There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

lemmy.world

filgas08 , to steam in From the software gore community. We all know this interface
@filgas08@lemmy.world avatar

task failed successfully

EherVielleicht , (edited ) to lemmyshitpost in it's inevitable

Give em hell boys!

betterdeadthanreddit ,
Matcraftou , to lemmyshitpost in I miss 2011 memes
@Matcraftou@lemmy.world avatar

Wojakified

TWeaK , to memes in uLtrA mEgA vIsIon

To the moon!

10_0 ,

To the earths core!

praeceptorem666 , to memes in meirl

Imagine being so mentally handicapped you drop expensive shit down the stairs 💀

0x2d ,

Yes I am sure you have never made any mistakes in your life before

praeceptorem666 ,

Absolutely. Unlike you, your mother made a massive one giving birth to you. I can only begin to imagine her devastation when she sees the nasty goblin she produced

outer_spec , (edited ) to lemmyshitpost in He's coming for you!
@outer_spec@lemmy.studio avatar

I scrolled by this post really fast and thought it was mc ride death grips

PrivateNoob , to lemmyshitpost in I miss 2011 memes

I like both of them.

RadButNotAChad , to lemmyshitpost in This leaves me quite dissatisfied with the world.

I can fix this for you. Garry Newman is 41 and new is spelled correctly. garry.net

FlyingSquid OP ,
@FlyingSquid@lemmy.world avatar

Now you’re just making me upset by reminding me that some people spell Gary with an unnecessary extra R.

RadButNotAChad ,

It does look like it should rhyme with Sorry

Alexxxolotl ,
@Alexxxolotl@sh.itjust.works avatar

And they spell it like that literally all the time, even on Wikipedia! I don’t know if it’s just a common typo, but it could really mislead people to believe that his name isn’t Gay Oldman.

lapommedeterre , to memes in Not enough cooling

Need fans to cool the fans.

Blaze , to newcommunities in Old Movies - Let's talk about movies that aren't new releases.
@Blaze@discuss.tchncs.de avatar

Interesting concept, thank you for this initiative.

Have you considered lemmy.film as an instance? They already have communities such as !filmnoir, so they would probably welcome an oldmovies one

FrederikNJS , to selfhosted in Another good reason not to open port 22

As others have already said, set up a VPN like wireguard, connect to the VPN and then SSH to the server. No need to open ports for SSH.

I do have port 22 open on my network, but it’s forwarded to an SSH tarpit: github.com/skeeto/endlessh

VitoCorleone ,

I have wireguard for other purposes but I also have ssh open on a different port. I don’t much understand the argument of exchanging ssh for wireguard. In the end, we’re just trading an attack vector for another.

My ssh only allows connections from my user. If I’m using password auth, I also request a 2FA.

Tail scale is also a good idea but I don’t like having my control plane under someone else’s control.

axum ,
@axum@kbin.social avatar

So just run headscale then.

Cyberflunk ,

Or nebula

FrederikNJS ,

The reason a VPN is better to expose than SSH, is the feedback.

If someone tries connecting to your SSH with the wrong key or password, they get a nice and clear permission denied. They now know that you have SSH, and which version. Which might allow them to find a vulnerability.

If someone connects to your wireguard with the wrong key, they get zero response. Exactly as if the port had not been open in the first place. They have no additional information, and they don’t even know that the port was even open.

Try running your public IP through shodan.io, and see what ports and services are discovered.

486 ,
@486@kbin.social avatar

There is quite a significant difference. An ssh server - even when running on a non-default port - is easily detectable by scanning for it. With a properly configured Wireguard setup this is not the case. As someone scanning from the outside, it is impossible to tell if there is Wireguard listening or not, since it simply won't send any reply to you if you don't have the correct key. Since it uses UDP it isn't even possible to tell if there is any service running on a given UDP port.

barsoap ,

If someone finds a 0day in your SSH server and goes on drive-by attacking the whole internet you’re toast.

Already moving off port 22 reduces much of the risk, essentially reducing the attack surface for drive-by attacks to zero while still being susceptible to targeted attacks – that is, still susceptible to attackers bothering to scan the whole range. Anything that makes you unscannable (VPN, portknockd, doesn’t matter) mitigates that. Even state-level actors would have to be quite determined to get through that one.

Yes it’s security through obscurity. Yes it’s a good idea: There’s a difference between hiding your unlocked front door and hiding your military-grade front door lock, one of them is silly the other isn’t.

filister ,

But Tailscale is Wireguard under the hood.

Holzkohlen ,

Yeah, but worse cause it’s company owned and not really open source. Why do people use tailscale? Are you so desperate to pay money for it?

art ,
@art@lemmy.world avatar

It’s open source and it’s free to use. Anything can sound bad when you just make shit up.

greavous ,

I don’t pay money for it… 3 users/100 devices is free tailscale.com/pricing/

James , to selfhosted in Another good reason not to open port 22

Public key auth, and fail2ban on an extremely strict mode with scaling bantime works well enough for me to leave 22 open.

Fail2ban will ban people for even checking if the port is open.

bitsplease ,

Yeah fail2ban has worked great for me

timi ,
@timi@lemmy.world avatar

Honest question, is there a good default config available somewhere or is what apt install fail2ban does good to go? All the tutorials I’ve found have left it to the reader to configure their own rules.

Sleepkever ,

Honestly the default config is good enough to prevent brute force attacks on ssh. Just installing it and forgetting about it is a definite option.

I think the default block time is 10 minutes after 5 failed login attempts in 10 minutes. Not enough to ever be in your way but enough to fustrate any automated attacks. And it’s got default config for a ton of services by default. Check your /etc/fail2ban/jail.conf for an overview.

I see that a recidive filter that bans repeat offenders for a week after 10 fail2ban bans in one day is also default now. So I’d say that the results are perfect unless you have some exotic or own service you need fail2ban for.

JubilantJaguar ,

If Fail2Ban is so important, why the h*** does it not come installed and enabled as standard?!

Security is the number-1 priority for any OS, and yet stock SSHD apparently does not have Fail2Ban-level security built in. My conclusion is that Fail2Ban cannot therefore be that vital.

outer_spec , to lemmyshitpost in I feel the actual inflation
@outer_spec@lemmy.studio avatar

For more information, look up “breast inflation” on google

empireOfLove , to lemmyshitpost in it's inevitable

probably gonna move to dbzer0 just for piracy tbh

UhBell , to memes in Not enough cooling
@UhBell@lemmy.world avatar

Still quieter than my PC

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines