this post was submitted on 17 Oct 2023
2 points (100.0% liked)

Self-Hosted Main

511 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

For Example

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

founded 1 year ago
MODERATORS
 

As title says, i'm curious about the worst case scenario in which an attacker tries to hit my system.

The system configuration is the following: i have some services (important ones) accessible only trough VPN, like SSH (key-based auth only), Pihole...Others are publicly accessible, like Immich, Jellyfin (and so on...).Public ones are accessible via reverse proxy (Caddy) and protected by CrowdSec (which bans IPs outside my country and those failing auth 3 times).

What could happen if an attacker finds out a vulnerability on some public service? Would he be only able to access service's files (like an appropriate login), or delete/encrypt data (as some cases of blackmail) or even pull out and steal my data?
I'm wondering this because i want to know if CrowdSec+Docker (to preserve permissions on the system) is enough to secure a server.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 1 year ago (1 children)

Could you elaborate more on immich and jellyfin? I suppose you're referring to a brute force attack. Isn't a geoip block + 3 fail attempt to be banned secure enough?

[–] [email protected] 1 points 1 year ago (1 children)

I’m referring to ZERO DAYs. OpenSSH is a serious security product. Those web apps are written by random people and probably riddled with vulnerabilities not known to public.

Here is the rule. Only a trusted vpn and ssh key authentication can be public.

[–] [email protected] 1 points 1 year ago

Sorry for the misunderstanding. Perfectly right. Thanks for that