Conversation

Replying to
If you need SSH to remain accessible under this kind of idiocy, putting it behind a wireguard tunnel or cryptographic port knocking (the former is really an overengineered but readily available stand-in for the latter, in this usage) might work well.
1
1
Replying to
We'll probably have to do something with stateless netfilter. I don't want to have conntrack enabled because it will actually help attackers with DoS. PowerDNS UDP service and nginx hold up really well under DoS attacks. I'm sure PowerDNS TCP is very easy to overload though.
1
1
Replying to and
I think it's a sign they're going to start trying to regularly block SSH access with DoS attacks. It really annoys me. OVH IPv4 DDoS mitigation helps a lot but doesn't offer much for something like this where it's barely any traffic and could just be done via IPv6 or within OVH.
1