<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On 26 October 2016 at 19:41, Mike Perkins <span dir="ltr"><<a href="mailto:mikep@randomtraveller.org.uk" target="_blank">mikep@randomtraveller.org.uk</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><span class="gmail-">On 26/10/16 02:40, Nate Bargmann wrote:<br>
<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
I chose to use an SSH tunnel to my Myth box hosting MythWeb and it works<br>
just fine. I can setup the tunnel when I want it and since I use public<br>
key encryption I'm reasonably confident in the security. No need now to<br>
mess with SSL or Web server authentication, etc. As I already had<br>
remote SSH access into the box, this capability was always there.<br>
<br>
- Nate<br>
<br>
</blockquote></span>
I trust that you are using a non-standard port for SSH? Port 22 gets absolutely hammered here...<span class="gmail-HOEnZb"><font color="#888888"><br>
<br>
-- <br>
<br>
Mike Perkins</font></span><div class="gmail-HOEnZb"><div class="gmail-h5"><br></div></div></blockquote><div><br></div><div>fail2ban works pretty effectively, especially since I have a script which permanently blocks entire subnets if an IP address gets blocked more then once, yes its very brutal but also very easy to whitelist certain IP's and worse case I can VPN in if needed.</div><div><br></div><div>Anthony</div></div><br></div></div>