95
submitted 11 months ago* (last edited 11 months ago) by jaykay@lemmy.zip to c/selfhosted@lemmy.world

Hi, I know this topic has been talked about 70 thousand times but I’m still not sure.

I have home server on an intel NUC behind the ISP router. On it I have the standard arr apps, jellyfin, pi-hole etc etc. I would like to access them through a domain rather than an IP. So I set them up in docker, behind traefik, behind authelia and behind cloudflare. I am the only one that uses it.

Now, I’m worried about the security of it all. I’ve been searching here and there and I’ve read about cf tunnels, wireguard server, vps, vlan, OPNsense etc etc. I still don’t know what would be the most secure. Should I just stay with what I have?

EDIT: I'm not behind CGNAT

(page 2) 33 comments
sorted by: hot top controversial new old
[-] Evotech@lemmy.world 2 points 11 months ago

Cloudflare is just so nice. Handles ssl for all your sites automatically.

[-] possiblylinux127@lemmy.zip 2 points 11 months ago

First off, don't expose anything that doesn't need exposed. If your the only one using it you could use a VPN or ssh.

Second off, make sure you isolate everything with firewalls. Your reverse proxy should only have access to each service and each service should only have access to the reverse proxy. You should also block non essential ports.

For the services themselves, make sure you use strong passwords and keep them updated. For docker you can use watchtower to automatically pull and deploy software.

[-] Apollo2323@lemmy.dbzer0.com 1 points 11 months ago

I want to have the same setup as you! Do you have any guides on how you did it?

load more comments (2 replies)

My router supported OpenVPN out of the box so I just use that and have remote connections disabled in all of my software

I'm curious what the other, more advanced users here have to tell me about it because I'm still new to the self hosted stuff and that was the first thing I thought of to do

[-] ebits21@lemmy.ca 2 points 11 months ago* (last edited 11 months ago)

Wireguard is just much faster connection-wise. Built into the kernel too. Since it came out I haven’t gone back to openvpn.

Nothing wrong with openvpn otherwise. More config options.

Something like Tailscale makes wireguard setup dead easy.

load more comments (1 replies)
[-] angelsomething@lemmy.one 1 points 11 months ago

Twingate has been my go to. It’s amazing. Highly recommended.

[-] jaykay@lemmy.zip 1 points 11 months ago

Looks very similar to tailscale, thanks :)

[-] spark947@lemm.ee 1 points 11 months ago

My advice: only forward ports 8080 and 443, then make sure that you have fail2ban or crossed properly set up on your reverse proxy. After that, you are pretty much fine as long as you keep on top of updating your containers.

I would be careful about which apps you proxy. Idk why you need to access the admin portal for pi hole worldwide. If you really want to do that, you should set up a vpn.

load more comments
view more: ‹ prev next ›
this post was submitted on 01 Dec 2023
95 points (94.4% liked)

Selfhosted

40199 readers
258 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS