minus-squareWFloyd@lemmy.worldtoTechnology@lemmy.world•I use Zip Bombs to Protect my ServerlinkfedilinkEnglisharrow-up4·2 days agoI’ve found great success using a hardened ssh config with a limited set of supported Cyphers/MACs/KexAlgorithms. Nothing ever gets far enough to even trigger fail2ban. Then of course it’s key only login from there. linkfedilink
I’ve found great success using a hardened ssh config with a limited set of supported
Cyphers
/MACs
/KexAlgorithms
. Nothing ever gets far enough to even triggerfail2ban
. Then of course it’s key only login from there.