krash

joined 3 years ago
[–] [email protected] 1 points 3 hours ago

Thank you for all the questions to help me clarify my use case 🙂

At the very basic, I'd like to:

  1. achieve better security through segmentation by isolating cloud-connected devices, guest devices from trusted devices.
  2. Being able to "pin" a Mac address to an IP, and being able to use internal network name resolution to reach those devices.
  3. a blocklist for known ad-domains / malicious domains.

Once the basics are in place, I'd like to elevate my netsec game and implement:

  • a high level monitoring capability to seen what devices are communicating with what domains / IPs
  • An IDS capability of some sort to be able to detect anomalies in my LAN.

The NAS part is just for convince, it would be nice to have a samba / NFS with my files available when I need them.

 

I have solid experience configuring and maintaining Linux, but my knowledge in networking is quite basic. What should my first configurations and preparations should I do before flashing Openwrt and setting it up for my home network?

PS. If I can use the switch as a NAS, I'd be delighted.

[–] [email protected] 3 points 6 days ago

Welcome to the deep rabbit hole :-) how much do you know about how computers work? In general, you're going to need to understand some basic networking and general Linux administration, but if you already have a grasp on that then I'd say you just need to start small (simple service, aim to have a resilience goal with backups and restoration) and other metrics that motivates you. Perhaps you want to learn something new with every service you host? You decide, this is your hobby :-)

[–] [email protected] 6 points 3 weeks ago (1 children)

Scholz and Merkel have their flaws, but they're not fascist buffoons. Yep, that's where the bar is right now.

[–] [email protected] 1 points 3 weeks ago

I think for matrix to be usable in a homelab setting, Matrix needs to enable a way to handle these huge data storage with prune or something similar.

[–] [email protected] 2 points 3 weeks ago

I found snikket to be quite decent, give it a whirl.

 

Hey Lemmies, I want to buy a new pair of sunglasses without contributing to Luxotica dominance. I've had Shady rays, but I am looking for a non-american brand.

Look forward to hear your recommendations.

[–] [email protected] 2 points 1 month ago* (last edited 1 month ago)

Awesome <3

If you need feedback, testing etc. on this feature, I'm happy to help. Just pm me and I'll give you my github account.

[–] [email protected] 2 points 1 month ago* (last edited 1 month ago) (2 children)

This is really cool. Happy that you included the comments, as I find them often quite insightful. Look forward to spin this up and try it.

Edit: I know this is really hard to design and implement, but is it possible to bring in certain amount of child comments as-well? E.g., past a certain vote threshold or only X child comments deep. This might be a requirement that want to "move" the social media platform into the RSS feeder, but I want to entertain the idea.

[–] [email protected] 3 points 1 month ago

There are so many monitoring tools with various degrees of complicated setup / configuration or the amount of information you get. And honestly, I've looked into various tools: checkmk, monit, Prometheus... And realised that I rarely look into that information anyway. Of all "fancy" tools, I liked the ease of Netdata to set up and the amount of information that you get. However, beware that their in the process to make their free / homelad offering worse. I've been eyeing beszel and don't forget CLI based tools that are avaible such as atop, btop, htop or glances.

If you want to delve deeper into the rabbit hole of monitoring, I can recommend you to read this article below: https://matduggan.com/were-all-doing-metrics-wrong/

[–] [email protected] 8 points 1 month ago (2 children)

I've tried different approaches with fail2ban, crowdsec, VPNs, etc. What I settled on is to divide the data of my services in two categories: confidential and "I can live with it leaking".

The ones that host confidential data is behind a VPN and has some basic monitoring on them.

The ones that are out in the public are behind a WAF from cloudflare with pretty restrictive rules.

Yes, cloudflare suck etc., but the value of stopping potential attacks before they reach your services is hard to match.

Just keep in mind: you need layers of different security measures to protect your services (such as backups, control of network traffic, monitoring and detection, and so on).

[–] [email protected] 2 points 1 month ago (1 children)

I really like this. Is it possible to have it search several sources in the future?

[–] [email protected] 3 points 1 month ago

I like this thread :-)

I have just checked off a long standing item in my backlog: implementing OIDC on at least two apps. I've used a remote keycloak instance for authention for my household and so far so good. Now I'll try to understand the configurations a little better before take on other items on my backlog.

 

I've seen a lot of posts for a lot of different homepage for selfhosters: homepage, homer, homarr (which has an 700 MB image!).

I was after something lightweight, simple and easy to configure and get up and running without all the frills and flashy features. And I found a hidden geml in envlinks - a really simple dashboard that is supersimple to configure (just env-variables in the compose file) and still customisable enough for my needs.

Hope it will satisfy the need of other minimalists out there :-)

 

Hello selfhosters.

We all have bare-metal servres, VPS:es, containers and other things running. Some of them may be exposed openly to the internet, which is populated by autonomous malicious actors, and some may reside on a closed-off network since they contain sensitive data.

And there is a lot of solutions to monitor your servers, since none of us want our resources to be part of a botnet, or mine bitcoins for APTs, or simply have confidential data fall into the wrong hands.

Some of the tools I've looked at for this task are check_mk, netmonitor, monit: all of there monitor metrics such as CPU, RAM and network activity. Other tools such as Snort or Falco are designed to particularly detect suspicious activity. And there also are solutions that are hobbled together, like fail2ban actions together with pushover to get notified of intrusion attempts.

So my question to you is - how do you monitor your servers and with what tools? I need some inspiration to know what tooling to settle on to be able that detect unwanted external activity on my resources.

 

Hello selfhosters.

I'm considering to buy a SFF PC to act as a docker host. The main services / applications I'm going to run is going to be Immich. Filebrowser, Samba-share and eventually Paperless-ngx. I've been eyeing PCs with a N100 / N200 specifically to run quiet, and to conserve on energy consumption. I am most likely going for an Asus PN42 and will have an SSD in it to keep the moving parts to a minimum.

To those who are running machines with this CPU and similiar workloads, how has your experience been?

view more: next ›