From db9a372547a71279402a59ac66a29e15b65ec841 Mon Sep 17 00:00:00 2001 From: Christian Cleberg Date: Tue, 1 Apr 2025 22:01:32 -0500 Subject: migrate back to cleberg.net --- content/blog/2022-03-24-server-hardening.org | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'content/blog/2022-03-24-server-hardening.org') diff --git a/content/blog/2022-03-24-server-hardening.org b/content/blog/2022-03-24-server-hardening.org index 8704a27..7c9af8d 100644 --- a/content/blog/2022-03-24-server-hardening.org +++ b/content/blog/2022-03-24-server-hardening.org @@ -110,7 +110,7 @@ via your randomized port. ** =ufw= -To see how to configure =ufw=, see my other post: [[https://cmc.pub/blog/ufw.html][Secure Your +To see how to configure =ufw=, see my other post: [[https://cleberg.net/blog/ufw.html][Secure Your Network with the Uncomplicated Firewall]]. The general notion with an on-device firewall is that you want to deny all @@ -196,7 +196,7 @@ sudo ufw enable This process involves editing a couple files and installing an MFA package, so I will not include all the details in this post. To see how to configure - MFA for =ssh=, see my other post: [[https://cmc.pub/blog/ssh-mfa.html][Enabling MFA for + MFA for =ssh=, see my other post: [[https://cleberg.net/blog/ssh-mfa.html][Enabling MFA for SSH]]. ** =fail2ban= -- cgit v1.2.3-70-g09d2