udc@lemmy.world to Selfhosted@lemmy.worldEnglish · 1 day agoHow to Setup a Secure Ubuntu Home Server: A Complete Guidewww.davidma.coexternal-linkmessage-square22fedilinkarrow-up1129arrow-down113cross-posted to: technology@lemmy.world
arrow-up1116arrow-down1external-linkHow to Setup a Secure Ubuntu Home Server: A Complete Guidewww.davidma.coudc@lemmy.world to Selfhosted@lemmy.worldEnglish · 1 day agomessage-square22fedilinkcross-posted to: technology@lemmy.world
minus-squaremartinb@lemmy.sdf.orglinkfedilinkEnglisharrow-up3·15 hours agoFelt a bit like a faff to me, so I never bothered. Does depend upon your threat model though
minus-squareBotzo@lemmy.worldlinkfedilinkEnglisharrow-up1·15 hours agoTotally. Port knocking is one of those “of course someone did that” things to me too. A replay attack is enough to make it security theater. An IP allowlist is a more useful addon.
Felt a bit like a faff to me, so I never bothered. Does depend upon your threat model though
Totally.
Port knocking is one of those “of course someone did that” things to me too. A replay attack is enough to make it security theater.
An IP allowlist is a more useful addon.