• 0 Posts
  • 116 Comments
Joined 1 year ago
cake
Cake day: May 28th, 2024

help-circle






  • kitnaht@lemmy.worldtoSelfhosted@lemmy.worldHow do I securely host Jellyfin? (Part 2)
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    4 months ago

    And again - if you put those behind a fail2ban; and you 404 5x in an hour, which is likely - you’ve solved that issue. Had my jellyfin instance publicly available for 2 years on its own VM with passthrough GPU, and haven’t had any issues. People poke around quite often, and get blackholed via the firewall for 30d.

    It wouldn’t stop a dedicated attacker, but I doubt anyone’s threat model here is that intense. Most compromised servers happen from automated attacks probing for vulnerabilities in order to get RCE; not probing for what movies you have – Because having movies on a media server doesn’t prove that you didn’t rip them all off of blu-ray…it just means you have movies.

    You’re not going to have 100% privacy when you put up ANY service on your network. Everything leaves a trace somehow; but I’m starting to think half of you are Chinese spies or something with the amount of paranoia people here show sometimes. :P



  • kitnaht@lemmy.worldtoSelfhosted@lemmy.worldHow do I securely host Jellyfin? (Part 2)
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    2
    ·
    edit-2
    4 months ago

    If they need SSL certs, they’ve got to. Jellyfin doesn’t accept self-signed certs, which means DNS entries in a domain, and access from the internet.

    Really, honestly - what they need to do is just install Jellyfin on the Raspberry Pi and ditch the encryption requirement altogether. There’s no reason to have it on a LAN-only environment. They aren’t going to need it, nobody is going to MITM their lan environment, and VPNs will regularly allow LAN passthrough.

    If ProntonVPNs own client doesn’t allow LAN connections, they either need to swap to the Wireguard vanilla client (if that’s allowed on free tier), or upgrade their VPN service.

    OR switch VPNs altogether.

    There isn’t a way to do this without breaking one of their requirements

    Only options here are to publicly host with real SSL certs, on a domain and tunnel out – Or swap VPN providers/software so that you can achieve LAN access and forego HTTPS altogether.

    Edit: And sorry – the previous post is gone regarding their only needing access within the home, there’s no way I could have known that.

    There’s a bit of paranoia going on here to begin with - There’s no reason they need this level of “security” within their home network on the LAN side anyhow. They could possibly buy a managed switch and make the jellyfin server only visible to a specific vlan that didn’t include the router, but that doesn’t quite match up with what it sounds like they’re needing.



  • kitnaht@lemmy.worldtoSelfhosted@lemmy.worldHow do I securely host Jellyfin? (Part 2)
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    edit-2
    4 months ago

    Do. And make sure your logs are piped through fail2ban.

    All of these “vulnerabilities”, require already having knowledge of the ItemIDs, and anyone without it poking around will get banned.

    The rest of them require a user be authenticated, but allows horizontal information gathering. These are not RCEs or anything serious. The ones which allowed cross-user information editing have been fixed.


  • kitnaht@lemmy.worldtoSelfhosted@lemmy.worldHow do I securely host Jellyfin? (Part 2)
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    4 months ago

    Tailscale is only for the server/host. You’re not changing all of your VPN services over to this, you’re using it in a ‘reverse’ fashion. You’re VPN-ing the server out to the world so it’s reachable and you have port forwarding options, etc.

    From there, it can be reached by any client on the internet as a service. From there though, I don’t know how you’d get to it securely without a domain and SSL (Let’s Encrypt/Caddy) certs.

    A domain is only like $16/year. So it’s not prohibitively expensive.


  • kitnaht@lemmy.worldtoHacker News@lemmy.bestiver.seOpen-Source Is Just That
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    4 months ago

    If it does not meet the open source definition from the OSI, it is not open source. Source-available, is not the same thing. It is a ploy used by morons to hijack the meaning of the word, in order to gain the benefits of the communities surrounding open source.

    OSI defintion requires:

    1. Free Redistribution

    The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale.

    1. Source Code

    The program must include source code, and must allow distribution in source code as well as compiled form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost, preferably downloading via the Internet without charge. The source code must be the preferred form in which a programmer would modify the program. Deliberately obfuscated source code is not allowed. Intermediate forms such as the output of a preprocessor or translator are not allowed.

    1. Derived Works

    The license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software.

    1. Integrity of The Author’s Source Code

    The license may restrict source-code from being distributed in modified form only if the license allows the distribution of “patch files” with the source code for the purpose of modifying the program at build time. The license must explicitly permit distribution of software built from modified source code. The license may require derived works to carry a different name or version number from the original software.

    1. No Discrimination Against Persons or Groups

    The license must not discriminate against any person or group of persons.

    1. No Discrimination Against Fields of Endeavor

    The license must not restrict anyone from making use of the program in a specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research.

    1. Distribution of License

    The rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties.

    1. License Must Not Be Specific to a Product

    The rights attached to the program must not depend on the program’s being part of a particular software distribution. If the program is extracted from that distribution and used or distributed within the terms of the program’s license, all parties to whom the program is redistributed should have the same rights as those that are granted in conjunction with the original software distribution.

    1. License Must Not Restrict Other Software

    The license must not place restrictions on other software that is distributed along with the licensed software. For example, the license must not insist that all other programs distributed on the same medium must be open source software.

    1. License Must Be Technology-Neutral

    No provision of the license may be predicated on any individual technology or style of interface.





  • Even mainstream media has said the same thing. CNN themselves have said that Democrats failed to be the party of the people and that Republicans somehow managed to take up that mantle. They did. They won all of the swing states. Dems weren’t about the people at all; they were about maintaining the status quo and being controlled opposition.