curbstickle

joined 8 months ago
[–] curbstickle@lemmy.dbzer0.com 1 points 1 week ago* (last edited 1 week ago)

Was that the file transfer allowed for remote code execution one? That'd be the one that sticks out to me. 3 or 4 years ago iirc?

Edit: CVE-2021-27649 is the one that came to mind, not sure if that's the one you're referring to.

[–] curbstickle@lemmy.dbzer0.com 1 points 2 weeks ago (1 children)

You were responding to me, and I most definitely didn't equate the two. Maybe you meant to respond to someone else.

In any case, you can route between vlans (and subnets), but without a route you aren't communicating between those vlans or.between subnets.

Also, you can have multiple subnets in a vlan, but you can't have a single subnet across vlans.

The range (x.x.10.x and x.x.20.x from your example) is only the subnet side, you could have both of those subnets in one vlan. But you could not, for example, have x.x.10.x/24 exist in vlan 10 and vlan 20.

[–] curbstickle@lemmy.dbzer0.com 15 points 2 weeks ago* (last edited 2 weeks ago)

Just to have a straightforward reply....

Let's start with the concept piece, which you dont need to explicitly follow, but is a decent ref. You dont need to use this explicitly, this is more about how far/close to enterprise you want, whether its for fun, for practice, whatever. From an enterprise perspective, you'll typically have:

  • Management - The only things that belongs here are network devices. Router, switches, etc, but notably not servers. This also - from just a general security perspective - should not be the default network, the vlan you get an IP from ifz you randomly connect to a port. In the enterprise, this is so people dont see the vlan switches are on, at home its just... Good practice at best.
  • Services - servers you trust go here. Ones that are providing local services, not accessed by the outside (except via VPN). This could be auth services, a wiki, automation tools - proxmox servers, as an example, would go here. You may also put a jump service here - a single VM with access to management and logging, so that this becomes the only logical means of access (and a physical on the router or a locked up switch for example)
  • Workstations - trusted user accessible devices would go here. Your desktop, laptop, etc go here. If an ssid is associated to this network, its typically hidden.
  • IoT (no internet) - IoT devices you dont fully trust (as in, pretty much any IoT device) will get put into a VLAN without internet access. Prevents them from phoning home, usually these are closed off devices. Again, not a requirement for home use, but for personal privacy not a bad choice. This became a problem more recently in the enterprise with people buying more consumer-ish stuff at the direction of someone in C Suite who wants their office to behave like their home office. Also put your TV here. Seriously, don't give smart tvs internet access. Block them and plug in a Linux box or something.
  • Guest - Where everyone else goes, a guest vlan with internet only access. Ideally they will each get NATd and can't see each other either. If you want these guests to be able to cast/airplay/etc though, you also would want/have:
  • Media Services VLAN - this is where you would have a Chromecast, AppleTV, mersive solstice pod, airparrot, crestron air media, etc. So your receiving device lives here, in the one vlan you allow some bonjour, and allow men's forwarding from workstation and guest to both hit this network (and its devices). Security risk. Manageable, but a risk.

There are MANY variations and unique versions of this. This is more or less a typical enterprise with we home media uses mixed in.

Now for structure purposes, you basically would have:

  • Management is inaccessible by anything not a switch, with the exception of that one locked down physical port and maybe that jump VM.
  • Each VLAN has its own gateway, each gateway is also NTP and DNS. You then have the upstream DNS provider be your pihole (or technitium, or pihole container, etc - I have 3 that I use so something is always up. DNS is not priority ordering, diff conversation, but having multiple is a good idea. Now your devices get their DNS from the gateway IP, and that gets it from your pihole, so you dont need to expose your pihole to those devices directly
  • guest has access to NOTHING. Just internet. Maybe the media services if you're into that sort of thing.
  • IoT can be accessed from other vlans, but should have access to nothing else. As in, initiated from outside (workstation, services, etc) passes, initiated.from inside (a roomba) you block.
  • the rest generally doesn't need too much security, its more device management - workstation, servers, etc.

OK so there are the generics, let's go back to yours.

192.168.1.x - sounds like default to me. Risky to use for proxmox and network management on a vlan generic endpoints will land in. If you have a different one for default - great! Ignore this. If its management, id move Proxmox into 200 instead.

192.168.100.x - solid choice to group up your externally facing riskier stuff and funnel it all through one connection. I'd make sure when that connection goes down everything else loses connectivity - confirm that kill switch works. Bind their network interfaces to the virtual network that goes to your VPN connection (I'm assuming a docker container here).

192.168.200.x - yup, logical group, makes sense to do. I'd probably put your hypervisor here.

Now LXC vs Docker.... I'd call that mostly preference. I prefer LXC. I also keep things at a stable version and upgrade when needed, not automatically. If you want automated, your best bet is docker. If you want rock stable, and d9nt mind.manual updates, LXC is great. You can automate some with ansible and the like, but that can be a lot to set up for minimal need. YMMV.

