this post was submitted on 01 Sep 2023
79 points (94.4% liked)

Selfhosted

40183 readers
498 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I have a Jellyfin server, NextCloud instance, etc that I share with friends and family. Currently, I serve them over the open-internet using Cloudflare tunnels. Obviously this has some security implications that I don't love. Also recently one of my domains got flagged as malicious by google and now Chrome browsers won't go to the site - annoying.

I use Tailscale already to access my server infra remotely, but honestly I don't see this as a viable option for my non-technical friends and family. Plus, I need to support all kinds of devices like smart tvs. How do you fine folks deal with this issue?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 year ago (2 children)

I share my Home Assistant with family, Nextcloud and Jellyfin with family and friends and websites/blog with the entire world.

I do it with a domain and a subdomain for each service. Each website/service has it's own Let's Encrypt SSL cert managed by Traefik. So all the family members and friends need is the URL and usernames and passwords. Like any other service. I don't know what you did to become flagged as malicious by Google, but my services have run for years without such an issue. So maybe it's just time to switch to a different domain name?

[–] [email protected] 3 points 1 year ago (1 children)

I don’t know what you did to become flagged as malicious by Google

My dynamic public IP recently got flagged by Google and it wouldn't allow logins to any Google accounts coming from my home, even with multiple correct authentication factors. We could connect though the data plan on our phones without a problem because they got (other) IPs from the mobile carrier, but not through the home ISP. We got security emails asking "is this you?" but confirming did nothing. It went away only when the ISP cycled to another of their public ranges.

[–] [email protected] 1 points 1 year ago (1 children)

Might be way off here but have you checked if you actually got hacked and they just didn’t destroy anything?

[–] [email protected] 1 points 1 year ago (1 children)

I would entertain the possibility if there was any sign, or if I knew how Google takes these decisions.

[–] [email protected] 1 points 1 year ago (1 children)

Honestly, I would just take this as an indicator of something fishy going on. Either google crawled your ip and found things it didn’t like or stuff came out of it to google. Either a scripted action (which looks malicious from the outside) or advertising emails. Your logs should at least tell you if there have been any suspicious logins on any of the exposed services.

[–] [email protected] 1 points 1 year ago (1 children)

That's the thing, the only thing I have open to the Internet is a port forwarded SSH with non-root key authentication, into an up-to-date Debian stable. The logs show no attempts. The odds of someone breaking into public key OpenSSH and getting root, with daily security updates, are rather slim IMHO. The router is also an attack surface but it runs up to date OpenWRT.

[–] [email protected] 1 points 1 year ago (1 children)

In this case I‘m out of ideas. :) but thanks for elaborating. I appreciate it.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

No problem, you made a good point.

In any case, my main beef was that relying solely on IP is a pretty shitty way to deal with this on Google's part. They make you jump through hoops and establish over half a dozen ways of proving who you are (user & password, secret question & answer, secondary emails, OTP codes, secondary auth codes, phone SMS, phone confirmation – which are behind phone unlock) and none of that matters when they don't like your current IP? Then what are they for?

[–] [email protected] 1 points 1 year ago

Makes total sense. Good luck figuring it out. :)

[–] [email protected] 1 points 1 year ago

I use cloudflare's firewall for some security rules, one of which was to block "known bots/scrapers". This was blocking Google from accessing/scraping my site, and my theory is that they flagged it just because of that. I've turned it off for know, so we'll see.