this post was submitted on 26 Feb 2024
106 points (96.5% liked)

Selfhosted

40633 readers
320 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] ALostInquirer@lemm.ee 3 points 9 months ago (2 children)

Each time I've read into self-hosting it often sounds like opening stuff up to the internet adds a bunch of complexity and potential headaches, but I'm not sure how much of it is practicality vs being excessively cautious.

[–] ShellMonkey@lemmy.socdojo.com 6 points 9 months ago (1 children)

Limiting the attack surface is a big part, geo restrictions, reputation lists, brute force mitigation, it all plays a role. Running a vulnerability scanner against your stuff is important to catch things before others do and regular patching is important too. It's can be a rewarding challenge.

[–] raldone01@lemmy.world 3 points 9 months ago* (last edited 9 months ago) (1 children)

Can you recommend me a vulnerability scanner?

[–] ShellMonkey@lemmy.socdojo.com 3 points 9 months ago (1 children)

https://www.tenable.com/products/nessus/nessus-essentials

https://www.rapid7.com/blog/post/2012/09/19/using-nexpose-at-home-scanning-reports/

https://openvas.org/

Both Nessus and Nexpose are typically enterprise class systems but they have community licensing available for home labs. Nessus can even be set up in a docker container. OpenVAS is more or less free but can be upgraded with pro-feeds, but last I tried it it was a bit more rough to use.

Do be aware though that throwing a full force scan will use a lot of CPU and can break things depending on the settings, so it's good to practice their settings on some non-critical systems first to get a feel for them.

[–] raldone01@lemmy.world 3 points 9 months ago* (last edited 9 months ago)

Thanks sounds like a fun weekend project. My 72 cores are bored most of the time anyways. 😃

[–] LuckyDuck@lemmynsfw.com 4 points 9 months ago

It’s always a balance between security and convenience. You have to mitigate what risk you are willing to well…risk