Conversation

Replying to
If you're running recent OpenSSH sshd then check out PerSourceMaxStartups/PerSourceNetBlockSize for some anti-DoS measures Also turning off the non-ECC key exchange algorithms removes the major CPU hogs. Something like: KexAlgorithms=-diffie-hellman-* should work
1
6
Replying to
It's the current stable release on Linux: OpenSSH_8.7p1, OpenSSL 1.1.1l 24 Aug 2021. Configuration is at github.com/GrapheneOS/inf. PerSourceMaxStartups would have helped a lot. This was very small scale compared to the usual attacks on our web servers. It's weird to DoS SSH...
2
Replying to
PerSourceMaxStartups 1 and a dramatically higher value for MaxStartups like 4096 will at least make it a lot less trivial to DoS. I didn't realize it was so easy to cut off SSH access with the default configuration. Lesson learned since they seem to want to make a habit of this.
1
1
Replying to and
IPv6 is an annoyance for DoS in general. OVH only provides a /64 for dedicated servers and we primarily use standalone VPS instances. Since we use rsync across some of those, PerSourceNetBlockSize 32:64 isn't really an option. Would just have to either whitelist or disable IPv6.
1