Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to Linux operating system (OS), a U... <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
Joaquim Homrighausen | Alexey Vissarionov | Alternative(s) to ipset on OpenVZ |
December 18, 2017 9:40 PM * |
|||
av> Very dangerous thing... However, it makes some fun to use it av> against the admin^Widiot who installed it :-) I'm curious ... why is fail2ban dangerous? av> Being a security expert, I know (and use; and, obviously, av> recommend) better method: limit the number of connections per av> minute to 2 or 3, thus making any and all bruteforce attacks av> time-ineffective. I don't see why these are mutually exclusive ... but maybe I'm not an expert enough. If you use key-only authentication for SSH (for example), it makes perfect sense to add someone to a ban list for 15-600 minutes if they fail 3 times (for example). I quite often legitimately connect with 2-3-4 SSH sessions to the same server within a few minutes, but they don't fail of course -joho --- * Origin: code.code.code (2:20/4609) |
||||||
|
Previous Message | Next Message | Back to Linux operating system (OS), a U... <-- <--- | Return to Home Page |
Execution Time: 0.0882 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |