troed

joined 2 years ago
[–] troed@fedia.io 2 points 12 hours ago (1 children)

Still no. Here's the reasoning: A well known SSHd is the most secure codebase you'll find out there. With key-based login only, it's not possible to brute force entry. Thus, changing port or running fail2ban doesn't add anything to the security of your system, it just gets rid of bot login log entries and some - very minimal - resource usage.

If there's a public SSHd exploit out, attackers will portscan and and find your SSHd anyway. If there's a 0-day out it's the same.

(your points 4 and 5 are outside the scope of the SSH discussion)

[–] troed@fedia.io 2 points 1 day ago (1 children)

Feel free to argue with facts. Hardening systems is my job.

[–] troed@fedia.io 5 points 1 day ago (15 children)

This is not "the correct answer". There's absolutely nothing wrong with "exposing" SSH.

[–] troed@fedia.io 7 points 1 day ago (5 children)

A few replies here give the correct advice. Others are just way off.

To those of you who wrote anything else than "disable passwords, use key based login only and you're good" - please spend more time learning the subject before offering up advice to others.

(fail2ban is nice to run in addition, I do so myself, but it's more for to stop wasting resources than having to do with security since no one is bruteforcing keys)

[–] troed@fedia.io 21 points 1 day ago

... so, Russian troll factory account

[–] troed@fedia.io 5 points 2 days ago (1 children)

Breakfast is coffee and toast.

/Swede

[–] troed@fedia.io 23 points 4 days ago (35 children)

It's a list from 2021 and as a cybersec researcher and Jellyfin user I didn't see anything that would make me say "do not expose Jellyfin to the Internet".

That's not to say there might be something not listed, or some exploit chain using parts of this list, but at least it's not something that has been abused over the last four years if so.

[–] troed@fedia.io 2 points 4 days ago (1 children)

There are still server softwares our there that are going to be exposing people's private Mastodon posts.

You could've saved yourself a lot of typing there by just admitting to claiming things you actually didn't know.

[–] troed@fedia.io 2 points 5 days ago (3 children)

If you know of other ActivityPub servers that expose private posts the same way I suggest you make a responsible disclosure to the developers.

I don't know of any, but you claim they exist so ...

[–] troed@fedia.io 2 points 5 days ago (1 children)

You have absolutely no idea what "responsible" in "responsible disclosure" means :) It's completely irrelevant how Mastodon has implemented private posts when it comes to how Dansup handled the issue, knowing what the effects were.

You don't, when told of a vulnerability, handle it in a way that cause harm if it can be avoided.

[–] troed@fedia.io 2 points 5 days ago (3 children)

Read more, post less. I've said nothing about any spec violation. That's not relevant.

[–] troed@fedia.io 2 points 5 days ago (5 children)

hahahahaha

Watch and try again ;) I post under my real name.

https://www.cve.org/CVERecord?id=CVE-2024-44754

https://www.youtube.com/watch?v=ZbKLAjPYOEg

Feel free to post less and read more.

 

We're consolidating our social media presence due to limited resources and no longer posting on Mastodon. Follow us on Reddit

Please tell us that you're not moving away from Lemmy/Mbin too. There's a gigantic tonedeafness to asking your supporters to use centralized social media at this specific time that's hard to accept you're not realizing.

(quote from Proton's mastodon.social account info - there wasn't even a post made about it)

view more: next ›