[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] SSH login attempts
Hello Marcus,
On an ongoing basis, most of my relays get up to 4000 attempts each
day. It's standard practice I guess! Many, many are from just a few IP
addresses. The rest are just a few per IP address. Occasionally, I will
go beyond the fail2ban "ban" and block an IP address in iptables via
ufw. I then unblock that IP address in a week or two. I set fail2ban
for long blocks maybe up to 12 hours (43000-seconds).
So, harden your operating system as best you can. SSH works but disable
the password entry, X11, etc. if possible. This is always safe if your
provider has a dashboard for you to use as a secondary access to the
server. I change my SSH port number but that only slows the
professionals my minutes or seconds. Remember to change the fail2ban
SSH port number if you do that. Your host provider should have DDoS
protection for his/her entire plant.
And don't sweat it! Learn from the experiences.
On 9/4/2018 5:35 AM, Marcus Wahle wrote:
Dear all,
Since 14:00 my logs (middle node) are spamed with around 100 faild ssh login attemps from different ips.
Is there anybody else affected?
Best regards
Marcus
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
--
One person's moral compass is another person's face in the dirt.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays