this post was submitted on 02 Aug 2023
0 points (NaN% liked)

Selfhosted

40329 readers
363 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

Hey guys,

after reading up on selfhosting for weeks now I finally decided to take the plunge today and tried setting up my own nextcloud & jellyfin instances. For this purpose I am using a mini PC. (similiar to an Intel NUC)

Now I would like to make both services available to the internet so I could show images to friends while I'm at their place / watch movies with them.

The problem is I am currently not very educated on which security measures I would have to take to ensure that my server / mini PC doesn't immediately become an easy target for a hacker, especially considering that I would host private photos on the nextcloud.

After googling around I feel like I find a lot of conflicting information as well as write-ups that I don't fully grasp with my limited knowledge so if you guys have any general advice or even places to learn about all these concepts I would be absolutely delighted!

Thank you guys sooo much in advance for any and all help, the c/selfhosted community has been nothing but a great resource for me so far!!!

top 8 comments
sorted by: hot top controversial new old
[–] datallboy@lemmy.techhaven.io 0 points 1 year ago (1 children)

It comes down to using secure passwords, 2 factor authentication, and updating software as soon as you can.

Check out Cloudflare's zero tier tunnel to only expose the services you need without port forwarding. Added benefit of masking your home's IP behind Cloudflare to prevent DDOS. Only downside is you need your own domain.

[–] foonex@feddit.de 0 points 1 year ago

Why would anyone DDOS a random home server? I don‘t think OP has to worry about that.

[–] Smiling_Fanatic@lemmy.world 0 points 1 year ago* (last edited 1 year ago) (2 children)

Duckdns.org for dynamic dns. You can get a domain name like example.duckdns.org for free.

Caddyserver.com to reverse proxy to your running docker services. You’ll be able to set up jellyfin.example.duckdns.org

Crowdsec.net to secure the network

Tailscale for access to running docker services that you don’t need to share with friends.

[–] foonex@feddit.de 0 points 1 year ago

Could you please be more specific what exactly Crowdsec brings to the table? In which way does it “secure the network”?

[–] MaggiWuerze@feddit.de 0 points 1 year ago

There's even a Traefik Plugins for crowdsec. I guess it's time to play with my Traefik Config again

[–] Kekin@lemy.lol 0 points 1 year ago (1 children)

The other day I learned about endlessh. I set that up, switched my actual sshd to listen on a different port, and the ssh login attempts from randoms essentially went down to 0. Pretty neat.

[–] prenatal_confusion@lemmy.one 0 points 1 year ago (1 children)

Sounds like security by obscurity to me. But still, nice result.

[–] confusedalex@feddit.de 0 points 1 year ago

It's more targeted to avoid automated attacks.