• Bdaman@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    48
    arrow-down
    1
    ·
    7 months ago

    The only externally accessible service is my wireguard vpn. For anything else, if you are not on my lan or VPN back into my lan, it’s not accessible.

      • sunbeam60@lemmy.one
        link
        fedilink
        English
        arrow-up
        8
        ·
        7 months ago

        Funnily enough it’s exactly the opposite way of where the corporate world is going, where the LAN is no longer seen as a fortress and most services are available publically but behind 2FA.

        • AtariDump@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          ·
          edit-2
          7 months ago

          Corporate world, I still have to VPN in before much is accessible. Then there’s also 2FA.

          Homelab, ehhh. Much smaller user base and within smackable reach.

          • sunbeam60@lemmy.one
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            7 months ago

            Oh right. The last three business I’ve worked in have all been fully public services; assume the intruder is already in the LAN, so don’t treat it like a barrier.

      • Footnote2669@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        ·
        7 months ago

        Not OP but… I have an old PC as a server, Wireguard in docker container, port-forward in the router and that’s it

      • JDubbleu@programming.dev
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 months ago

        Not OP, but I just use ZeroTier for this since it’s dead simple to setup and free. I’m sure there’s some 100% self-hosted solutions, but it’s worked for me without issue.

      • Bdaman@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 months ago

        Sorry, haven’t logged on in a bit. I use OPNSense on an old PC for my firewall with the wireguard packet installed.

        Then use the wireguard client on my familys phones/laptops that is set to auto connect when NOT on my home wifi. That way media payback, adguard-home dns and everything acts as seamless as possible even when away while still keeping all ports blocked.

    • calm.like.a.bomb@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      7 months ago

      Same here. Taught my wife how to start WireGuard on her android phone and then access any of the services I run. This way I only have one port open and don’t have to worry too much.

      • fragrantvegetable@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 months ago

        That’s what I do. The beauty of wireguard is that it won’t respond at all if you don’t send the right key. So from the outside it will appear as if none of your ports are open.

      • MigratingtoLemmy@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 months ago

        How about running your wireguard server on a VPS and then connecting to the same interface as clients from your mobile and home network? No ports open on your side!

  • Atemu@lemmy.ml
    link
    fedilink
    English
    arrow-up
    16
    ·
    7 months ago

    Nothing I host is internet-accessible. Everything is accessible to me via Tailscale though.

    • BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      2
      ·
      edit-2
      7 months ago

      Tailscale with the Funnel feature enabled should work for most ISPs, since it’s setup via an outbound connection. Though maybe they’re Super Cunts and block that too.

      • empireOfLove2@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 months ago

        NAT to extremes… it’s Starlink so I think I’m almost completely obfuscated from the internet entirely.

        quite frankly i don’t really host anything that needs to be accessible from the general Internet so I never bothered with workarounds.

  • Brayd@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    14
    ·
    7 months ago

    I had everything behind my LAN, but published things like Nextcloud to the outside after finally figuring out how to do that even without a public IPv4 (being behind DS-Lite by my provider).

    I knew about Cloudflare Tunnels but I didn’t want to route my stuff through their service. And using Immich through their tunnel would be very slow.

    I finally figured out how to publish my stuff using an external VPS that’s doing several things:

    • being a OpenVPN server
    • being a cert server for OpenVPN certs
    • being a reverse proxy using nginx with certbot

    Then my servers at home just connect to the VPS as VPN clients so there’s a direct tunnel between the VPS and the home servers.

    Now when I have an app running on 8080 on my home server, I can set up nginx so that the domain points to the VPS public IPv4 and IPv6 and that one routes the traffic through the VPN tunnel to the home server and it’s port using the IPv4 of the VPN tunnel. The clients are configured to have a static IPv4 inside the VPN tunnel when connecting to the VPN server.

    Took me several years to figure out but resolved all my issues.

  • grue@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    ·
    edit-2
    7 months ago

    I currently keep everything LAN-only because I haven’t figured out how to properly set up outside access yet.

    (I would like to have Home Assistant available either over the Internet or via VPN so that automations keyed off people’s location outside the home would work.)

    • LifeBandit666@feddit.uk
      link
      fedilink
      English
      arrow-up
      2
      ·
      7 months ago

      I have used DuckDNS and Nginx to get Home Assistant outside but it was horrible, just constantly breaking. Around Christmas time I bought myself a domain name for a few years and Cloudflare to access it, and it’s been night and day since.

      Sure it cost me money but it was far cheaper than a Nabu Casa account.

    • jkrtn@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      Yeah, same, except I tunneled HA out via that Cloudflare daemon. Kinda janky because I cannot use the app with it to do locations, but I can check in on the pets from anywhere.

      I’m planning to set up a legit VPN sometime soon.

        • jkrtn@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 months ago

          I cannot get the app to connect to my HA with the current setup. I have Cloudflare doing email verification, and the app doesn’t understand how to collect the cookies to make that possible.

  • harsh3466@lemmy.ml
    link
    fedilink
    English
    arrow-up
    10
    ·
    7 months ago

    Available to the internet via reverse proxy:

    • Jellyfin
    • Navidrome
    • Two websites
    • matrix chat server
    • audiobookshelf

    LAN only:

    • homepage
    • NGINX Proxy Manager
    • Portainer

    There’s more in both categories but I can’t remember everything I have running.

  • pHr34kY@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    7 months ago

    Everything exposed except NFS, CUPS and Samba. They absolutely cannot be exposed.

    Like, even my DNS server is public because I use DoT for AdBlock on my phone.

    Nextcloud, IMAP, SMTP, Plex, SSH, NTP, WordPress, ZoneMinder are all public facing (and mostly passworded).

    A fun note: All of it is dual-stacked except SSH. Fail2Ban comparatively picks up almost zero activity on IPv6.

  • powermaker450@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    7 months ago

    Nearly all of them. Nextcloud, Jellyfin, Vaultwarden, Spacebar, and 2fAuth, all set behind an NGINX Reverse Proxy, SWAG. SWAG made it very easy to set up https and now I can throw anything behind a subfolder or subdomain.

  • habitualTartare@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    7 months ago

    I keep everything behind a VPN so I don’t have to worry much about opening things up to the Internet. It’s not necessary about the fact that you’re probably fine but more so what the risk to you is if that device is compromised, ex: a NAS with important documents, or the idea that if that device is infected, what can that device access.

    You could expose your media server and not worry too much about that device but having it in a “demilitarized zone”, ensuring all your firewall rules are correct and that that service is always updated is more difficult than just one VPN that is designed to be secure from the ground up.

  • bluGill@kbin.social
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    7 months ago

    Nothing is exposed. There are things I want exposed, but I don’t want to keep security patches up to date, even if there is a zero day. I’m looking for someone trustworthy to hire for things that it would be useful to expose, but they are hard to find.

  • notannpc@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 months ago

    I expose most things to the web so long as they have auth and 2FA options. The one exception being my Jellyfin server. I share it with friends and needed to make it as easily accessible as possible.

    With Cloudflare WAF, reverse proxy, and an isolated subnet with IDP I feel comfortable with public services. Nothings perfect but if they get through it and pwn my lab I’ll just nuke it and rebuild.

  • seedoubleyou@infosec.pub
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 months ago

    PII or anything that would demonstrate clear attribution is LAN, the rest of the “fun” stuff lives on a VPS. Wireguard between them.