this post was submitted on 17 Nov 2023
2 points (100.0% liked)

Self-Hosted Main

502 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

For Example

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

founded 1 year ago
MODERATORS
 

I have several selfhosted services that I have been using for months, now I wish to access these while I am not at home. Likes of nextcloud, nocodb, wikijs and other media sharing self-hosted services

I would like to know what precautions should I take so no one knows that such a domain exists.

should I purchase a crazy numbered domain like 671341412312.com ? or should I go for .tk domains.

Would like to get some suggestions from this community on other aspects that I am missing.

top 31 comments
sorted by: hot top controversial new old
[–] [email protected] 2 points 10 months ago

VPN is the way to go. Could use this opportunity to upgrade your router. I bought a box from protectli and run OPNsense on it. There's good documentation on how to set up a wireguard vpn, and the community is vibrant.

Its also nice because there's lots of options so its a nice thing to grow and learn with.

[–] [email protected] 1 points 10 months ago

If you go with a cert try to get a star cert that way you make it a little bit harder for hackers to find your subdomains.

[–] [email protected] 1 points 10 months ago (1 children)

ZeroTeir (or a VPN) - if all you want is to access those services from outside your network

IMO - the only reason to put something “on the internet” is so that the entire “internet” can access it

[–] [email protected] 1 points 10 months ago

this ^ I use ZeroTier, and then point subdomains under my personal domain name at the ZeroTier IP for each of my devices. Then I can use those hostnames but no one else can, and name based virtual hosting is easy via wildcard sub-sub-domains

For example plex.desktop.mydomain.com -> *.desktop.mydomain.com -> desktop.mydomain.com -> 10.x.x.x

[–] [email protected] 1 points 10 months ago (1 children)

This is my policy: For publicly accessible services like a website, I use a cloudflare tunnel. For restricted access to just a few users, I use a cloudflare tunnel and a cloudflare application to manage access authentication. For my exclusive restricted access to the infrastructure, I used tailscale.

[–] [email protected] 1 points 10 months ago

I will also be using cloudlfared, but will have to look at tailscale. Really appreciate you mentioning

[–] [email protected] 1 points 10 months ago (1 children)

Warning: tk domains registrar has 0 GDPR.

Might be irrelevant now, but I didn't managed to delete my data once I wanted out

[–] [email protected] 1 points 10 months ago (1 children)

I never really understood the concept behind their free domains, but I never purchased a free/cheap domain after my first experience of getting charged 2-3 times for renewal.

However, are you talking about deletion of your personal data or your website data ?

[–] [email protected] 1 points 10 months ago

Personal data.

They also moved a free domain that I have let expire to the paid ones, so if I wanted to renew I would have to pay... Which is kind of fair... They should also make money from somewhere...

When buying a domain read all the details: renewal fee are mentioned there. For me they were turnoffs in some cases.

I now have a .ovh as a cheap alternative. Iirc they are dirt cheap when you reserve the domain for 3 years...

[–] [email protected] 1 points 10 months ago

Try using Tailscale. It's easy to use & free for personal use. It will only allow devices with Tailscale installed to view your self-hosted services. They have clients for mobile devices, PC's, Mac's and even Apple TV etc. Their technology is based on Wireguard so it's very fast and secure.

https://tailscale.com/

[–] [email protected] 1 points 10 months ago

6 to 9 digit .xyz domains are only around $1 a year, every year. That's what I did and definitely recommend it. You can read more here.

[–] [email protected] 1 points 10 months ago

Getting an obscure domain name doesn’t matter as attackers go straight to the IP address. If you have a certificate on your secret domain name, they have your domain the moment they hit port 443.

Don’t use “security through obscurity”; instead just secure your services or host a VPN.

[–] [email protected] 1 points 10 months ago

Seriously as everyone suggests: use tailscale or another VPN. Tailscale is incredbly easy to setup.

