Protecting my public Linux host from brute force SSH attacks

Someone with an automatic tool is trying different combinations of users and passwords to gain SSH access to my public server available in Internet.

auth.log, being updated continually as the attacker is trying to guess the user and password
auth.log, being updated continually as the attacker is trying to guess the user and password

To protect my VPS, I am going to implement some of the recommendations of this post from RimuHosting.

  • Run OpenSSH on a non-standard port
  • Create a user with a strange name to connect to this server and configure OpenSSH to only allow this user to connect
  • Don’t allow passwords to be used. We will use SSH keys to login in our server.

Deploying a DevOps playground at home with Debian Linux and VirtualBox

This is the first of a serie of posts describing how to deploy a playground for DevOps learning and experimenting. This home lab will be deployed in my home computer, a modest HP Pro 3300 micro tower 🙂

As host machine we will use a computer with a Debian 10 Linux system. VirtualBox will be used to create a local private network and 4 virtual servers: a “Control Server” and three nodes, “Node #1”,
“Node #2” and “Node #3”

My home laboratory
Network diagram of my home lab