@anon
sign up
@anon
sign up
pull down to refresh
21 sats
\
0 replies
\
@noknees
22 Jun
\
on: Critical sslh Vulnerabilities Let Hackers Trigger Remote DoS Attacks
security
Apart from the mitigation measures included in the post I would also recommend:
Restrict access to ports handled by
sslh
using a firewall or access control lists.
Monitor for unusual or malformed connection attempts using tools like
tcpdump
,
fail2ban
, or
Zeek
.
write
preview
reply
1,000 sats
sslh
using a firewall or access control lists.tcpdump
,fail2ban
, orZeek
.