Anything I build from source (honestly, most of what I do) I put in an LXC. Anything I take someone else's image (rare, but happens), is docker. I have a local git repo I keep synced to projects on codeberg, github, and the like, so my setups are all set to build from that local repo. Makes sure I've got the latest if something is taken down, but also a local spot to make changes, test, etc for anything I may push back upstream.

Hope that helps!

Edit: Forgot to talk security!

OK first off, figure out your threat model. Where would threats come from? How serious would they be? What risks are worth taking, which are not?

Security is an ogre (onion) - its got layers. For example, I have zero concern with region blocking. No one is hitting my network from China, so I'm not allowing some random to try and get in.

What I am concerned about is user credentialing for access - one login for all services, MFA is hard required, and I don't do text/email as MFA - that's baby town frolics levels of security, I don't like it.

Best way to think of it is a row of bikes. A thief is going to come by and steal one. Which one will they go for?

Do you need to have 7 bike locks and encase the whole thing in concrete? Or do you need to be enough of a pain in the ass (u lock, braided steel cable or chain looped through the wheel and frame) that the other bike (with a $5 cable lock you can pop open with a bic pen).

[–] curbstickle@lemmy.dbzer0.com 1 points 2 weeks ago* (last edited 2 weeks ago)

Take a networking class. You have numerous fundamental misunderstandings and make wild assumptions on bridging gaps that has specific requirements to occur, which also requires a complete lack of any other security methods.

Take a networking class, please. You need it.

Edit: You're mad and still down voting, I want to point out you dont even understand the link you provided.

You should probably read that. But looooooong before then, you should take an actual class on networking.

You need it.

[–] curbstickle@lemmy.dbzer0.com 1 points 2 weeks ago (2 children)

Take a networking class instead of spewing nonsense please.

[–] curbstickle@lemmy.dbzer0.com 1 points 2 weeks ago (4 children)

HOW WOULD YOU GET SHELL ACCESS TO HIS ROUTER FROM A FIREWALLED OFF VLAN THAT DOES NOT GAIN ACCESS TO THE MANAGEMENT VLAN THE ROUTER IS ON.

Holy crap dude.

BASIC networking.

[–] curbstickle@lemmy.dbzer0.com 0 points 2 weeks ago

Thats my line.

I'm also done having any sort of discussion with you, there is a fundamental misunderstanding of logical network design here, and I have no interest in correcting that. Enjoy your day.

[–] curbstickle@lemmy.dbzer0.com 1 points 2 weeks ago (7 children)

That's not how any of this works.... At all.

No, its managed by the firewall. The existence of a VLAN does not grant it access to egress. The firewall needs to permit that behavior.

Your entire understanding of how a logical network works is wrong. I'm not trying to be a dick - this is just really bad information that you're sharing.

[–] curbstickle@lemmy.dbzer0.com 3 points 2 weeks ago

Your understanding is correct.

Multiple routers is irrelevant and ridiculous.

[–] curbstickle@lemmy.dbzer0.com 1 points 2 weeks ago* (last edited 2 weeks ago) (9 children)

You are aware that a firewall rule is how you would address - in software, with logic - someone trying to get from VLAN C to VLAN A, right?

That its part of the method you'd use as a layer of security to prevent someone gaining access to.your router?

Assuming the router is compromised from the start is similarly just nutso.

[–] curbstickle@lemmy.dbzer0.com 3 points 2 weeks ago

Yes.

And to be clear about things, because that comment doesn't make any sense for VLANs - a VLAN can contain multiple subnets. You will not have a single subnet across multiple VLANs.

Your config is fine in that regard.

[–] curbstickle@lemmy.dbzer0.com 2 points 2 weeks ago

Because the overwhelming majority of multiple vlan use, and proper use at that, is going to be managed by a single firewall at the end. Because that firewall is going to manage intra and inter vlan communication, and to suggest that requires a different physical router is... Wild.

Because logical network design - regardless of egress - is a vital component of any security implementation.

Because having a multiple egress solution that doesn't rely on a software based connection (VPN) would be absolutely bonkers for a self hosted solution at home.

There are just... So many things that are absolutely buck wild crazy to me in what you've said. And not in a fun 'yee haw' kind of way, but a "boy oh boy if that could be bottled it would sell like hotcakes on the street" sort of way.

 

TL;DR: Want to use my desktop keyboard/mouse with my Laptop. What software are you using/enjoying? Arch+KDE w/ Wayland will be the main host, main client is Windows 11. Secondary hosts may be Debian and MacOS, same client, but low priority on the Mac.

Hey folks, I'm rearranging some things a bit at home, would love to get some current thoughts on keyboard/mouse sharing over IP (no video).

I have to put up with some tools that don't play nicely with wine/proton, and so my work laptop is a windows device. I'll be controlling that device primary from Arch and Debian, though MacOS is a possibility. I'd like to keep the laptop closed and not add another mouse/keyboard into the mix, so Keyb/Mouse over IP it is.

