Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    LINUX    |    Torvalds farts & fans know what he ate    |    8,232 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 5,314 of 8,232    |
|    Joaquim Homrighausen to Alexey Vissarionov    |
|    Alternative(s) to ipset on OpenVZ    |
|    18 Dec 17 21:40:18    |
       av> Very dangerous thing... However, it makes some fun to use it        av> against the admin^Widiot who installed it :-)              I'm curious ... why is fail2ban dangerous?               av> Being a security expert, I know (and use; and, obviously,        av> recommend) better method: limit the number of connections per        av> minute to 2 or 3, thus making any and all bruteforce attacks        av> time-ineffective.              I don't see why these are mutually exclusive ... but maybe I'm not an expert       enough. If you use key-only authentication for SSH (for example), it makes       perfect sense to add someone to a ban list for 15-600 minutes if they fail 3       times (for example).              I quite often legitimately connect with 2-3-4 SSH sessions to the same server       within a few minutes, but they don't fail of course :)                             -joho              ---        * Origin: code.code.code (2:20/4609)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca