Indeed.   I used to fail2ban ssh attempts from other than my home ip 'one' 
address.  I had over 100 countries hitting me, with the vast majority the 
usual APT countries we've all read about.   That said, geoip fencing is an 
inexact science and it's not that hard to make it look like a different 
source address.

I only let in US+CA+AU to my website due to too many attacks, by adding 
geoip fencing to nginx which is pretty easy to set up.   I also have a 
custom fail2ban to ban anybody trying to look for php/wordpress stuff as 
that's a big attack vector by the bots and script kiddies attacking 
websites.

I've locked myself out of my AWS box a couple times via messing up fail2ban 
blocks of ssh incoming, requiring me to just nuke+rebuild it, so I probably 
need another solution there.   Thinking of just permitting my LAN ip there 
once again, if I can come up with a second path in just-in-case.  Maybe 
I'll try WireGuard there and let my home box tunnel into the cloud VM.  
Maybe.  I'll have to think about it some more.

It's an arms race and it's tiring even needing to fight it...

-- 
You received this message because you are subscribed to the Google Groups 
"weewx-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to weewx-user+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/weewx-user/892d6384-4dba-44f7-9f06-cf84e3fcb08cn%40googlegroups.com.

Reply via email to