A simple question to this community, what are you self-hosting? It’s probably fun to hear from each-other what services we are running.

Please mention at least the service (e.g. e-mail) and the software (e.g. postfix). Extra bonus points for also mentioning the OS and/or hardware (e.g. Linux Distribution, raspberry pi, etc) you are running on.

  • punkskunk@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    2 years ago

    Thanks, I agree with you and have a similar approach. I’m mostly interested in learning best practices, I don’t bother hosting juicy targets like Bitwarden. If an attacker really wants to put in the work to get the scanned manual for my 2009 Black & Decker toaster oven I probably can’t stop them.

    • Stimmed@reddthat.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      For best practice, my personal recommendation would be to not have any service public facing besides a VPN that requires MFA. segment self hosted services into separate VLANs based on how sensitive the content is. Disallow all traffic between VLANs unless required and only allow based on port number, specific resources needed. Don’t forgot to disable outgoing Internet access unless required. Devices like Chinese made video cameras should never have an Internet connection.

      My network looks something like: home vlan, work vlan, Netflix \ hulu streaming devices, cctv, wireless work, wireless home, wireless guest, iot, servers, network management. Would be way overkill for vast majority of people, but I would be hypocritical not to considering what I do and I do have a different threat profile than most.

      Another thought: self hosted through VPN with MFA and nothing public facing is probably safer than cloud as long as you have cold backups.