This website is hosted on my own dedicated server (a kimsufi) and like every server, it’s getting regularly attacked.
To identify those attacks, I needed to add a layer of security to ban recurrent attempt, this layer is Fail2ban. It’s a widely known and recognized python script that analyses your log file to ban repetitive failed authentication.
I was using the Raspberry Pi as my wifi router, but I have to admit I reached it’s limit quite soon. Even with a good wifi usb dongle, I couldn’t get a stable and fast connection.
I then bought on Amazon a TP-Link WR841/ND, a small and cheap router but quite strong and that can run OpenWRT. It provide 4 ethernet ports + one for the inbound internet connection + Wifi n 300Mbps. You can find the complete information about the model on the wiki of OpenWRT.
The first thing I have done is checking the version of the router, I have the v9 meaning I won’t be able to use the last stable version of OpenWRT (12.09) but only the bleeding edge (from r40695). I can confirm that the last build is working perfectly well (Chaos Calmer r42263). Because of the lack of space left after installing Luci (the administration panel), I wanted to create my own image to build into the squashfs the needed packages.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.