Conversation

Replying to
If you need SSH to remain accessible under this kind of idiocy, putting it behind a wireguard tunnel or cryptographic port knocking (the former is really an overengineered but readily available stand-in for the latter, in this usage) might work well.
1
1
Replying to
We'll probably have to do something with stateless netfilter. I don't want to have conntrack enabled because it will actually help attackers with DoS. PowerDNS UDP service and nginx hold up really well under DoS attacks. I'm sure PowerDNS TCP is very easy to overload though.
1
1
Replying to
Need to look into something like this since I don't think mitigation we deployed is going to keep them away for long. github.com/GrapheneOS/inf Trivially bypassed via IPv6 /64 without PerSourceNetBlockSize 32:64 and we use ssh to rsync from VPS without dedicated /64 to others.