versionc

joined 1 week ago
[–] versionc@lemmy.world 4 points 6 hours ago (2 children)
[–] versionc@lemmy.world 7 points 7 hours ago (4 children)

as far as I know, there is no way to put a valid certificate like let's encrypt for a service that is not accessible from the net

There definitely is. All of my local services run on a wildcard cert that I got from a DNS challenge with Let's Encrypt. As long as the reverse proxy can access whatever source is issuing the certificate, and as long as the client browser can access public certificate ledgers and has DNS info about your services, things will work just fine locally.

I recommend Netbird to give access to services to your family members, for access control and for the DNS server it provides. It also gives you the bonus of accessing your services remotely.

Feel free to ask if you have any questions.

[–] versionc@lemmy.world -3 points 8 hours ago (6 children)

Good riddance.

Has anyone used Komga as an alternative? It's primarily for manga and comics but it seems to support books too (epub and PDF). It also seems to be able to sync books with Kobo devices.

[–] versionc@lemmy.world 2 points 10 hours ago* (last edited 10 hours ago)

Yeah, pass has been discussed a bit in the thread already, but there are a few security issues that keep me from using it. Speaking of security, I had no idea the Android app was archived in 2024. That's quite a long time without updates. Are you using a fork?

Thank you for sharing your workflow either way! Using a git based solution would be amazing.

[–] versionc@lemmy.world 2 points 11 hours ago

I like the idea of using git, and there are people using it with their KeePass database (here's an example), but I don't think it's optimal. If you want to use git, pass is probably the better option, but that brings in a whole lot of other problems.

I've started using Nextcloud to sync my database and it's worked out fine so far. Though it would be nice to use something like git that I use all the time regardless, right now the whole bloated Nextcloud stack I have hosted only syncs my small password database haha.

[–] versionc@lemmy.world 8 points 12 hours ago* (last edited 12 hours ago)

I would get a router that supports an open source firmware or operating system like OpenWRT. Which one depends entirely on your use case. Getting a router from your ISP is fine if you're allowed to and capable of flashing it, and if you trust them (I'm lucky that I have an ISP with a track record of fighting for their users' privacy and integrity).

[–] versionc@lemmy.world 1 points 15 hours ago (1 children)

Like I said earlier, I didn't say that you or anyone else should boycott Kagi. I merely informed everyone for transparency. It's up to you how you compromise your morals, because compromise we all do. I can live without Kagi, and therefore I don't need to pay them. If I can refrain from supporting war and shitty governments, I will do so. That includes avoiding American companies, which I do primarily thorough self-hosting alternatives to big tech software.

Either way, you're a very exhausting person to communicate with so this will be the last time I respond to your comments.

[–] versionc@lemmy.world 1 points 17 hours ago (3 children)
[–] versionc@lemmy.world 4 points 17 hours ago

Yes, boycotting American companies is a good idea.

[–] versionc@lemmy.world 10 points 1 day ago (1 children)

Kagi pays Yandex to use their API.

Yandex represents about 2% of our total costs and is only one of dozens of sources we use.

https://kagifeedback.org/d/5445-reconsider-yandex-integration-due-to-the-geopolitical-status-quo/19

[–] versionc@lemmy.world 6 points 1 day ago (6 children)

We have wildly different definitions of the word discrimination. The fact of the matter is that doing business with Russian companies funds the Russian war. There's no away around that, and the fact that innocent Russian civilians have to suffer the repercussions of that is tragic, but it's through no fault of the people choosing to boycott. Throwing accusations of discrimination in this situation is asinine.

Stop with this childish nonsense.

[–] versionc@lemmy.world 8 points 1 day ago (13 children)

Discriminatory? Are you for real?

So anyone who does business with a Russian company is "sponsoring the Russian war"?

Yes. Russian companies pay taxes to the Russian regime, and the Russian regime uses that tax money to fund their war. Therefore, if you do business with Russian companies, you sponsor the Russian war.

Am I saying that means you shouldn't pay for the service? No. We can't boycott everything, but people should at least know where some of their money goes. Where you draw the moral line is entirely up to you.

