumps etc.20:22:27
@dgrig:erethon.comdgrigIt's not foolproof, but changing the default port away from 22 helps with a lot of bots20:22:28
@hexa:lossy.networkhexaalso a valid choice20:24:05
@hexa:lossy.networkhexaso what happens is that due to too many connection requests ssh also sometimes drops my connect attempts20:25:54
@hexa:lossy.networkhexamildly annoying 🙂 20:26:06
@hexa:lossy.networkhexa

sshd[1969703]: error: beginning MaxStartups throttling

20:26:57
@hexa:lossy.networkhexadue to that20:26:58
@dgrig:erethon.comdgrigAll the things you mentioned help however. I personally change the ssh port, enable fail2ban and for a lot of hosts don't have ssh enabled over the internet since wireguard works good enough for me. Other people I know enable ssh only over tor hidden services, but I don't trust tor starting fast enough after a restart /shrug20:27:01

Show newer messages


Back to Room ListRoom Version: 10