Changes

Jump to navigation Jump to search
46 bytes added ,  13:37, 27 October 2018
#Next, we are going to install ''Uncomplicated Firewall'' (''ufw''): <pre>sudo apt install ufw</pre> '''Note:''' ''ufw'' default rules allow for all outgoing connections, but block all incoming connections. <br /><br /> '''Optional:''' If you plan on using SSH to access your raspberry pi, make sure that ssh access is allowed (but limited): <pre>sudo apt install ufw</pre> '''Optional:''' You might want to add a few more limitations on ssh. For example if you’re planning on accessing your node from local network only. Depending on your local network: <pre>sudo ufw allow from 192.168.1.0/24 to any port 22</pre> Or <pre>sudo ufw allow from 10.0.0.0/24 to any port 22</pre> And/or if you have a dedicated static IP, for example: <pre>sudo ufw allow from 16.32.64.128 to any port 22</pre>
# To allow Ravencoin traffic: <pre>sudo ufw allow 8767 comment "Ravencoin"</pre> You can preview the results using: <pre>sudo ufw status verbose &#10;&#10;Example output: &#10;To Action From&#10;-- ------ ----&#10;22/tcp LIMIT IN Anywhere&#10;8767 ALLOW IN Anywhere # Ravencoin&#10;22/tcp (v6) LIMIT IN Anywhere (v6) &#10;8767 (v6) ALLOW IN Anywhere (v6) # Ravencoin </pre>
# Enable Firewall: <pre>sudo ufw enable</pre>
# To make it a bit more difficult for someone trying to brute force his way in. We are going to give timeouts when the login password was wrong 5 times using Fail2Ban: <pre>sudo apt install fail2ban</pre> To see the banlist: <pre>sudo fail2ban-client status &#10;&#10;Example output:&#10; Status|- Number of jail: 1&#10;`- Jail list: sshd</pre>
== Final checks ==

Navigation menu