when reading through the jellyfin with chromecast guide i realized that it would probably be less effort to just let the casting api be public, with the added bonus that i could then cast my library to any device that supports it. but that seems like it would paint a giant target on the server.
what’s the recommended way of doing stuff like this? ideally i want to be able to go to someone’s house and just play some of my media on their tv.
not that any of this is doable in the near future, since i’m behind cgnat and won’t get my colocated bounce server up until spring.
diegantobass@lemmy.world 3 weeks ago
Dumb question: why does everyone is so terribly afraid of opening stuff to the internet ? What’s the scenario?
4am@lemmy.zip 3 weeks ago
Allowing external access to your services means that any misconfiguration or bugs can be exploited to gain control of your machine(s).
Once that happens they can be fucked with, your data stolen, your resources co-opted for someone else’s use, etc. and often times it can be made to look as though whatever bad shit it’s doing is your doing.
So, understand your security posture. You can’t be too careful. Taking over weak or exposed machines is a global industry now.
planish@sh.itjust.works 2 weeks ago
But you can, in fact, be too careful. Availability is one arm of the security triad.
If whatever complex configuration you have set up to avoid exposing something to the Internet is incompatible with something and what you wanted to do can’t be done, or if you look and see that setting all that up would be too hard and don’t bother to expose the service at all, then your security posture is incorrect because your service is just as unavailable as if someone else broke it.
Ricaz@lemmy.dbzer0.com 2 weeks ago
At the same time, taking over exposed machines has never been more difficult.
rollerbang@lemmy.world 3 weeks ago
It starts with being used in a botnet. Then your data can be either erased, corrupted or encrypted against ransom.
lime@feddit.nu 3 weeks ago
i’ve set up servers with static ips in datacenter settings before. the way you know you’re online is usually that your cpu activity jumps a few percent from all the incoming ssh traffic from russia and china. i don’t want to risk anything happening to my home server.
GreenCrunch@piefed.blahaj.zone 2 weeks ago
so fun to look through the ssh log and see hundreds of attempts…
aichan@piefed.blahaj.zone 3 weeks ago
Missconfigurations allowing bots and shit hacking you. Overblown paranoia mostly if you just take some precautions
diegantobass@lemmy.world 2 weeks ago
Okay thanks for mentionning overblown paranoia, that’s what I have.
What kind of exploitable server misconfigurations are we talking about here?? Brute forcing won’t work because fail2ban, right? I’m a noob and deep down I’m convinced that my homeserver is compromised and has beenpart of a bitcoin mining farm for years… Yet, not a single proof…
LiveLM@lemmy.zip 2 weeks ago
I’m paranoid dude, I don’t need the whole judging my awful taste in TV shows!
gdog05@lemmy.world 2 weeks ago
I set up Jellyseer so my friends can request whatever. Just blame your full collection of My Little Pony and Gilmore girls on that one friend from Finland (unless you’re in Finland, and then use Greece).
irmadlad@lemmy.world 2 weeks ago
lol
Danitos@reddthat.com 2 weeks ago
The first thing I opened to the internet was a SSH server. 28 minutes after opening it, I started getting constant entry attempts.
FreedomAdvocate@lemmy.net.au 2 weeks ago
It’s not just opening stuff to the internet, it’s opening stuff to the internet without any authentication in this case. If you don’t know how that’s bad…….
diegantobass@lemmy.world 2 weeks ago
Yeah sorry I missed the part where it has no authentification whatsoever, that’s just open bar.