DefederateLemmyMl

  • Gen𝕏
  • Engineer ⚙
  • Techie 💻
  • Linux user 🐧
  • Ukraine supporter 🇺🇦
  • Pro science 💉
  • Dutch speaker
  • 0 Posts
  • 262 Comments
Joined 2 years ago
cake
Cake day: August 8th, 2023

help-circle


  • What I used to do was: I put jellyfin behind an nginx reverse proxy, on a separate vhost (so on a unique domain). Then I added basic authentication (a htpasswd file) with an unguessable password on the whole domain. Then I added geoip firewall rules so that port 443 was only reachable from the country I was in. I live in small country, so this significantly limits exposure.

    Downside of this approach: basic auth is annoying. The jellyfin client doesn’t like it … so I had to use a browser to stream.

    Nowadays, I put all my services behind a wireguard VPN and I expose nothing else. Only issue I’ve had is when I was on vacation in a bnb and they used the same IP range as my home network :-|









  • If it is your single purpose to create a blocklist of suspect IP addresses, I guess this could be a honeypot strategy.

    If it’s to secure your own servers, you’re only playing whack-a-mole using this method. For every IP you block, ten more will pop up.

    Instead of blacklisting, it’s better to whitelist the IP addresses or ranges that have a legitimate reason to connect to your server, or alternatively use someting like geoip firewall rules to limit the scope of your exposure.






  • I like user respecting operating systems, that is the deal breaker.

    If you insert snap into apt package management, so that you can go behind the user’s back, re-enable snap and install a snap anyway if a user tries to apt install firefox, you don’t respect the user’s choice. It’s the kind of thing we give Microsoft shit for.

    And yes I know it can be worked around and disabled and whatnot by jumping through various hoops, but that’s beside the point. As a matter of principle, I will just use something that doesn’t do this. KDE on Debian works just as well as Kubuntu anyway.