Comment on I use Zip Bombs to Protect my Server
WFloyd@lemmy.world [bot] 2 weeks agoI’ve found great success using a hardened ssh config with a limited set of supported Cyphers
/MACs
/KexAlgorithms
. Nothing ever gets far enough to even trigger fail2ban
. Then of course it’s key only login from there.