What’s up, what’s down and what are you not sure about?

Let us know what you set up lately, what kind of problems you currently think about or are running into, what new device you added to your homelab or what interesting service or article you found.

  • Donn@slrpnk.net
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    3 days ago

    Shoutout to @[email protected] for helping me appreciate the joy of docker compose. I got to set up Navidrome and it’s been great!

    With that said, I have a security-related question: at what point in self-hosting am I exposed to the outside internet that warrants things like reverse proxies and other security measures? I’m currently typing router IPs (e.g. 192.168.x.x) to access the services, so is my machine exposed if the only people intending to connect are local on our wireless network?

    • yabai@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 days ago

      There’s nothing wrong with making a reverse proxy only for use inside your homelab. It’s one way to resolve internal DNS queries and give addresses to your services. It’s perhaps the best, because it’s the only way I know that doesn’t necessitate remembering port numbers.

      E.g. You are hosting something at 192.168.1.20 on port 3310. Even if you set a local DNS record for pihole.itjust.donn to resolve to 192.168.1.20, you’ll still have to type pihole.itjust.donn:3310 to access it. The same isn’t true with a reverse proxy.

      • Donn@slrpnk.net
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 days ago

        This is good to know because I’m learning about nginx currently, so I’m glad it has practical use without opening up my network 🤘

        • yabai@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          2 days ago

          Call me careless, but I personally don’t think exposing services publicly is that big of a deal. I’ve been publicly exposing Home Assistant, Jellyfin, Immich, Joplin and a few others for at least 3 years now with no repercussions. Everyone’s risk tolerance is different, but I wouldn’t write off publicly available services. Precautions like a reverse proxy, Crowdsec, Fail2ban, and Authelia all lower the risk profile.

    • tofu@lemmy.nocturnal.gardenOP
      link
      fedilink
      English
      arrow-up
      5
      ·
      3 days ago

      To expose your stuff to the outside internet, you need to actively set port forward in your internet router, you won’t do that by accident.

      • Donn@slrpnk.net
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        3 days ago

        What a relief, thanks for the clarity! I have vague memories of doing that as a teenager to play various games with friends, which sounds like something risky a teenager would do 😅