| ↑back Search ←Prev date Next date→ Show only urls | (Click on time to select a line by its url) |
| Who | What | When |
|---|---|---|
| *** | NiTeMaRe has quit IRC (Ping timeout: 265 seconds)
NiTeMaRe has joined #arpnetworks | [03:12] |
| ......................................... (idle for 3h21mn) | ||
| m0unds | phlux: congrats | [06:36] |
| .................. (idle for 1h26mn) | ||
| phlux | thanks m0unds
I'm remembering what it felt like to be up for > 24 hours now last night was the longest night of my life | [08:02] |
| ............... (idle for 1h12mn) | ||
| *** | jcv has quit IRC (Quit: leaving)
jcv has joined #arpnetworks | [09:15] |
| ................................. (idle for 2h44mn) | ||
| tabthorpe has quit IRC (Quit: leaving)
tabthorpe has joined #arpnetworks tabthorpe has quit IRC (Client Quit) tabthorpe has joined #arpnetworks | [12:02] | |
| .................... (idle for 1h36mn) | ||
| easymac has quit IRC (Remote host closed the connection) | [13:42] | |
| ....................... (idle for 1h52mn) | ||
| easymac has joined #arpnetworks
easymac has quit IRC (Changing host) easymac has joined #arpnetworks | [15:34] | |
| .............. (idle for 1h9mn) | ||
| sjackso | unexpected side effect of arp network's port 22 rate limiter: detecting a misconfigured ansible setup that was making loads of reconnections instead of re-using one session | [16:43] |
| staticsafe | :o | [16:44] |
| .... (idle for 17mn) | ||
| *** | acf_ has quit IRC (Ping timeout: 255 seconds)
acf_ has joined #arpnetworks acf_ has quit IRC (Ping timeout: 268 seconds) | [17:01] |
| acf_ has joined #arpnetworks | [17:18] | |
| acf_ has quit IRC (Ping timeout: 268 seconds)
acf_ has joined #arpnetworks acf_ has quit IRC (Ping timeout: 268 seconds) | [17:23] | |
| ........ (idle for 38mn) | ||
| acf_ has joined #arpnetworks | [18:05] | |
| acf_ has quit IRC (Ping timeout: 268 seconds)
acf_ has joined #arpnetworks | [18:10] | |
| ...... (idle for 26mn) | ||
| acf_ has quit IRC (Ping timeout: 265 seconds)
acf_ has joined #arpnetworks | [18:36] | |
| phlux | I don't ever have my sshd set to 22 anyways
too many brute force attempts | [18:46] |
| m0unds | haw haw, wai naht change http too lolol | [18:46] |
| phlux | don't see many error messages in my logs regarding the httpd :P | [18:47] |
| m0unds | i've seen that so many times when people (including me) mention changing ssh ports | [18:47] |
| phlux | but i only have 1 server that runs an httpd anyways | [18:47] |
| m0unds | haw haw y u no chg all portz | [18:47] |
| phlux | haha | [18:47] |
| m0unds | i like quiet logs | [18:48] |
| phlux | i guess the real difference is i don't want anyone trying to access ssh that hasn't been given permission in the first place | [18:48] |
| m0unds | right
then on top of that, it makes unauthorized attempts stick out significantly more | [18:48] |
| phlux | so i change the port, and on some servers, i even run certain ipfw rules to limit who can access the ssh ports
yeah I honestly may disable password auth just leave it to the keys I'll create one failsafe account in case i lose my keys somehow it'll have some ridiculously long password that only my password manager (encrypted via truecrypt and a keyfile) will know | [18:48] |
| ............................. (idle for 2h20mn) | ||
| jpalmer | phlux: I've disabled password auth for years. my general sshd_config, disable root logins, disable password auth, and I have iptables set to block bruteforce ssh attacks (and run ssh on the default port) | [21:10] |
| ↑back Search ←Prev date Next date→ Show only urls | (Click on time to select a line by its url) |