12

I set up unRAID on my server this weekend, and only just checked my logs to see if anything weird was happening. Turns out 2 IPs have been trying to brute-force the SSH password all weekend. I quickly installed the DenyHosts plugin and reminded myself to always use a strong password, which luckily I did.

A bit later now, and one of the 2 gave up, the other one keeps trying but of course the connection is refused. Just keep trying buddy :P

Comments
  • 1
    Is a 2048 character password strong?
  • 7
    Password authentication is obsolete.
    Enroll your publickey instead.
    If you really really really need pass auth, add Googles 2FA PAM module to the mix and setup the user as proper sudoer. Nooo, User bla ALL NOPASSWD is not a proper use of sudo rights.
    Keep your privatekey safe stored and encrypted with a passphrase and you should be good to go.
    Bonus points for using a VPN to the host and make SSH listen there only.

    Also: Fail2Ban.
  • 0
    Fail2ban blocks 100-200 IP every day in My env
  • 0
    Yeah, like @Kimmax said disable password based auth on your servers. Lesser attack surface on the server. Use only SSH keys to login. And setup Fail2ban.
  • 0
    @Kimmax You are of course right, but since I hadn't used ssh myself at all I didn't think about that yet. Good to keep in mind though.

    Also fail2ban is practically the same as denyhosts right? (from what I've read)
  • 1
    @LucaScorpion
    Fail2ban is more flexible. You can for exemple set up automatic "complains", so fail2ban send a email to the abuse Contact of the IP range
Add Comment