minus-squarenonentity@sh.itjust.workstolinuxmemes@lemmy.world•I didn't know you were supposed to disable root user...linkfedilinkarrow-up0·5 months agoPermitting inbound SSH attempts, but disallowing actual logins, is an effective strategy to identify compromised hosts in real-time. The origin address of any login attempt is betraying it shouldn’t be trusted, and be fed into tarpits and block lists. linkfedilink
Permitting inbound SSH attempts, but disallowing actual logins, is an effective strategy to identify compromised hosts in real-time.
The origin address of any login attempt is betraying it shouldn’t be trusted, and be fed into tarpits and block lists.