-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
I use ufw as my firewall and it's set to limit ssh so if there's someone brute forcing the ssh it will get blocked for a time
Sent with ProtonMail Secure Email.
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Sunday, April 7, 2019 7:54 PM, Elmar Otter mailer@elmarotter.eu wrote:
Hello,
Why don't you use Fail2Ban?
Greatings, Elmar
Op 07-04-19 om 21:52 schreef caioau:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Hi, I been running a relay for almost 1,5 year, and in the beginning I didn't change the default 22 ssh port but a lot of people were trying to login , no worries I only allow public key authentication.
So I was wondering if I could record the attacks, so I find this https://haas.nic.cz/ service and I'm running on my relay, is it a good idea?
Thanks
Sent with ProtonMail Secure Email. -----BEGIN PGP SIGNATURE----- Version: ProtonMail Comment: https://protonmail.com
wsBcBAEBCAAGBQJcqlUBAAoJEO6drAP5JZWbZ30H/i5UlyLceKIKB1osoA16 W0x2YZWoLw8Lvifxt0ijwQSLdzU5H1CTXxHoQJLpygESdGJMbBYiOGirRnWR nnlHqnbHHwUbZDUsxUBZTBrutwVaXXmswYyfrgZvJo17ocSaT2goaPJ0F9oK JHpzDegTOIE6hbwUI3BnDLI6u7/gCE1ZvgrzSbIvXebZ8XKC67j0AwhKMX0Q zUjLpXQ2eq5XLKPlOnXUc/i6xYCIoNjoBRSHX95hd2N4zy7xuZ3UhrVn0ZBi 7ZRjo77h7BeRsB3F9bA61DfgN9pM+J+R9sPU3qYClXPB/cOJmyVqVFtcT7NK 0Tz+mfbFNI8KfhN9ZHMS16Q= =FsLz -----END PGP SIGNATURE-----
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays@lists.torproject.org