• 0 Posts
  • 21 Comments
Joined 1 year ago
cake
Cake day: May 28th, 2024

help-circle













  • kitnaht@lemmy.worldBannedtoSelfhosted@lemmy.worldHow do I securely host Jellyfin? (Part 2)
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    29 days ago

    And again - if you put those behind a fail2ban; and you 404 5x in an hour, which is likely - you’ve solved that issue. Had my jellyfin instance publicly available for 2 years on its own VM with passthrough GPU, and haven’t had any issues. People poke around quite often, and get blackholed via the firewall for 30d.

    It wouldn’t stop a dedicated attacker, but I doubt anyone’s threat model here is that intense. Most compromised servers happen from automated attacks probing for vulnerabilities in order to get RCE; not probing for what movies you have – Because having movies on a media server doesn’t prove that you didn’t rip them all off of blu-ray…it just means you have movies.

    You’re not going to have 100% privacy when you put up ANY service on your network. Everything leaves a trace somehow; but I’m starting to think half of you are Chinese spies or something with the amount of paranoia people here show sometimes. :P



  • kitnaht@lemmy.worldBannedtoSelfhosted@lemmy.worldHow do I securely host Jellyfin? (Part 2)
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    2
    ·
    edit-2
    29 days ago

    If they need SSL certs, they’ve got to. Jellyfin doesn’t accept self-signed certs, which means DNS entries in a domain, and access from the internet.

    Really, honestly - what they need to do is just install Jellyfin on the Raspberry Pi and ditch the encryption requirement altogether. There’s no reason to have it on a LAN-only environment. They aren’t going to need it, nobody is going to MITM their lan environment, and VPNs will regularly allow LAN passthrough.

    If ProntonVPNs own client doesn’t allow LAN connections, they either need to swap to the Wireguard vanilla client (if that’s allowed on free tier), or upgrade their VPN service.

    OR switch VPNs altogether.

    There isn’t a way to do this without breaking one of their requirements

    Only options here are to publicly host with real SSL certs, on a domain and tunnel out – Or swap VPN providers/software so that you can achieve LAN access and forego HTTPS altogether.

    Edit: And sorry – the previous post is gone regarding their only needing access within the home, there’s no way I could have known that.

    There’s a bit of paranoia going on here to begin with - There’s no reason they need this level of “security” within their home network on the LAN side anyhow. They could possibly buy a managed switch and make the jellyfin server only visible to a specific vlan that didn’t include the router, but that doesn’t quite match up with what it sounds like they’re needing.



  • kitnaht@lemmy.worldBannedtoSelfhosted@lemmy.worldHow do I securely host Jellyfin? (Part 2)
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    29 days ago

    Do. And make sure your logs are piped through fail2ban.

    All of these “vulnerabilities”, require already having knowledge of the ItemIDs, and anyone without it poking around will get banned.

    The rest of them require a user be authenticated, but allows horizontal information gathering. These are not RCEs or anything serious. The ones which allowed cross-user information editing have been fixed.


  • kitnaht@lemmy.worldBannedtoSelfhosted@lemmy.worldHow do I securely host Jellyfin? (Part 2)
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    29 days ago

    Tailscale is only for the server/host. You’re not changing all of your VPN services over to this, you’re using it in a ‘reverse’ fashion. You’re VPN-ing the server out to the world so it’s reachable and you have port forwarding options, etc.

    From there, it can be reached by any client on the internet as a service. From there though, I don’t know how you’d get to it securely without a domain and SSL (Let’s Encrypt/Caddy) certs.

    A domain is only like $16/year. So it’s not prohibitively expensive.


  • kitnaht@lemmy.worldBannedtoPrivacy@lemmy.mlJWZ weighs in on Signal again
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    30 days ago

    I (wrongly) assumed that if he was hilarious to have made that graphic, that he’d maybe be more reasonable, hopefully funny. I was disappoint.

    It did kick off me spending about 2 hours comparing Signal to SimpleX, and Briar, and a bunch of others, and I can only conclude Signal is the best out of them. The security community seems to be REALLY paranoid about every, single, tiny little thing - but I understand that they must be.

    SimpleX doesn’t do any kind of IP address masking or have quantum resistant double ratchet encryption.

    Briar doesn’t account for rogue-tor nodes, etc.

    There’s just always some big glaring flaw in one of them.