Comment on Another good reason not to open port 22
timi@lemmy.world 1 year agoHonest question, is there a good default config available somewhere or is what apt install fail2ban
does good to go? All the tutorials I’ve found have left it to the reader to configure their own rules.
Sleepkever@lemm.ee 1 year ago
Honestly the default config is good enough to prevent brute force attacks on ssh. Just installing it and forgetting about it is a definite option.
I think the default block time is 10 minutes after 5 failed login attempts in 10 minutes. Not enough to ever be in your way but enough to fustrate any automated attacks. And it’s got default config for a ton of services by default. Check your /etc/fail2ban/jail.conf for an overview.
I see that a recidive filter that bans repeat offenders for a week after 10 fail2ban bans in one day is also default now. So I’d say that the results are perfect unless you have some exotic or own service you need fail2ban for.