On 15.02.23 17:51, Marc SCHAEFER wrote:
On Wed, Feb 15, 2023 at 05:43:12PM +0100, Jan Just Keijser wrote:
Having port 22 open on the internet is asking for bots & script kiddies to
try and break in, but usually fail2ban takes care of it quite nicely.

Yes, and I you can report to abuseipdb.com -- that's why my main server has
port 22 open (and there are a few measures that make succeeding
authentification unlikely -- the remaining risk is a zero-day on SSH itself).

This is where my default fw setup is getting its dynamic blocklists from, I mentioned that earlier. With the list I am using (around 64000 IP records) I am getting up to 2000 hits/24 hours.


On a sensitive machine, I use port knocking.

This is what I was talking about in an earlier post - port knocking to protect this instances would be implemented in multiple dimensions. Also I would not run a sshd at its default port exposed to the internet even if hidden :)

Also no user/pw auth, ssh certs for auth.


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to