• 6 Posts
  • 127 Comments
Joined 1 year ago
cake
Cake day: July 28th, 2023

help-circle







  • This person is not wrong. Still, I have f2b setup for ssh on all my externally available hosts, banning after the first login failure. When using pre shared keys in the server (with sshd configured, not using defaults) and an ssh config on the client that defines each host and key combo, it’s impossible to fail login, ever. I have never been burned by using this method and it’s been in place in all my hosts, starting many years ago.

    I feel like a lot of sshd hardening tuts overlook client configuration. That is the piece that makes ssh very easy to work with from a user’s perspective.



  • Yeah I’m not buying it yet. REST is great from my perspective, and the concern about data leakage seems like it could be curtailed significantly by creating an API contract first and clearly defining field in each object and having a proper security audit performed of the data (whoever that is in your organization). By using code generation on the contract, implementing the client and the server are then very straight forward.







  • Yep. And those of us who do it as a full time job with no CS degree have a level of imposter syndrome to overcome.

    It’s super saying to design and implement an application though. Especially when it gets used daily but scores of millions of people - even if it’s just phones using it in the background and people don’t even know about it.