[03:12] *** NiTeMaRe has quit IRC (Ping timeout: 265 seconds) [03:15] *** NiTeMaRe has joined #arpnetworks [06:36] phlux: congrats [08:02] thanks m0unds [08:02] I'm remembering what it felt like to be up for > 24 hours now [08:03] last night was the longest night of my life [09:15] *** jcv has quit IRC (Quit: leaving) [09:18] *** jcv has joined #arpnetworks [12:02] *** tabthorpe has quit IRC (Quit: leaving) [12:04] *** tabthorpe has joined #arpnetworks [12:05] *** tabthorpe has quit IRC (Client Quit) [12:06] *** tabthorpe has joined #arpnetworks [13:42] *** easymac has quit IRC (Remote host closed the connection) [15:34] *** easymac has joined #arpnetworks [15:34] *** easymac has quit IRC (Changing host) [15:34] *** easymac has joined #arpnetworks [16:43] unexpected side effect of arp network's port 22 rate limiter: detecting a misconfigured ansible setup that was making loads of reconnections instead of re-using one session [16:44] :o [17:01] *** acf_ has quit IRC (Ping timeout: 255 seconds) [17:02] *** acf_ has joined #arpnetworks [17:06] *** acf_ has quit IRC (Ping timeout: 268 seconds) [17:18] *** acf_ has joined #arpnetworks [17:23] *** acf_ has quit IRC (Ping timeout: 268 seconds) [17:23] *** acf_ has joined #arpnetworks [17:27] *** acf_ has quit IRC (Ping timeout: 268 seconds) [18:05] *** acf_ has joined #arpnetworks [18:10] *** acf_ has quit IRC (Ping timeout: 268 seconds) [18:10] *** acf_ has joined #arpnetworks [18:36] *** acf_ has quit IRC (Ping timeout: 265 seconds) [18:36] *** acf_ has joined #arpnetworks [18:46] I don't ever have my sshd set to 22 anyways [18:46] too many brute force attempts [18:46] haw haw, wai naht change http too lolol [18:47] don't see many error messages in my logs regarding the httpd :P [18:47] i've seen that so many times when people (including me) mention changing ssh ports [18:47] but i only have 1 server that runs an httpd anyways [18:47] haw haw y u no chg all portz [18:47] haha [18:48] i like quiet logs [18:48] i guess the real difference is i don't want anyone trying to access ssh that hasn't been given permission in the first place [18:48] right [18:48] then on top of that, it makes unauthorized attempts stick out significantly more [18:48] so i change the port, and on some servers, i even run certain ipfw rules to limit who can access the ssh ports [18:48] yeah [18:49] I honestly may disable password auth [18:49] just leave it to the keys [18:49] I'll create one failsafe account in case i lose my keys somehow [18:50] it'll have some ridiculously long password that only my password manager (encrypted via truecrypt and a keyfile) will know [21:10] phlux: I've disabled password auth for years. my general sshd_config, disable root logins, disable password auth, and I have iptables set to block bruteforce ssh attacks (and run ssh on the default port)