udc@lemmy.world to Selfhosted@lemmy.worldEnglish · 1 day agoHow to Setup a Secure Ubuntu Home Server: A Complete Guidewww.davidma.coexternal-linkmessage-square22fedilinkarrow-up1130
arrow-up1130external-linkHow to Setup a Secure Ubuntu Home Server: A Complete Guidewww.davidma.coudc@lemmy.world to Selfhosted@lemmy.worldEnglish · 1 day agomessage-square22fedilink
minus-squaremartinb@lemmy.sdf.orglinkfedilinkEnglisharrow-up3·17 hours agoFelt a bit like a faff to me, so I never bothered. Does depend upon your threat model though
minus-squareBotzo@lemmy.worldlinkfedilinkEnglisharrow-up1·17 hours agoTotally. Port knocking is one of those “of course someone did that” things to me too. A replay attack is enough to make it security theater. An IP allowlist is a more useful addon.
Felt a bit like a faff to me, so I never bothered. Does depend upon your threat model though
Totally.
Port knocking is one of those “of course someone did that” things to me too. A replay attack is enough to make it security theater.
An IP allowlist is a more useful addon.