some_guy@lemmy.sdf.org to Technology@lemmy.world · 8 months agoI use Zip Bombs to Protect my Serveridiallo.comexternal-linkmessage-square104linkfedilinkarrow-up1580arrow-down115file-text
arrow-up1565arrow-down1external-linkI use Zip Bombs to Protect my Serveridiallo.comsome_guy@lemmy.sdf.org to Technology@lemmy.world · 8 months agomessage-square104linkfedilinkfile-text
minus-squareWFloyd@lemmy.worldlinkfedilinkEnglisharrow-up4·8 months agoI’ve found great success using a hardened ssh config with a limited set of supported Cyphers/MACs/KexAlgorithms. Nothing ever gets far enough to even trigger fail2ban. Then of course it’s key only login from there.
I’ve found great success using a hardened ssh config with a limited set of supported
Cyphers/MACs/KexAlgorithms. Nothing ever gets far enough to even triggerfail2ban. Then of course it’s key only login from there.