• ozymandias117@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      7 hours ago

      I set up, and prefer, iptables rules to rate limit logins.

      I have mine set so you can connect up to 5 times per 15 minutes.

      Blocks bots well enough, and if I really mess up, I just wait 15 mins

    • smiletolerantly@awful.systems
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      13 hours ago

      The nice thing about SSH key-based access is, I either have the key and login succeeds, or I have no business trying to log in.

      That’s why my remote root server bans via fail2ban after a single failed login.

      Yes I’ve had to write support to get a KVM. Yes it’s still configured like this.

      • baguettefish@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        3
        ·
        12 hours ago

        i am a tailscale enjoyer, which means i can set up tailscale ssh once on each machine and then from another machine just login over tailscale

      • probablymissing@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        8 hours ago

        as a nixos enjoyer, i have no idea how to setup ssh keys. fail2ban and a regular password for me.

        yes, i have locked myself out of my own server for hours at a time because i’m an absolute tool.

        • smiletolerantly@awful.systems
          link
          fedilink
          arrow-up
          1
          ·
          2 hours ago

          Ehm… I’m also on Nixos and I’d say it’s super trivial.

          services.openssh = {
            enable = true;
            settings = {
              PasswordAuthentication = false;
              PermitRootLogin = "no";
            };
          };
          
          users.users.<name>.openssh.authorizedKeys.keys = [ list of pubkeys ideally read from file in repo ];