[Discuss] PSA: no root login for SSH

2020-12-22 Thread Dale R. Worley
> From: Matthew Gillen > To: disc...@blu.org I use the rule that only "user" accounts, not accounts installed by the distribution or software packages can be logged in via ssh. That means that an effective attacker must know *something* about my particular setup to have any hope of logging in.

[Discuss] Fwd: [massmeshnet] Mass Mesh Tech Meeting tonight, 7-9pm (on-line)

2020-12-22 Thread Kurt L Keville
The weekly Mass Mesh tech meeting is tonight, 7-9pm. As you would expect with the COVID-19 pandemic still very active, we will be meeting online at: https://jitsi.massmesh.net/massmesh -- You may remember them from the times they spoke at BLU... They meet ev

[Discuss] Fail2Ban needs some help?

2020-12-22 Thread Greg Rundlett (freephile)
I recently noticed that the Fail2Ban project is almost dead. The homepage hasn't been updated since 2016 [1] But then I noticed that there *is* activity on GitHub, and there is actually a new major version out (with backward compatibility). Still, there are a large number of pull requests, and a la

Re: [Discuss] PSA: no root login for SSH

2020-12-22 Thread Rich Pieri
On Tue, 22 Dec 2020 09:40:31 -0500 Matthew Gillen wrote: > "username" "number of failed logins" > root 4328 Only ~4K root login attempts. My peak at LNS was around 20K before I deployed denyhosts and later fail2ban. > is why it can be a good idea to set the "PermitRootLogin no" option in > you

[Discuss] PSA: no root login for SSH

2020-12-22 Thread Matthew Gillen
Since we were talking about services globally accessible recently, just wanted to share a public service announcement. Below is a pretty typical /daily/ count of failed logins on a publicly accessible ssh server under my purview. Seeing as how root has 10 times the hits of the next biggest target