mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

814
active users

#sshguard

0 posts0 participants0 posts today
cr0n0s:~🐧📡⌨️ 🛠️ #<p><a href="https://social.tchncs.de/tags/h4ckseed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>h4ckseed</span></a> Nueva Entrada - How To: Bloquear ataques de fuerza bruta SSH usando SSHGUARD</p><p><a href="https://social.tchncs.de/tags/sshguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshguard</span></a> <a href="https://social.tchncs.de/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://social.tchncs.de/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://social.tchncs.de/tags/rockylinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rockylinux</span></a> <a href="https://social.tchncs.de/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://social.tchncs.de/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a> <a href="https://social.tchncs.de/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> <a href="https://social.tchncs.de/tags/ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ufw</span></a></p><p><a href="https://h4ckseed.wordpress.com/2024/12/25/how-to-bloquear-ataques-de-fuerza-bruta-ssh-usando-sshguard/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">h4ckseed.wordpress.com/2024/12</span><span class="invisible">/25/how-to-bloquear-ataques-de-fuerza-bruta-ssh-usando-sshguard/</span></a></p>
rfnix<p>La méthode a consisté à... me débarasser de mon pare-feu jusque là géré par <a href="https://piaille.fr/tags/UFW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UFW</span></a> et <a href="https://piaille.fr/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a>, parce que j'avais abandonné de comprendre comment le faire avec, pour le remplacer par des règles <a href="https://piaille.fr/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a> toutes simples. </p><p>Il a fallu dire aux différents services de l'utiliser (<a href="https://piaille.fr/tags/sshguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshguard</span></a> et le moteur de règles de Podman), vérifier que je n'avais pas fait laissé n'importe quel port ouvert et permettre la communication inter-container sur le bon bloc d'IPs internes, et... c'est tout.</p><p>Vraiment le nouveau fichier de conf + le fait que les services additionnels rajoutent juste leur règles dans des tables à part rend tout ça propre et sans douleur!</p><p><a href="https://piaille.fr/tags/podman" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podman</span></a></p>
ricardo :mastodon:<p>How to Secure <a href="https://fosstodon.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> Server with <a href="https://fosstodon.org/tags/SSHGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSHGuard</span></a>: A Practical Guide </p><p><a href="https://linuxiac.com/how-to-secure-ssh-server-with-sshguard/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/how-to-secure-ssh</span><span class="invisible">-server-with-sshguard/</span></a></p>
Alexandre :freebsd:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@garyhtech" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>garyhtech</span></a></span> Hello GaryH, thank you for your videos. <br>I suggest <a href="https://mastodon.bsd.cafe/tags/crowdsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crowdsec</span></a> that works fine for blocking intruders IPs. It strength is all intruders IPs addresses database is shared with crowdsec community, instead of only the local machine (like <a href="https://mastodon.bsd.cafe/tags/Fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fail2ban</span></a> and <a href="https://mastodon.bsd.cafe/tags/SSHGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSHGuard</span></a>).<br>I like Fail2Ban and SSHGuard but Crowdsec seems more powerful for me. Of course, crowdsec is in <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/ports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ports</span></a> and <a href="https://mastodon.bsd.cafe/tags/pkg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pkg</span></a></p>
GaryH Tech<p>NEW VIDEO - Fail2Ban and SSHGuard - How to Secure SSH and more!</p><p><a href="https://mastodon.social/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/unix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unix</span></a> <a href="https://mastodon.social/tags/fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail2ban</span></a> <a href="https://mastodon.social/tags/sshguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshguard</span></a> <a href="https://mastodon.social/tags/garyhtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>garyhtech</span></a></p><p> <a href="https://youtu.be/6uvDvvKZAOE?si=o8AlxR_ibcOWGIsI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/6uvDvvKZAOE?si=o8AlxR</span><span class="invisible">_ibcOWGIsI</span></a> via @YouTube</p>
ezaquarii<p><span class="h-card"><a href="https://bsd.network/@solene" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>solene</span></a></span> something like <a href="https://techhub.social/tags/sshguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshguard</span></a>?</p>
Dr. Roy Schestowitz (罗伊) ✅<p>What’s new in <a href="https://mastodon.technology/tags/sshguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSHGuard</span></a> 2.1 <a href="https://www.ctrl.blog/entry/sshguard2p1" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">ctrl.blog/entry/sshguard2p1</span><span class="invisible"></span></a></p>