Started off by

  1. Enabling unattended updates
  2. Enable only ssh login with key
  3. Create user with sudo privileges
  4. Disable root login
  5. Enable ufw with necessary ports
  6. Disable ping
  7. Change ssh default port 21 to something else.

Got the ideas from networkchuck

Did this on the proxmox host as well as all VMs.

Any suggestions?

  • theniwo@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Well if you are using strong passwords or no passwords from outside at all, but key auth only, i think you are pretty in the safe side. As i said, i have no ssh port open to the internet. Raising the ban time could only lead to banning myself. 😀

    But for ports open to the outside, yes. I ppbly would do that too. Plus hardening the ssh config a bit

    • lack_of_reserves@alien.top
      cake
      B
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      I have an open ssh port and I use key auth with password as well as crowdsec. Even if people get my ssh key they would still need to know the password.