Here's what I'm looking at, haven't tried them all yet, but looking for opinions:

  • Barrier - Dead fork. Hasn't been updated in some time, being superseded by input-leap. Most portions of the project managed by someone who had not been active for a couple years before the Input Leap fork.
  • Input Leap - Forked from Barrier at the end of 2021, and nearly 3 years later, no stable binary releases yet. Development seems fairly active, but no binary releases yet doesn't provide a massive amount of confidence that it will be stable. Doesn't mean I won't build and test though.
  • Lan Mouse - Seems pretty neat, the lack of input capture on MacOS could create an issue for me in certain situations, but I can work around that if I need to for the rare times I'd need it. Traffic is unencrypted/plaintext. Its entirely local, and I've got more security than most users (and some companies), but still. Probably leading the pack right now.
  • Deskflow - Upstream project for Synergy, a rename to differentiate the user project from Synergy. TONS of recent activity, but the switch is very recent. I don't know if there are any binaries built, but its a longstanding project (and like many, many others, I used Synergy before it went commercial, it was nice).

Any other options out there? Good/bad experiences with any of these?

 

I got my hands on a Lenovo ThinkSmart Hub 500 - you may have seen these in conference rooms, its a small Teams Room or Zoom Room device, based off their Tiny lineup, with a built-in touch display thats about 11" in diagonal.

https://psref.lenovo.com/syspool/Sys/PDF/ThinkSmart/ThinkSmart_Hub_500/ThinkSmart_Hub_500_Spec.pdf

I left the 128gb nvme in there for now, and threw Debian 12 on it. Touch worked throughout the installation process, all I did was attach a keyboard, power, and network (along with the thumb drive with netinstall), now installed with KDE.

Considering the specs, the only part I'm surprised works well is the touchscreen, its otherwise just a generic lenovo tiny (which I have several of already, 6th-9th gen, as part of my tiny/mini/micro server stack). I could have chosen a different flavor, but I'm a long, long, loooonngggg time Debain user so its my go-to.

In terms of touch, tap, drag, and long press are all working. Video looks good with the UI set at 125% scaling, and to be candid its rather snappy and responsive.

I did this 100% for my own personal entertainment, so now for some thoughts for the community - what would be fun to use it for? A few of my thoughts....

  • I could use it as a HomeAssistant kiosk. Neat, but.... overkill compared to the tablets doing the same job.
  • Make it an emulation station, attach my steam controller and maybe my usb adapters for N64/GC/Sega/PS/etc.
  • Use it to test a series of distributions to see how well they handle touch drivers for this silly thing (EndeavorOS is probably going to happen, I may be a long time Debian guy but I should spend more regular time in other things, and not just my arch VMs).
  • I don't know, gcompris for my kids? They already have it though on an android tablet and an old mac mini (like, 2011ish) hooked up to the TV in the living room.
  • Make it another proxmox endpoint for the cluster, install a DE anyway, and then let it be an always-visible display for grafana?
  • Install OBS, let the hdmi capture have some purpose?

What about you folks, what would you find fun to do with this box?

16
eBook Library Structure (lemmy.dbzer0.com)
submitted 4 months ago* (last edited 4 months ago) by curbstickle@lemmy.dbzer0.com to c/selfhosted@lemmy.world
 

TL;DR: How do you sort your books for your book server?


I'm thinking of reworking my eBook/comic/etc library, and I'm curious how other people structure things.

I don't want to separate fiction out by genre or anything since some can fit multiple genres, so I'm leaning towards Dewey decimal system categories personally.

I'm also planning a bit ahead since my daughter is now starting to read more than sight words books, so I'm thinking of separating kids fiction and adult fiction.

I also currently have a section for comics, manga, and LNs. Those are separated mostly for who goes to what, and what they do/don't want to read. So my library right now (plus the kids section) will look like:

  • Kids Fiction
  • Adult Fiction
  • Comics
  • Manga
  • Light/Web Novels
  • Non-Fiction

Simple for navigation, and searchable, but maybe not the best for browsing. So I was thinking maybe the Dewey categories:

  • Computer Science, Knowledge, and Systems
  • Philosophy & Psychology
  • Social Sciences
  • Language
  • Science
  • Technology
  • Arts
  • Adult Fiction
  • Kids Fiction
  • History/Geography

Nicely browsable, but some of those sections will be really light on books.

What method of sorting do you use? Any librarians out there with thoughts on better approaches than the Dewey decimal system?

EDIT: I really like what @thayer@lemmy.ca mentioned, which I've currently adapted to:

  • Instructional (How-to, manuals, gardening, etc)
  • Tech (Electronics reference materials, programming reference books, etc).
  • Equine (all my wife's horse stuff)
  • Kids Fiction
  • Kids Non-Fiction (I've got some geography books and such my daughter likes, I'm sure it will expand over time)
  • Adult Fiction
  • Adult Non-Fiction
  • Comics
  • Manga
  • LN/WN

I can easily allow the kids accounts to have access to the Kids section, not include the comics/manga/tech my wife has no interest in, etc.

view more: next ›