↑back Search ←Prev date Next date→ Show only urls | (Click on time to select a line by its url) |
Who | What | When |
---|---|---|
*** | NiTeMaRe has quit IRC (Ping timeout: 265 seconds)
NiTeMaRe has joined #arpnetworks | [03:12] |
......................................... (idle for 3h21mn) | ||
m0unds | phlux: congrats | [06:36] |
.................. (idle for 1h26mn) | ||
phlux | thanks m0unds
I'm remembering what it felt like to be up for > 24 hours now last night was the longest night of my life | [08:02] |
............... (idle for 1h12mn) | ||
*** | jcv has quit IRC (Quit: leaving)
jcv has joined #arpnetworks | [09:15] |
................................. (idle for 2h44mn) | ||
tabthorpe has quit IRC (Quit: leaving)
tabthorpe has joined #arpnetworks tabthorpe has quit IRC (Client Quit) tabthorpe has joined #arpnetworks | [12:02] | |
.................... (idle for 1h36mn) | ||
easymac has quit IRC (Remote host closed the connection) | [13:42] | |
....................... (idle for 1h52mn) | ||
easymac has joined #arpnetworks
easymac has quit IRC (Changing host) easymac has joined #arpnetworks | [15:34] | |
.............. (idle for 1h9mn) | ||
sjackso | unexpected side effect of arp network's port 22 rate limiter: detecting a misconfigured ansible setup that was making loads of reconnections instead of re-using one session | [16:43] |
staticsafe | :o | [16:44] |
.... (idle for 17mn) | ||
*** | acf_ has quit IRC (Ping timeout: 255 seconds)
acf_ has joined #arpnetworks acf_ has quit IRC (Ping timeout: 268 seconds) | [17:01] |
acf_ has joined #arpnetworks | [17:18] | |
acf_ has quit IRC (Ping timeout: 268 seconds)
acf_ has joined #arpnetworks acf_ has quit IRC (Ping timeout: 268 seconds) | [17:23] | |
........ (idle for 38mn) | ||
acf_ has joined #arpnetworks | [18:05] | |
acf_ has quit IRC (Ping timeout: 268 seconds)
acf_ has joined #arpnetworks | [18:10] | |
...... (idle for 26mn) | ||
acf_ has quit IRC (Ping timeout: 265 seconds)
acf_ has joined #arpnetworks | [18:36] | |
phlux | I don't ever have my sshd set to 22 anyways
too many brute force attempts | [18:46] |
m0unds | haw haw, wai naht change http too lolol | [18:46] |
phlux | don't see many error messages in my logs regarding the httpd :P | [18:47] |
m0unds | i've seen that so many times when people (including me) mention changing ssh ports | [18:47] |
phlux | but i only have 1 server that runs an httpd anyways | [18:47] |
m0unds | haw haw y u no chg all portz | [18:47] |
phlux | haha | [18:47] |
m0unds | i like quiet logs | [18:48] |
phlux | i guess the real difference is i don't want anyone trying to access ssh that hasn't been given permission in the first place | [18:48] |
m0unds | right
then on top of that, it makes unauthorized attempts stick out significantly more | [18:48] |
phlux | so i change the port, and on some servers, i even run certain ipfw rules to limit who can access the ssh ports
yeah I honestly may disable password auth just leave it to the keys I'll create one failsafe account in case i lose my keys somehow it'll have some ridiculously long password that only my password manager (encrypted via truecrypt and a keyfile) will know | [18:48] |
............................. (idle for 2h20mn) | ||
jpalmer | phlux: I've disabled password auth for years. my general sshd_config, disable root logins, disable password auth, and I have iptables set to block bruteforce ssh attacks (and run ssh on the default port) | [21:10] |
↑back Search ←Prev date Next date→ Show only urls | (Click on time to select a line by its url) |