I have a server where I believe I have disabled root login via ssh. I think it is done correctly, as I cannot login with root myself via ssh, but I would’ve thought that it would be reflected in /var/log/auth.log. Instead, it shows up as failed password entry. Is this intended?...
Yes that’s the right way to block root login. An added filter you can use the ‘match’ config expression to filter logins even further.
If you’re on the open network, your connection will be heavily hit with login attempts. That is normal. But using another service like Fail2Ban will stop repeated hits to your host.
Ssh listens on port 22, as soon as a connection is made the host moves the connection to another port to free up 22 for other new connections.Btw: I wasn’t thinking clearly here. Out going connections won’t be using port 22, but the listening incoming port is always 22.
Match blocks allow you to restrict who/what is allowed or not allowed to connect to the server. There is a large number of options to utilize. Put this near the bottom of sshd_config. There should be an example there.
Geez really? I had no idea that pedestrians were so careless, what is it about larger trucks that makes people jump out in front of them.
I like to see things as an opportunity, and I think we can use this as a lesson to do things differently. Like, let’s make trucks louder so you hear them before you see them. More Turbo, and how about vertical tail pipe stack. Next we can increase the number of lights, and make them brighter so that everyone can see. Let’s add more cameras and computers so the driver can see their blind spots simply by looking at the command console screen. We can even make these features available for free for a small amount of non invasive advertising.
Do you remember how trains solved the problems of cows derailing trains. They put a guard on the front. So let’s make an even bigger steel bumper.
I used awk to migrate users from one system to another. I created template scripts for setting up the user in the new system, I dumped the data from the old system, then used awk to process the dump and create scripts for each user in the new system. That was a fun project.
Moss' cat. (lemmy.ml)
Have I successfully blocked ssh logins to root?
I have a server where I believe I have disabled root login via ssh. I think it is done correctly, as I cannot login with root myself via ssh, but I would’ve thought that it would be reflected in /var/log/auth.log. Instead, it shows up as failed password entry. Is this intended?...
Do you utilize a dedicated AV like Bitdefender when sailing? Or do you still trust Windows Defender to take care of the higher risk while doing this?
What the title says, and that’s pretty much it. Do you or don’t you?
Truck bloat is killing us, new crash data reveals (www.theverge.com)
Am I in over my head? Need some encouragement!
I’m a novice Linux user. Comfortable with command line but far from a whiz. Have to duckduckgo a lot of stuff to figure out what I’m doing....
Is anyone using awk?
Studying and awk came up....
Anyone have a good place to find British panel shows?
The Boost android client for Lemmy is displaying these dark pattern ads pretending to be system notifications. What security/privacy conscious Lemmy clients do you recommend? (lemmy.ml)