Boring

joined 2 years ago
 

I have a little side business of doing minor repairs on phones and tablets and such.

I was wanting to host a wiki on my network with ifixit guides for the common devices I work on just in case my internet access goes out.

I host a lot already but I'm not sure how to go about getting the data to upload to the wiki?

Has anyone else done a similar thing?

[–] [email protected] 2 points 1 year ago

Might be janky, but if you really wanted this for free you could get a speech to text program like futo, play the video and have it transcribe it and save it to a text file, then copy and paste in the subtitles

[–] [email protected] 0 points 1 year ago* (last edited 1 year ago)

Ooookay.. Took me a second to wrap my head around the layout.. Originally I only looked at the picture, which only shows a single switch.

This is an odd topography. Typically when working with switches, you want them connecting directly to the router and not connected to another switch.

You are going to have bandwidth issues out the ass, along with having a troubleshooting nightmare when something goes wrong and you need to trace packets.

Right now you have a hub and a spoke inside a hub and spoke.

Since it looks like your Asus is just an AP in this scenario, you'd be better off:

  • hooking both switches to the ISP router
  • enabling DHCP on the ISP router for the 2.5g switch
  • set your 1g switch to a different subnet, with default gateway to your ISP router
  • enable dhcp for different subnet
  • add Asus for WiFi ability on new subnet

You can then play around with VLANing on the managed switch. You won't be able to separate IoT and Personal WiFi signals with VLAN. Youd need to create a guest SSID for that functionality and change the channels to 6 and 11 so you get good bandwidth

Edit: this is assuming you have a layer 3 switch, if its a layer 2 I would use the Asus as a router/AP and hook it directly to the ISP router and hook the switch up to the Asus.

[–] [email protected] 2 points 1 year ago

Depends on your definition of safe.

If you do a public port forward and set up basic security and proper SSL its safe from the majority of people.

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago) (2 children)

Looks like it'll work. You should look into flashing that router with openwrt or pfsense and VLANing off those smart devices.. They can be a security issue.

Also adding a second AP that you place on a different channel for guest and untrusted devices would work and increase bandwidth, but adds some routing complexity.

[–] [email protected] 1 points 1 year ago

You could host a wireshark instance, and maybe even host a SIEM like security onion.

[–] [email protected] 2 points 1 year ago

Yea, I haven't played with it too much. You'll ever have to host your own SMTP server to send it or use gmail or protons SMTP service.

Doing it yourself might cause big companies to send your mail to spam or possibly just drop the packets cause you're not using a trusted IP, have the wrong DNS settings, etc. and your ISP may even block port 25

This can be circumvented by using a SMTP relay service but can still have some issues like mail sending limits.

[–] [email protected] 8 points 1 year ago* (last edited 1 year ago) (3 children)

I would have a failsafe, like use a major email provider for emails that you need to go through for like work order government stuff.

Hosting your own email is a great learning experience and is fun to do; but your emails will get marked as spam, you'll have to constantly perform maintenance, and have major reliability issues.

Most of the issues youll have are fine for personal use, but is dicey if you plan to migrate 100%

Edit: receiving email is less of an issue of sending. The forwarder should be reliable, however, its the sending from the forwarding address that would possibly be an issue.

 

This law allows the NSA to "accidentally" collect american communication and the FBI to access the "incidental" communication without a warrant.

It is set to expire in December 2023 and will likely be renewed if there isn't much public pressure.

[–] [email protected] 2 points 1 year ago (1 children)

No only the server, you can host an openssh server and have clients connect remotely.

Sorta like how you can host a webserver and a client doesn't need 443 open. Except a reverse shell is possible with ssh, allowing a client to be controlled without their port 22 open.

[–] [email protected] 8 points 1 year ago (4 children)

You can tunnel RDP over SSH. Then you'd only open a port that requires authentication to access and is encrypted.

[–] [email protected] 12 points 1 year ago (3 children)

I'm a tinkering nerd, so I like to have a headless Linux box.

I did use self hosting operating systems in the beginning, and they're nice. However, when I tried just a plain Ubuntu headless install, I felt way more accomplished after getting everything working.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (1 children)
[–] [email protected] 6 points 1 year ago* (last edited 1 year ago)

Personally I'd just spin up a wireguard container with a GUI, user friendly and you can add anyone to your VPN in like 2 minutes wherever you are.

Most advanced part would be forwarding port 51820

view more: next ›