view the rest of the comments
Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
ELI5? 😅
The install section of naxsi is a whole lotta stuff I've never touched before
sorry, this is kinda like a firewall, but protecting websites, so many vulnerabilities are filtered out. it does not protect you 100% percent (nothing does). it might be hard to setup, in that case there is an option to use waf as a service, i.e. - cloudflare has such offering, maybe there are others as well. i have looked into vultr - they seem to offer only a "usual" type of firewall, not http/application based.
Ah ok thanks for the info! Do you know if vultrs firewall would make installing fail2ban redundant?
if you configure ssh access only from your home ip - then fail2ban is not needed.
But if your home ip ever changes, you‘re fucked. I would never do that. Pubkey is the way.
usually i add more than 1 ip and also vultr firewall can be managed to change ip. tailscale can be used as well. there are options!
That’s good! Had me worried there.
Method of authentication doesn't matter if there's a pre-authentication vulnerability: https://thehackernews.com/2023/02/openssh-releases-patch-for-new-pre-auth.html
Instead of exposing multiple services, I would recommend just one VPN for remote access. Less attack surface.
Thats how I do it. But I also have physical access so if the vpn fails I don’t get locked out.
Oh perfect thanks