Comment on Risks of self-hosting a public-facing forum?
rice@lemmy.org 3 days ago
Do it.
There’s really not much that can end badly, someone gets in your network (unlikely anyone even knows it exists)? reformat all your shit.
do you run a business out of your house? do you run a bunch of peoples personal info? does anyone else? If you answered no to all of these then there really isn’t much that can “go wrong” you can just unplug your shit.
hosting email also isn’t that big of a deal but your home ISP will block port 25, you need to have a “business” one for them to unblock it and even then sometimes have to directly request it. Things like mailcow docker make it dead easy.
and yea as the other guy said always update your stuff
Onomatopoeia@lemmy.cafe 3 days ago
Scans for open ports run continuously these days.
Ten years ago I opened a port for something for a couple days - for months after that I was getting regular scans against that port (and others).
At one point the scans were so constant it was killing my internet performance (poor little consumer router had no defense capability).
I don’t think the scans ever fully stopped until I moved. Whoever has that IP now probably gets specifically scanned on occasion.
And just because you don’t run a business doesn’t mean you have nothing to lose.
DMZ should be enough… But routers have known flaws, so I’d be sure to verify whatever I’m using.
rice@lemmy.org 2 days ago
scans for open ports ran continuously since the 1990s, it was never a big deal. Also they only run on lower ports (not that it matters)