this post was submitted on 01 Dec 2023
102 points (94.7% liked)

Selfhosted

40296 readers
389 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
102
submitted 11 months ago* (last edited 11 months ago) by jaykay to c/[email protected]
 

Hi, I know this topic has been talked about 70 thousand times but I’m still not sure.

I have home server on an intel NUC behind the ISP router. On it I have the standard arr apps, jellyfin, pi-hole etc etc. I would like to access them through a domain rather than an IP. So I set them up in docker, behind traefik, behind authelia and behind cloudflare. I am the only one that uses it.

Now, I’m worried about the security of it all. I’ve been searching here and there and I’ve read about cf tunnels, wireguard server, vps, vlan, OPNsense etc etc. I still don’t know what would be the most secure. Should I just stay with what I have?

EDIT: I'm not behind CGNAT

(page 2) 35 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 11 months ago

New Lemmy Post: Access home server from anywhere (https://lemmy.world/post/8998047)
Tagging: #SelfHosted

(Replying in the OP of this thread (NOT THIS BOT!) will appear as a comment in the lemmy discussion.)

I am a FOSS bot. Check my README: https://github.com/db0/lemmy-tagginator/blob/main/README.md

[–] [email protected] 1 points 11 months ago (2 children)

I want to have the same setup as you! Do you have any guides on how you did it?

load more comments (2 replies)
[–] [email protected] 1 points 11 months ago

My advice: only forward ports 8080 and 443, then make sure that you have fail2ban or crossed properly set up on your reverse proxy. After that, you are pretty much fine as long as you keep on top of updating your containers.

I would be careful about which apps you proxy. Idk why you need to access the admin portal for pi hole worldwide. If you really want to do that, you should set up a vpn.

[–] [email protected] 1 points 11 months ago (3 children)

My router supported OpenVPN out of the box so I just use that and have remote connections disabled in all of my software

I'm curious what the other, more advanced users here have to tell me about it because I'm still new to the self hosted stuff and that was the first thing I thought of to do

[–] [email protected] 2 points 11 months ago* (last edited 11 months ago)

Wireguard is just much faster connection-wise. Built into the kernel too. Since it came out I haven’t gone back to openvpn.

Nothing wrong with openvpn otherwise. More config options.

Something like Tailscale makes wireguard setup dead easy.

[–] [email protected] 1 points 11 months ago

why don't people just use chrome remote access to access and control your remote pc..? what can accessing your server as an IP do, that you can't do using chrome remote access?

load more comments (1 replies)
[–] [email protected] 1 points 11 months ago (1 children)

Twingate has been my go to. It’s amazing. Highly recommended.

[–] jaykay 1 points 11 months ago

Looks very similar to tailscale, thanks :)

load more comments
view more: ‹ prev next ›