Hacker News new | past | comments | ask | show | jobs | submit login

My home IP doesn’t change much so I just open ssh port only to my own IP. If I travel I’ll add another IP if I need to ssh in. I don’t get locked out because I use VPS or cloud provider firewall that can be changed through console after auth/MFA. This way SSH is never exposed to the wider internet.



Another option is putting SSH on an IP on the wireguard only subnet.


I've recently done this for all my boxes, but tailscale over barebones wireguard. So fucking awesome. I just run tailscale at all times on all my boxes, all my dns regardless of what network i'm on goes to my internal server that upstreams over tls. It's great, and tailscale is a snap to set up.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: