When I first got into self hosting, I originally wanted to join the Fediverse by hosting my own instance. After realizing I am not that committed to that idea, I went into a simpler direction.

Originally I was using Cloudflare’s tunnel service. Watching the logs, I would get traffic from random corporations and places.

Being uncomfortable with Cloudflare after pivoting away from social media, I learned how to secure my device myself and started using an uncommon port with a reverse proxy. My logs now only ever show activity when I am connecting to my own site.

Which is what lead me to this question.

What do bots and scrapers look for when they come to a site? Do they mainly target known ports like 80 or 22 for insecurities? Do they ever scan other ports looking for other common services that may be insecure? Is it even worth their time scanning for open ports?

Seeing as I am tiny and obscure, I most likely won’t need to do much research into protecting myself from such threats but I am still curious about the threats that bots pose to other self-hosters or larger platforms.

  • A_norny_mousse@feddit.org
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 days ago

    There are a few very simple things that don’t improve security per se but help break the onslaught. One of them would be to not use standard ports for ssh etc. Another could be to use non-standard usernames (not “admin”). Or rename URLs from the standard “admin.php” or “/contact” to something else.

    • confusedpuppy@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      24 hours ago

      I use a different port for SSH, I also have use authorized keys. My SSHD is setup to only accept keys with no passwords and no keyboard input. Also when I run nmap on my server, the SSH port does not show up. I’ve never been too sure how hidden the SSH port is beyond the nmap scan but just assumed it would be discovered somehow if someone was determined enough.

      In the past month I did rename my devices and account names to things less obvious. I also took the suggestion from someone in this community and setup my TLS to use wildcard domain certs. That way my sub domains aren’t being advertised on the public list used by Certificate Authorities. I simply don’t use the base domain name anymore.

      • A_norny_mousse@feddit.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        23 hours ago

        SSH keys are absolutely essential, but those are actual security as opposed to what I wrote above. I should’ve made that clearer.

        My SSHD is setup to only accept keys with no passwords and no keyboard input.

        I don’t see how that improves security. Surely an SSH key with an additional passphrase is more secure than one without.

        • confusedpuppy@lemmy.dbzer0.comOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          23 hours ago

          I agree with the last point, I only mentioned that because I don’t really know what other setting in my SSHD config is hiding my SSH port from nmap scans. That just happened to be the last change I remember doing before running an nmap scan again and finding my SSH port no longer showed up.

          Accessing SSH still works as expected with my keys and for my use case, I don’t believe I need an additional passphrase. Self hosting is just a hobby for me and I am very intentional with what I place on my web facing server.

          I want to be secure enough but I’m also very willing to unplug and walk away if I happen to catch unwanted attention.

          • A_norny_mousse@feddit.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            20 hours ago

            Sounds like a healthy attitude towards online security.

            I’m doing my first ever nmap scan right now, thanks for the inspiration. It’s taking a long time - either my ISP does not like what I’m doing there or I’m being too thorough - but it looks like it does not see my SSH port either.

            • confusedpuppy@lemmy.dbzer0.comOP
              link
              fedilink
              English
              arrow-up
              1
              ·
              22 hours ago

              I started with a local scan first, something like nmap 192 168.40.xxx for a specific device or nmap 192.168.40.0/24 for everything in your current network.

              Nmap is quite complex with lots of options but there’s a lot of guides online to help out with the basics. You can press enter in your terminal while the scan is running and it should give a progress report.