 

What do you use for syncing your password manager between your Android phone and your PC? Apparently Nextcloud doesn't support two-way syncing on Android for some reason, and Syncthing-Fork is still untrustworthy since the disastrous handover. The AI generated profile picture of researchxxl doesn't exactly inspire confidence either, neither does his GitHub bio:

Hi! My name is Jonas and I like to use my coding skills from games and modding to continue work on the Syncthing for Android wrapper.

Everything about this person screams vibe coder.

Bitwarden is an alternative, but I don't like how non-standard it is. It's cumbersome to manage and backup, meanwhile the KeePass format is just a file that I can backup wherever and however I want and there are many frontends to choose from.

Have you solved this?

 

Hello!

I've spent a lot of time struggling with Hetzner's KVM console, there are a lot of problems causing severe issues with setting up passwords and passphrases. I just thought I'd create this "guide" to get things rolling, for everyone who faces the same issues I've faced.

Step 1 - Firewall

Set up a firewall and only open port 22 with your IP (you can look it up using ip.me).

Step 2 - Installation

Perform the installation procedure as normal, setting very simple passwords and passphrases for the user accounts and the disk encryption. Set them to something like 123. These will be changed later!

I'm using Debian 13, the steps may or may not be the same for your choice of distribution.

Step 3 - SSH access

Unmount the ISO and reboot. Enter the console again, log in as root with your simple password. Now, if you have the same problem as me, keys like /, CTRL etc. won't work, so I used tab completion and vi to to modify the config file.

# cd ../etc/ssh/
# vi sshd<TAB>

Inside vi, press o to create a new line and enter insert mode. Add:

PermitRootLogin yes
PasswordAuthentication yes

Press ESC and then <SHIFT>-yy (so holding shift and pressing y twice). This will save the file and exit vi. Restart the SSH services:

# systemctl restart ssh sshd

Step 4 - Dropbear

ssh into your VPS. Now you have full keyboard access like usual. Install dropbear-initramfs, which is an SSH server that's placed in the initial RAM filesystem so that you can ssh into your VPS during start up so you can easily enter your encryption passphrase.

Generate a new key pair and add the public key to /etc/dropbear/initramfs/authorized_keys

Run update-initramfs -u and reboot. You should now be able to ssh into your VPS using the key you just generated. The following command lets you unlock the encrypted disk:

cryptroot-unlock

This will probably disconnect you from the tunnel, simply re-establish the SSH tunnel again.

Step 5 - Changing passwords and passphrases

To change the encryption passphrase:

# cryptsetup luksAddKey /dev/sdXY
# cryptsetup luksRemoveKey

Lock the root user and change the password of your user (don't forget to add the user to the sudo group!):

# passwd -l root
# passwd user

Done!

At this point you might want to use some other means to access the server, such as Netbird or Tailscale or Wireguard. Regardless of how you decide to access the server, you should revert the changes to sshd_config.

P.S.

I have no idea if this is a secure or good way to do this. Use at your own risk!

 

Hello!

I've been playing around with self-hosting for a while now and I've started moving over to a VPS. At home I have a PC that's on more or less 24/7 with an *arr stack, jellyfin and some other services. They can only be accessed through Netbird. The services aren't that important, the data doesn't really need to be backed up since it's not very important. On the VPS, however, I would like to host some more critical services, such as:

  • Vaultwarden
  • Immich
  • Gitea
  • Overleaf

I want them available 24/7, even if I decide to distrohop and wipe my PC at home. The problem is how to structure all this. My current idea is to run Gitea and Overleaf out in the open behind some reverse proxy without authentication (Nginx or Nginx Proxy Manager). I'd like Vaultwarden and Immich to be on the same VPS, but, I don't want those services to be accessible to anyone but me, so I'd need some form of ACL or authentication system. I'm thinking of using Netbird for this, since I already use it on all of my devices.

So I would set up DNS records from within Netbird that would point immich.domain.tld and vaultwarden.domain.tld to the internal Netbird IP of the VPS. In the reverse proxy, I'd set up access control such that it only redirects the Netbird IP range to those services. On Cloudflare, I'd point git.domain.tld to the external IP of the VPS with proxy enabled.

Everything would receive HTTPS certificates, and I'd block incoming traffic on every port except for 80 and 443.

Is this a good setup? Any tips or recommendations? Any pitfalls?

Thanks!

view more: next ›