I needed a quick email to go out from my server so I decided to install mailx. Found out that s-nail is the new package name. I’m the only one for this system so I went ahead with a global setting.
The best solution to counter brute force attacks would to maintaining a allowed list of static IPs + limiting ssh access to ssh key pairs. This was the plan until I wanted to use Github actions to remote into my server. I decided to counter the ssh brute force attacks with fail2ban.
— I used keychain for the ssh-agent wrapper to load key. (dnf install keychain) 1.) Create ssh key pair. 2.) Add ssh pub key to your github’s “SSH and GPG keys” (.pub file) Configure permission settings as needed. 3.) Test github connection using the ssh key you’ve created earlier. 4.) Edit your .bashrc file to have your session load the key everytime you login. (Not secure to store key locally, but the way I see it, you are toast if you’re system has been hacked.) 5.) Login and check if keychain is loaded and github connection is working properly.
2.) Go to your “Settings” and “SSH and GPG keys” and add new SSH Key. Choose the .pub file you created in step 1.
3.) Once you’ve set your .pub file, test the connections from your host to github.
btro@~/.ssh$ssh-i./test_ed25519git@github.comPTYallocationrequestfailedonchannel0Hi!You've successfully authenticated, but GitHub does not provide shell access.
4.) For persistent ssh key loading to your ssh-agent, add the following to your .bashrc’s end of file.