this post was submitted on 09 Feb 2025
120 points (96.9% liked)

Selfhosted

42055 readers
592 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

This is a continuation of my other post

I now have homeassistant, immich, and authentik docker containers exposed to the open internet. Homeassistant has built in 2FA and authentik is being used as the authentication for immich which supports 2FA. I went ahead and blocked connections from every country except for my own via cloudlfare (I'm aware this does almost nothing but I feel better about it).

At the moment, if my machine became compromised, I wouldn't know. How do I monitor these docker containers? What's a good way to block IPs based on failed login attempts? Is there a tool that could alert me if my machine was compromised? Any recommendations?

EDIT: Oh, and if you have any recommendations for settings I should change in the cloudflare dashboard, that would be great too; there's a ton of options in there and a lot of them are defaulted to "off"

you are viewing a single comment's thread
view the rest of the comments
[–] peregus@lemmy.world 1 points 1 day ago (1 children)

If for whatever reason your firewall is down, there’s unrestricted access to your server…

I don't know what kind of firewall you use, but if my firewall is down there is NO traffic at all passing through!

And by the way, since I've replied to someone that don't want to use VPN because he doesn't want to give access to the whole network, I meant that he could use a VPN AND iptables to restrict the guest access to single services instead of the whole network.

[–] Xanza@lemm.ee 0 points 1 day ago (1 children)

I don’t know what kind of firewall you use, but if my firewall is down there is NO traffic at all passing through!

Only a hardware firewall would do this. If it's software, like implied in your post, no traffic is filtered and all connections are accepted.

VPN is the least amount of work for the most secure setup. There's nothing to even argue, its superior in every way.

[–] peregus@lemmy.world 1 points 1 day ago

Only a hardware firewall would do this. If it’s software, like implied in your post, no traffic is filtered and all connections are accepted.

Talking abut netfilter, since it manages also the forwardning, it for some strange reason it should crash, NO IP traffic is flowing

VPN is the least amount of work for the most secure setup. There’s nothing to even argue, its superior in every way.

If there's nothing to even argue, then I say goodby to you since I'm here to discuss. All the best!