

In that case I can really highly recommend it. Nixos on the server is fantastic anyways, and the only hurdle to recommending simple-nixos-mailserver is that most people are not familiar with nix… 😄
In that case I can really highly recommend it. Nixos on the server is fantastic anyways, and the only hurdle to recommending simple-nixos-mailserver is that most people are not familiar with nix… 😄
It’s a bit unconventional maybe, but I vote simple-nixos-mailserver
- IF you are curious / willing to learn nix. It’s essentially just sanely configured dovecot, postfix, rspamd.
My config for those three combined is about 15 lines, and I have never had an issue with them. Slap on another 5-10 lines for Roundcube as a webmail client.
Since it’s Nix, everything is declarative, so should SOMETHING happen to the server, you can be up and running again super quickly, with the exact same setup.
Fail2ban allows you set different actions for different infringements, as well as multiple ones. So in addition to being put in a “local” jail, the offending IP also gets added to the cloudflare rules (? Is that what its called?) via their API. It’s a premade action called “cloudflare-token-multi”
We expose about a dozen services to the open web. Haven’t bothered with something like Authentik yet, just strong passwords.
We use a solid OPNSense Firewall config with rather fine-grained permissions to allow/forbid traffic to the respective VMs, between the VMs, between VMs and the NAS, and so on.
We also have a wireguard tunnel to home for all the services that don’t need to be available on the internet publicly. That one also allows access to the management interface of the firewall.
In OPNSense, you get quite good logging capabilities, should you suspect someone is trying to gain access, you’ll be able to read it from there.
I am also considering setting up Prometheus and Grafana for all our services, which could point out some anomalies, though that would not be the main usecase.
Lastly, I also have a server at a hoster for some stuff that is not practical to host at home. The hoster provided a very rudimentary firewall, so I’m using that to only open necessary ports, and then Fail2Ban to insta-ban IPs for a week on the first offense. Have also set it up so they get banned on Cloudflare’s side, so before another malicious request ever reaches me.
Have not had any issues, ever.
Might even be worth checking if https://github.com/NixOS/nixos-hardware has a straight-up fix for the issue.
No way!! You’re the goat. I spent the day trying to get behind how the cracking worked by making simple examples, and you just… Solve the puzzle :D
Awesoms, thank you so much!! I’ll appreciate update this thread if this leads to something :D
Oh, wow. I am so giving this a try. Huge kudos for checking the zip itself, btw! Thank you :D
Just for clarification though, do I need 12 bytes of the original content or of the compressed (but unencrypted) byte-representation of the zip file?
Edit: Ah, the repo links the paper. Reading now :)
Named mine after “objects” from Iain M. Banks’ Culture Novels.
Currently I have:
Nice and short, and map roughly to the “power level” of the hardware, so to speak.
And my Yubikeys are named after Special Circumstances agents 😄