- 3 Posts
- 45 Comments
callcc@lemmy.worldto
Selfhosted@lemmy.world•VERY simple web-based reliable file browser/hostingEnglish
1·6 months agoDon’t recommend using FTP. It’s a shitty old protocol that needs to die. Just use nginx or apache with directory listing enabled.
callcc@lemmy.worldto
Selfhosted@lemmy.world•Friendly reminder that Tailscale is VC-funded and driving towards IPOEnglish
12·7 months agoJust came here to say that the guy looks like a creep!
No, I rarely read the code of software I use, especially crypto code since thant’s not my thing. But good to know that you did. Thanks for your opinion.
Please tell us more about the actual security problems!
Emacs with LSP and magit rules!
callcc@lemmy.worldto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
1·10 months agoAgreed!
callcc@lemmy.worldto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
6·10 months agoBe sure to use a passphrase
callcc@lemmy.worldto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
1·10 months agoI don’t agree about the point concerning cost. You have additional training, update, maintenance and config burden. This on top of the burdon of using the VPN on top of ssh.
callcc@lemmy.worldto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
1·10 months agoOk, fair point. But why stop at one vpn? I choose to trust OpenSSH, but I agree that adding a secondary layer of security actually helps here. You basically multiply two very low probabilities to get an even lower one. The trade-off is that you add complexity. You now need to keep two services up to date, and correctly configured and access/key material distributed.
I’d only recommend this setup for projects with special security requirements.
callcc@lemmy.worldto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
21·10 months agoAnd why exactly is that more secure?
callcc@lemmy.worldto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
37·10 months agoWelcome to the internet! Your system will get probed. Make sure you run as little as possible services on open ports and only high quality ones such as OpenSSH. Don’t freak out because of your logs. You’re fine as long as your system is up to date and password login disabled! Don’t listen to the fail2ban or VPN crowd. Those are only snake oil.
A VPN is probably just as (in)secure as OpenSSH. There is no gain in complicating things. OpenSSH is probably one of the most well tested code for security around.
callcc@lemmy.worldto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
51·10 months agoPublic ssh is completely fine as long as you use key based auth only and keep your sshd up to date. Stop spreading bullshit.
Welcome to the internet. You will be probed. Just as your immune system, or rather your body, is being probed.
Just don’t run broken software. The attackers will not be able to exploit you then. If they have zero day exploits, the WAF will most of the time not save you since they are often pretty easy to circumvent. WAFs are only effective against old and shitty exploits that should be patched anyways since ages.
Attack surface is made of the amount of code that is running when an attacker speaks to your machine. Imagine a freshly installed GNU/Linux distro with no services. The attack surface is minimal. All packages sent to your machine will only ever be touched by relatively limited parts of the linux TCP/IP stack and NIC driver. If you now run a web server, the package coes through the NIC driver, TCP/IP stack and web server. The surface is increased. Each of these parts of your machine’s code could have bugs. The more code your attacker’s packet runs through, the more opportunity to make your machine do things you don’t like.
If you want your machine to do what you like but not what random attackers like, it is therefore mandatory to have the least amount of attack surface, not adding code in contact with your attacker like a WAF or “antivirus”. Both these kind of softwares will inspect the packages coming in an take decisions (potentially bad ones) based on the content.
WAFs will mostly not help you since on a well configured and patched system, little known bugs are exposed. They might help you occasionally but usually patching the system is more effective. Of you want this to happen automatically, it’s entirely possible. Most os’s allow automatic unattended upgrades.
Wafs don’t make you safer but create unnecessary attack surface. Just keep your machine and services up to date.
callcc@lemmy.worldto
Selfhosted@lemmy.world•Email provider for home server alertsEnglish
1·11 months agoThey rock.I’m sometimes afraid they will be bought or change terms.
I beg to disagree about the disadvantages. An important one is that you cannot easily update shared libraries globally. This is a problem with things like libssl or similar. Another disadvantage is the added complexity both wrt. to operation but also in general the amount of code running. It can also be problematic that many people just run containers without doing any auditing. In general containers are pretty opaque compared to os packaged software which is usually compiled individually for the os.
This being said, systemd offers a lot of isolation features that allows similar isolation to containers but without having to deal with docker.
Not a big fan of Bezos though.



Happy to hear! That must be the Lithium mafia! Just kidding. I have no clue why people downvote this. Maybe because it’s a crosspost? I must admit I didn’t read the community rules.