Hello most excellent Selfhosted community,
I’m very new to this and am confused about how vulnerable my server and/or home network is with my current setup.
I just got a basic server up and running on a machine with proxmox and a DAS for 10tb of storage. I’ve got two LXCs running for a docker deployed arr stack and jellyfin+jellyseer stack. The proxmox server is connected to a router attached to a fiber ONT. Everything is accessed over the home LAN network and that’s it.
Everything is working correctly and my containers are all talking to each other correctly via ip addresses (gluten network on the arr stack container). I’ve been reading up on reverse proxies and tailscale to connect to the server from outside my LAN network, and it’s mostly gone over my head, but it did make me concerned about my network security.
Is my current set up secure, assuming strong passwords were used for everything? I think it is for my current uses - but I could use a sanity check, I’m tired. I’m open to any suggestions or advice.
I own a domain that I don’t use for anything, so it would be cool to get reverse proxy working, but my attempts so far have failed and I learned I’m behind a double NAT (ONT and router) - and attempts to bypass that by setting the ONT into bridge mode have also failed. I don’t really need to access anything from outside my home network right now - but I would like to in the future.
tvcvt@lemmy.ml 22 hours ago
You ever see those Wired videos where they talk about a concept on five different levels ranging from beginner to expert?
The first level answer is likely that, yes, you’re reasonably secure in your current setup. That’s true, but it’s also really simplified and it skips a lot of important considerations. (For example, “secure against what?”) One of the first big realizations that hit me after I’d been running servers for a little while and trying to chase security is the idea of a threat model. What protects me from a script kiddie trying to break into one of my web servers won’t do much for me against a phishing attack.
The more you do this, though, the more I think you’ll realize that security is more of a process than an actual state you can attain.
I think it sounds like you’re doing a good job moving cautiously and picking up things at each step. If the next step is remote access, you’ve got a pretty good situation for a mesh VPN like Tailscale or Netbird or ZeroTier. They’ll help you deal with the CGNAT and each one gives you a decent growth path where you can start out with a free tier and if you need it in the future, either buy into the product or self host it.
hoshikarakitaridia@lemmy.world 21 hours ago
This is probably the best answer. If everything is truly only running on local network and nothing is exposed with a port through your router, you are very safe.
Most issues get introduced when running a server exposed to the Internet.
That said, on the lowest level, if they want to get you, they will. It’s all a risk analysis. And the more interesting you are to adversarial parties, the higher the chances you’ll get pursued.
If you’re Edward Snowden, 99% your calls and conversations are always on record.
If you’re John Doe, truly only your ISP cares when they get a law enforcement request because you really pushed the envelope.
Trending movies are notoriously bad, because movie studios will really try to rake in the revenue.
On the other hand, ripping music from YouTube, no one cares or is able to track it, so risk is very low.