this post was submitted on 26 Dec 2025
14 points (85.0% liked)

Selfhosted

53917 readers
756 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Well, hello there.

I run several services on my NAS at home.

I have a domain which always points at home and redirects port 80 to wikipedia.

Almost all ports are not forwarded, only for those which i want to have access to.

Example:

  • Paperless
  • Syncthing
  • FreshRSS

Now i work on my corporate computer and i cant access my services.

Why?

It blocks connections which go to a specific port.

Now i would love to access freshrss on adress:

Www.domainexample.com:1234

Which gets blocked.

Any ideas?

Messing with the local pc is of course forbidden.

top 13 comments
sorted by: hot top controversial new old
[–] frongt@lemmy.zip 16 points 12 hours ago

I would recommend not exposing a bunch of services to the internet. Ideally you would expose only a VPN and connect to everything that way.

[–] eksb@programming.dev 59 points 16 hours ago (3 children)

I would advise to not do personal stuff on your work computer.

[–] papertowels@mander.xyz 2 points 5 hours ago

This seems like a great way to be fired for a misunderstanding. It's not worth it.

[–] ExcessShiv@lemmy.dbzer0.com 8 points 9 hours ago (1 children)

Definitely this...never ever do anything personal from company issued devices. I barely even let my work laptop access my WiFi when WFH.

[–] harmbugler@piefed.social 3 points 4 hours ago

Yes, even if you are using it you are not the owner and do not control it; any corporate laptop is an untrusted device at home.

[–] ieGod@lemmy.zip 5 points 10 hours ago

1000x this.

[–] jeena@piefed.jeena.net 27 points 17 hours ago (2 children)

Just use port 443 or 80 and use sub domains and a reverse proxy for each of your services.

For example:

https://rss.example.com/ goes to port 443 on your server where you run a nginx with letsencrypt. You set up a vhost for this subdomain which then internally proxies to your IP adress and port for freshrss.

I have it like that: https://rss.jeena.net/ and https://piefed.jeena.net/ and https://toot.jeena.net/ and so on.

[–] stratself@lemdro.id 9 points 16 hours ago

Beat me to it. This is likely the best way as 443 is ubiquitously unblocked on most networks

[–] jeena@piefed.jeena.net 3 points 16 hours ago

If you don't want to mess with SSL you can do the same with port 80.

[–] Brkdncr@lemmy.world 6 points 13 hours ago

Enterprise firewalls can detect if you’re running services on non-standard ports.

For example if you try to use ssh on port 443, I block that.

If you try to use https on 8443 I block that.

Also if your domain is on a dynamic dns domain or is relatively new then it might get blocked.

[–] KarnaSubarna@lemmy.ml 5 points 12 hours ago

Use a reverse proxy like Traefik to access your seevices via subdomain like paperless.uourdomain.com.

The advantage of that approach is you will be connected to Traefik on port either 443 or 80 (based on your Traefik setup). Most firewall will allow connection to port 443 or 80.

[–] sylver_dragon@lemmy.world 6 points 14 hours ago

I can think of a couple of reasons off the top of my head.

You don't say, but I assume you are working on-site with your work system. So, the first consideration would be a firewall at your work's network perimeter. A common security practice is to block outbound connections on unusual ports. This usually means anything not 80/tcp or 443/tcp. Other ports will be allowed on an exception basis. For example, developers may be allowed to access 22/tcp outbound, though that may also be limited to only specific remote IP addresses.

You may also have some sort of proxy and/or Cloud Access Security Broker (CASB) software running on your work system. This setup would be used to inspect the network connections your work system is making and allow/block based on various policy settings. For example, a CASB might be configured to look at a domain reputation service and block connections to any domain whose reputation is consider suspect or malicious. Domains may also be blocked based on things like age, or category. For this type of block, the port used won't matter. It will just be "domain something.tld looks sketchy, so block all the things". With "sketchy" being defined by the company in it's various access policies.

A last reason could be application control. If the services you are trying to connect to rely on a local program running on your work system, it's possible that the system is set to prevent unknown applications from running. This setup is less common, but it growing in popularity (it just sucks big old donkey balls to get setup and maintain). The idea being that only known and trusted applications are allowed to run on the system, and everything else is blocked by default. This looks like an application just crashing to the end user (you), but it provides a pretty nice layer of protection for the network defenders.

Messing with the local pc is of course forbidden.

Ya, that's pretty normal. If you have something you really need to use, talk with your network security team. Most of us network defenders are pretty reasonable people who just want to keep the network safe, without impacting the business. That said, I suspect you're going to run into issues with what you are trying to run. Something like SyncThing or some cloud based storage is really useful for businesses. But, businesses aren't going to be so keen to have you backing their data up to your home server. Sure, that might not be your intention, but this is now another possible path for data to leave the network which they need to keep an eye on. All because you want to store your personal data on your work system. That's not going to go over well. Even worse, you're probably going to be somewhat resistant when they ask you to start feeding your server's logs into the businesses log repository. Since this is what they would need to prove that you aren't sending business data to it. It's just a bad idea all around.

I'd suspect Paperless is going to run into similar issues. It's a pretty obvious way for you to steal company data. Sure, this is probably not your intention, but the network defenders have to consider that possibility. Again, they are likely to outright deny it. Though if you and enough folks at your company want to use something like this, talk with your IT teams, it might be possible to get an instance hosted by the business for business use. There is no guarantee, but if it's a useful productivity package, maybe you will have a really positive project under your belt to talk about.

FreshRSS you might be able to get going. Instead of segregating services by port, stand up something like NGinx on port 443 and configure it as a reverse proxy. Use host headers to separate services such that you have sync.yourdomain.tld mapped to your SyncThing instance, office.yourdomain.tld mapped to your paperless instance and rss.yourdomain.tld mapped to FreshRSS. This gets you around issues with port blocking and makes managing TLS certificates easier. You can have a single cert sitting in front of all your services, rather than needing to configure TLS for each service individually.

[–] atzanteol@sh.itjust.works 2 points 16 hours ago* (last edited 14 hours ago)

Ssh port forwarding and socks proxying. Unless they block port 22.

Edit: If they do block port 22 run ssh on port 443.