Open Menu
AllLocalCommunitiesAbout
lotide
AllLocalCommunitiesAbout
Login

Handling malicious requests with fail2ban

⁨5⁩ ⁨likes⁩

Submitted ⁨⁨1⁩ ⁨week⁩ ago⁩ by ⁨cm0002@lemmy.world⁩ to ⁨cybersecurity@infosec.pub⁩

https://sergiocipriano.com/fail2ban.html

source

Comments

Sort:hotnewtop
  • Ajen@sh.itjust.works ⁨1⁩ ⁨week⁩ ago

    The thing about fail2ban is that it’s only affective against automated scans and script kiddies, and if you keep things updated and configured correctly then they aren’t a threat. Any adversary that can break encryption or exploit a zero day can also get around fail2ban.

    source
  • bacon_pdp@lemmy.world ⁨1⁩ ⁨week⁩ ago

    Port knocking or gtfo

    source
    • adminofoz@lemmy.cafe ⁨1⁩ ⁨week⁩ ago

      Fr tho why does no one do port knocking? I know its not a comprehensive solution but it’s a pretty cool component imo.

      source
      • Ajen@sh.itjust.works ⁨1⁩ ⁨week⁩ ago

        Port knocking is cool, but tunneling everything through ssh or a VPN (with strong keys, not passwords) is more secure.

        source
      • bacon_pdp@lemmy.world ⁨1⁩ ⁨week⁩ ago

        If you set it up wrong or the service fails to start; you’ll need to use a console to recover.

        Most people don’t even know about serial console servers

        jpaul.me/…/how-to-build-a-raspberry-pi-serial-con…

        source