[–] [email protected] 1 points 10 months ago

Use tailscale

[–] [email protected] 1 points 10 months ago
  • install opnsense
  • set up geoip block where only IPs from your own country can ever initiate connection from the outside
  • keep your stuff up to date
  • enjoy security
[–] [email protected] 1 points 10 months ago

Crazy number domain doesn't provide any security but you can buy a 1.111B class .XYZ domain for as cheap as 0,62USD a year

[–] [email protected] 1 points 10 months ago

Isn't this what VPNs were invented for?

[–] [email protected] 1 points 10 months ago

VPN would be the quick and dirty

If it’s just select items, an service like azure app proxy maybe

[–] [email protected] 1 points 10 months ago

cloudflare / cloudflared. No ports exposed, static or dynamic ips do not matter.

[–] [email protected] 1 points 10 months ago

If it is just for you and no one else you could set up something like twingate in place of a vpn or punching holes in your network. When im out of town or just need to access something internaly when im gone, as long as. I am connected to my twingate connector i have access the what i need. Its also super easy to granularly set access controls to only allow access to systems on specific ports etc. Took the headache of port forwarding, ipsec, and vpn and made it simple to manage and access what i need. Simply run the connector in docker and your all good. Heres the link if you wanna read up on it or try it out. link

[–] [email protected] 1 points 10 months ago

Couldn't you just get a regular domain and use a firewall to prevent access, so only your IP address(s) are able to access it.

I'm currently doing this myself, however I have a VPN on my local network that allows me access to my self-hosted service remotely as if I was at home.

There are other things you can do with cloudflare that will lock the sites down with authentication, but VPN and firewall have worked pretty well for my use cases.

[–] [email protected] 1 points 10 months ago

For just yourself? Get a domain that you can actually remember and use and then set up a WireGuard server (I recommend the Linuxserver.io WireGuard image)

Use that to access your stuff

Do you have 1 thing you desparately need to be publicly accessible? VLAN the VM off so it's on its own and put a reverse proxy in front of it with HTTPS (and ideally MFA if you need auth)

[–] [email protected] 1 points 10 months ago

You could use Zerotier. With zerotier you can create a private network between your server and as many as 24 other devices (i.e your phone, your laptop...)

It doesn't expose your stuff to the whole internet. You have to manually approve the devices you want to add to the private network through zerotier website. Even if you share the links with other people, they will simply not work

I just did this for my Raspberry pi, and now pihole filters my internet traffic even when I'm away.

Seriously, look it up, it's free up to 25 connections and since it's private you don't need to go crazy about protecting your server from DDoS or buying a domain name or anything.

[–] [email protected] 1 points 10 months ago

Have you heard about Twingate? It's kinda like a VPN but not really. It's free and does everything I need. If it's just for self use I think it's enough.

[–] [email protected] 1 points 10 months ago

If the domain isn't critical if it changes, you could use freedns.afraid.org.

I've been using the free version for over a decade (but did donate recently). A couple of domains have come and gone, so I've had to pick new ones, but it's not a big deal.

[–] [email protected] 1 points 10 months ago

Use cloudflared and Cloudflare Zero Trust / Access. You tunnel your services to Cloudflare, who then secures them behind a 2FA wall. No traffic ever goes to anyone aside from you.

[–] [email protected] 1 points 10 months ago

this is what i did. a 10 CHAR domain of only numbers with .win

[–] [email protected] 1 points 10 months ago

Free domains such as .tk or .cf are scanned by various bots as soon as they are created. I remember when I created a domain and forwarded it to my server. The spam and attacks that subsequently hit my server were very high. Significantly higher than with a domain that I paid for.

I therefore strongly recommend staying away from these free domains.

Good luck with your project :)

[–] [email protected] 1 points 10 months ago

I use WireGuard for most stuff. My Nextcloud instance is open though because I lien to upload photos I take pretty quickly to keep a backup

[–] [email protected] 0 points 10 months ago (1 children)

Out of curiosity. If someone is accessing self hosted services only from certain locations where ip addresses are known, is it a good idea to whitelist those ips in firewall and block external access for the rest?

[–] [email protected] 1 points 10 months ago