this post was submitted on 12 Jun 2023
539 points (99.4% liked)

Selfhosted

39903 readers
463 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

A simple question to this community, what are you self-hosting? It's probably fun to hear from each-other what services we are running.

Please mention at least the service (e.g. e-mail) and the software (e.g. postfix). Extra bonus points for also mentioning the OS and/or hardware (e.g. Linux Distribution, raspberry pi, etc) you are running on.

you are viewing a single comment's thread
view the rest of the comments
[–] Stimmed@reddthat.com 29 points 1 year ago (5 children)

As an offensive security worker.... I can't help but read people listing out their attack surface πŸ˜‚

[–] AyyLMAO@exploding-heads.com 28 points 1 year ago (2 children)

My RISV-V server (I have removed all binary blobs and have no closed source code ofc) is airgapped inside a Faraday cage.

For security reasons I never turn it on.

[–] constantokra@lemmy.one 7 points 1 year ago

I like how you think.

[–] sshff@lemmy.sdf.org 1 points 1 year ago

All my deploys are written in binary on a stack of index cards that we then burn, put in a zip lock bag, encase in concrete, surround in a welded closed steel box, and throw in the Mariana Trench. The documentation sucks though.

[–] linearchaos@lemmy.world 9 points 1 year ago

I'm not sure the list is really that big of a deal for a home gamer. They're probably more in danger from their choice of home audio appliances and that microwave that has been sitting on their network for 10 years which no longer gets updates. Or that 2019 Plex server they have put forwarded straight outside.

It's actually one of my beefs with containers, You can't keep track of The versions for everything and you're at the mercy of the maintainers to keep individual packages updated.

[–] bosse@sh.itjust.works 7 points 1 year ago

Nah, it's all safe, it's in containers

[–] punkskunk@sh.itjust.works 2 points 1 year ago (1 children)

Question from someone learning security - if no firewall ports are opened and UPnP is off, does running these sorts of services on your LAN substantially increase your attack surface? I imagined risks were minimal outside of running a compromised application.

[–] Stimmed@reddthat.com 3 points 1 year ago (1 children)

It was meant more as a joke than criticizing hosting your own services. I personally have a VPN with MFA, and services that I host for my self that are segmented to a paranoid level (home camera system on own vlan, restricted from being able to reach any other vlan or the Internet, etc) with a deny all and explicit allows on per host and traffic type. The amount of work that went into building the network is probably overkill, and it is still susceptible to nation state and supply chain compromise but hopefully whoever gets in will curse me if they try to move around the network.

Realistically, every added service and host is added attack surface and chances for misconfiguration \ supply chain attack, but being alive is a risk too....

I'm guessing system admins and dev op is over represented here so some of our home networks may be targeted as a path into a corporate environment, but I'm guessing the chances are low. Sadly even the most secure networks are not an impossible target. The attackers are well ahead of defenders of networks. Attackers need exceptions, while defenders need everything perfect. Much harder to accomplish.

[–] punkskunk@sh.itjust.works 2 points 1 year ago* (last edited 1 year ago) (1 children)

Thanks, I agree with you and have a similar approach. I'm mostly interested in learning best practices, I don't bother hosting juicy targets like Bitwarden. If an attacker really wants to put in the work to get the scanned manual for my 2009 Black & Decker toaster oven I probably can't stop them.

[–] Stimmed@reddthat.com 1 points 1 year ago

For best practice, my personal recommendation would be to not have any service public facing besides a VPN that requires MFA. segment self hosted services into separate VLANs based on how sensitive the content is. Disallow all traffic between VLANs unless required and only allow based on port number, specific resources needed. Don't forgot to disable outgoing Internet access unless required. Devices like Chinese made video cameras should never have an Internet connection.

My network looks something like: home vlan, work vlan, Netflix \ hulu streaming devices, cctv, wireless work, wireless home, wireless guest, iot, servers, network management. Would be way overkill for vast majority of people, but I would be hypocritical not to considering what I do and I do have a different threat profile than most.

Another thought: self hosted through VPN with MFA and nothing public facing is probably safer than cloud as long as you have cold backups.

[–] constantokra@lemmy.one 2 points 1 year ago (1 children)

A lot of them are likely behind wireguard. At least, I hope a lot of them are.

[–] hegemonsushi@lemmy.world 2 points 1 year ago (1 children)

You'd hope, but I have a few friends who simply port-expose their media servers.

I guess it could be worse if they had ssh exposed.

[–] constantokra@lemmy.one 2 points 1 year ago (1 children)

I'll have to disagree with you there. SSH is super well maintained and understood, and massively useful for the risk you do run. Who knows what's going on with all the random projects people are hosting. I'd rather have SSH exposed than almost anything else.

What would you do to provide access to some less tech savvy friends. I'm thinking of dropping a SBC with wireguard and a proxy onto a friend's network, that way everything is under my control, and I can lock down the wireguard connection however I want, but I haven't gone down that route yet.

[–] hegemonsushi@lemmy.world 1 points 1 year ago

I was thinking more along the lines of simply thowing up a port to SSH into. No Fail2Ban and no keys, just a password.

I would just containerize and reverse proxy, but I understand the hesitation, wireguard would be preferable.