this post was submitted on 04 Mar 2026
684 points (99.3% liked)

Programmer Humor

30183 readers
1379 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 

(The meme's author may be convinced but I am still not, to be clear)

From: https://terra.incognita.net/@RainofTerra/116168632108345829

you are viewing a single comment's thread
view the rest of the comments
[–] smiletolerantly@awful.systems 3 points 13 hours ago* (last edited 12 hours ago) (2 children)

The nice thing about SSH key-based access is, I either have the key and login succeeds, or I have no business trying to log in.

That's why my remote root server bans via fail2ban after a single failed login.

Yes I've had to write support to get a KVM. Yes it's still configured like this.

[–] baguettefish@discuss.tchncs.de 3 points 12 hours ago (2 children)

i am a tailscale enjoyer, which means i can set up tailscale ssh once on each machine and then from another machine just login over tailscale

[–] InternetCitizen2@lemmy.world 2 points 5 hours ago (1 children)

How's that different from normal ssh?

[–] baguettefish@discuss.tchncs.de 1 points 2 hours ago

you can disable the need for a password or key if you like, and you also don't really need fail2ban, since nothing is actually port forwarded anywhere

[–] smiletolerantly@awful.systems 2 points 11 hours ago* (last edited 11 hours ago)

Eh, the machine is actually in one of my wireguard nets anyways, but for different purposes.

[–] probablymissing@lemmy.world 0 points 8 hours ago (1 children)

as a nixos enjoyer, i have no idea how to setup ssh keys. fail2ban and a regular password for me.

yes, i have locked myself out of my own server for hours at a time because i'm an absolute tool.

[–] smiletolerantly@awful.systems 1 points 2 hours ago

Ehm... I'm also on Nixos and I'd say it's super trivial.

services.openssh = {
  enable = true;
  settings = {
    PasswordAuthentication = false;
    PermitRootLogin = "no";
  };
};

users.users.<name>.openssh.authorizedKeys.keys = [ list of pubkeys ideally read from file in repo ];