Re: [tor-relays] SSH login attempts
> On Sep 4, 2018, at 9:06 AM, Ralph Seichter wrote: > > On 04.09.2018 14:44, Sean Brown wrote: > >> Using an obscure port only prevents attempts being logged, nothing >> else. > > I cannot agree with that. What an sshd logs is not determined by the > port number it is listening on, and the quantity of failed login > attempts across my servers is measurably lower when using a non-standard > port. > Ya, my mistake, I wasn’t clear. I don’t mean that sshd doesn’t log if it’s on a different port, I mean that only the worst bots won’t find it, cutting down on the amount of noise in the logs. If ssh is configured correctly (disable password, 2fa, keys etc.) password attempts are just noise. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] SSH login attempts
On Sep 4, 2018, at 8:40 AM, Natus wrote: > >> Use some tool like fail2ban and/or ssh key authentication. > > Also change the default port of your ssh endpoint (eg: ) > > Using an obscure port only prevents attempts being logged, nothing else. And if you’re going to use an alternate port, pick one under 1024. Make it so an attacker needs to be root before they replace your sshd process. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Relay bandwidth accounting
I just set up a new non-exit relay and in going through information to set up, I came across the T-shirt for contributing and in addition to running for 2 months it says "if you're not an exit but you average 500 KBytes/s traffic." What would be the best way to keep accounting of the traffic my relay is passing? I know of the metrics.torproject.org, is that all the project would need? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays