Look pretty interesting. Do you have guide I could follow ?
Comment on Jellyfin over the internet
hietsu@sopuli.xyz 21 hours ago
Use a reverse proxy (caddy or nginx proxy manager) with a subdomain, like myservice.mydomain.com (maybe even configure a subdir too, so …domain.com/guessthis/). Don’t put anything on the main domain / root dir / the IP address.
If you’re still unsure setup Knockd to whitelist only IP addresses that touch certain one or two random ports first.
So security through obscurity :) But good luck for the bots to figure all that out.
VPN is of course the actually secure option, I’d vote for Tailscale.
TribblesBestFriend@startrek.website 20 hours ago
hietsu@sopuli.xyz 19 hours ago
Not at hand no, but I’m sure any of the LLMs can guide you through the setup if googling does not give anything good.
Nothing very special about all this, well maybe the subdir does require some extra spells to reverse proxy config.
Alk@sh.itjust.works 20 hours ago
I kept the main domain open, but redirected it to a rickroll
hietsu@sopuli.xyz 18 hours ago
Nice, but the bots may not understand the joke.
And not only that but they will tag the domain with ”there is something here”, and maybe some day someone will take a closer look and see if you are all up-to-date or would there maybe be a way in. So better to just drop everything and maybe also ban the IP if they happen to try poke some commonly scanned things (like /wp-admin, /git, port 22 etc.) GoAccess is a pretty nice tool to show you what they are after.
Alk@sh.itjust.works 18 hours ago
Yeah that’s a good point. The joke is mostly for my own enjoyment or any random user who happens to forget the
jellyfin.
subdomain.I have had a few hits to /wp-admin, but cloudflare actually blocks those for me (I don’t use a tunnel but I do use them for the domain name which helps a bit). I might just shut down the main page then.