Incessant tinkerer since the 70’s. Staunch privacy advocate. SelfHoster. Musician of mediocre talent. https://soundcloud.com/hood-poet-608190196

  • 27 Posts
  • 940 Comments
Joined 11 months ago
cake
Cake day: March 24th, 2025

help-circle

  • But the outcome is the same: you have no control over this behaviour.

    Yes, I totally understand that. It seemed suspicious to me because it had never happened to me before. (I have bookmarked a few articles about this 'Round Robin to read this evening) Like I said, This check gets done every morning, and has been a ‘ritual’ for years, and I have had the same VPN provider for years. So, that is what triggered my anxiety. I appreciate what everyone else has said, and I bow to greater knowledge bases than I possess. At the very least, TIL. So it’s been a good day 'tater.






  • Am I missing anything here or is this how I’m supposed to be doing it?

    AFA fail2ban, I always set up the jails in aggressive mode:

    [sshd]
    mode = aggressive
    enabled = true
    port = ssh
    filter = sshd
    logpath = /var/log/auth.log
    maxretry = 5 <---edit to tastes
    bantime = 3600 <---edit to tastes
    findtime = 600 <---edit to tastes
    

    You might want to check out Crowdsec, maybe deploy Tailscale as an overlay. How many users are you providing services for? If just yourself, I use the host allow / host deny feature in Linux. Just make sure you do host allow first, lol.