this post was submitted on 09 Feb 2025
123 points (96.9% liked)

Selfhosted

42631 readers
416 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

This is a continuation of my other post

I now have homeassistant, immich, and authentik docker containers exposed to the open internet. Homeassistant has built in 2FA and authentik is being used as the authentication for immich which supports 2FA. I went ahead and blocked connections from every country except for my own via cloudlfare (I'm aware this does almost nothing but I feel better about it).

At the moment, if my machine became compromised, I wouldn't know. How do I monitor these docker containers? What's a good way to block IPs based on failed login attempts? Is there a tool that could alert me if my machine was compromised? Any recommendations?

EDIT: Oh, and if you have any recommendations for settings I should change in the cloudflare dashboard, that would be great too; there's a ton of options in there and a lot of them are defaulted to "off"

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 30 points 1 week ago (3 children)

By not making them publicly accessible. With Wireguard there's really no reason.

Setup service to be active on a subnet, enable Wireguard to VPN into the subnet and use the services.

[–] [email protected] 18 points 1 week ago (8 children)

With Wireguard there's really no reason.

Well, that's kinda of a personal choice. If somebody needs to have services accessible by someone else besides him, that service can't be behind a VPN (let's face the truth: we know that we can't ask all out relatives and friends to use a VPN).

[–] [email protected] 4 points 1 week ago (1 children)

There’s also something to be said about some services being cordoned off in a VPN while leaving some public with security. I don’t necessarily want everyone within my full network if all I want is to share one service with them.

[–] [email protected] 2 points 1 week ago (4 children)

For that, you can restrict access to a single service with iptables.

load more comments (4 replies)
load more comments (7 replies)
[–] [email protected] 3 points 1 week ago (1 children)

Yeah, I'm not gonna tell the 50 users of my plex server to set up wireguard on their devices so they can request movies and TV series on my overseer, when I can instead just use NPM to make it publically accessible with a password prompt

[–] [email protected] 3 points 1 week ago

Your use case, and OPs, are completely different scenarios. I can't tell if you're being purposefully disingenuous or just flippantly stupid.

[–] [email protected] 1 points 1 week ago (4 children)

I agree with WG however I need https for a few locally hosted items like actual budget so I have that through nginx proxy manager. I was debating adding Authelia in front with some of my others (audiobook shelf, home assistant and music assistant) as sometimes I disconnect from my home network and forget to reconnect.

[–] [email protected] 2 points 1 week ago

Just out of curiosity, why do you disconnect from your home VPN?

load more comments (3 replies)
[–] [email protected] 22 points 1 week ago (2 children)

So there is https://en.wikipedia.org/wiki/Fail2ban which helps already to some degree.

But what are you trying to prevent? You have your services in a docker container, hopefully not running as root, which already makes it difficult to break out even if through a bug someone would be able to get access to the docker container.

I mean its not like your stuff is very important for someone to break in like the pentagon, you probably just have some photos from your phone on it, some lights can be switched on and off and some temperatures read.

I'm not trying to say that you should not care about it but I'm trying to figure out what your threat model is.

[–] [email protected] 24 points 1 week ago* (last edited 1 week ago) (2 children)

I feel weird about having those apps on the internet and basically being blind to threats. I mean yeah, I'm not a target on anyone's list and most IPs visiting the site are bots but I would still like to know what's going on.

I don't work in tech for a living, this is just a hobby for me so I have limited time to work on this stuff and do research. It's very possible I fucked something up and don't know it. I figured if I at least got an alert that said "hey, your immich server db was dumped and sent to ", I could at least turn it off

[–] [email protected] 1 points 1 week ago

By the time you get the alert and act on it, it’s too late.

Don’t expose these things to the open internet; VPN back into your network and access them.

load more comments (1 replies)
[–] [email protected] 3 points 1 week ago

IOT botnets are a thing. And if someone wanted to fire sell the US, all the vulnerable home networks would be on the table too. Great for a bit if extra chaos.

[–] [email protected] 19 points 1 week ago (1 children)

Check out crowdsec. Like fail2ban, but with crowdsourced lists on top.

[–] [email protected] 3 points 1 week ago

will do, thanks

[–] [email protected] 17 points 1 week ago

I would put this stuff behind VPN.

[–] [email protected] 10 points 1 week ago (1 children)

We expose about a dozen services to the open web. Haven't bothered with something like Authentik yet, just strong passwords.

We use a solid OPNSense Firewall config with rather fine-grained permissions to allow/forbid traffic to the respective VMs, between the VMs, between VMs and the NAS, and so on.

We also have a wireguard tunnel to home for all the services that don't need to be available on the internet publicly. That one also allows access to the management interface of the firewall.

In OPNSense, you get quite good logging capabilities, should you suspect someone is trying to gain access, you'll be able to read it from there.

I am also considering setting up Prometheus and Grafana for all our services, which could point out some anomalies, though that would not be the main usecase.

Lastly, I also have a server at a hoster for some stuff that is not practical to host at home. The hoster provided a very rudimentary firewall, so I'm using that to only open necessary ports, and then Fail2Ban to insta-ban IPs for a week on the first offense. Have also set it up so they get banned on Cloudflare's side, so before another malicious request ever reaches me.

Have not had any issues, ever.

[–] [email protected] 3 points 1 week ago (1 children)

Have also set it up so they get banned on Cloudflare’s side, so before another malicious request ever reaches me.

How did you end up setting that up?

[–] [email protected] 14 points 1 week ago (1 children)

Fail2ban allows you set different actions for different infringements, as well as multiple ones. So in addition to being put in a "local" jail, the offending IP also gets added to the cloudflare rules (? Is that what its called?) via their API. It's a premade action called "cloudflare-token-multi"

[–] [email protected] 2 points 1 week ago

that's awesome. thanks!

[–] [email protected] 9 points 1 week ago* (last edited 1 week ago) (2 children)

Auth portal for VPN tunnell -> Authelia -> fail2ban -> VLAN with services only.

ELK stack monitors the LAN. (Including VLAN)

Keep that VLAN segmented. You're good unless you're a DOGE employee, then I'd recommend quite a bit more security.

[–] [email protected] 4 points 1 week ago

This is the way. Layer 3 separation for services you wish to access outside of the home network and the rest of your stuff, with a VPN endpoint exposed for remote access.

It may be overkill, but I have several VLANs for specific traffic:

  • DMZ - for Wireguard (and if I ever want to stand up a Honeypot)
  • Services - *arr stack, some Kubes things for remote development
  • IoT - any smart things like thermostat, home assistant, etc
  • Trusted - primary at home network for laptops, HTPCs, etc

There are two new additions: a ext-vpn VLAN and a egress-vpn VLAN. I spun up a VM that's dual homed running its own Wireguard/OpenVPN client on the egress side, serving DHCP on the ext-vpn side. The latter has its own wireless ssid so that anyone who connects to it is automatically on a VPN into a non-US country.

[–] [email protected] 1 points 1 week ago

I've seen a bunch of people recommend Authelia. Do you mind if I ask why you went with it over other software? I only went with authentik because I found a tutorial on it first

[–] [email protected] 8 points 1 week ago (1 children)

I've tried different approaches with fail2ban, crowdsec, VPNs, etc. What I settled on is to divide the data of my services in two categories: confidential and "I can live with it leaking".

The ones that host confidential data is behind a VPN and has some basic monitoring on them.

The ones that are out in the public are behind a WAF from cloudflare with pretty restrictive rules.

Yes, cloudflare suck etc., but the value of stopping potential attacks before they reach your services is hard to match.

Just keep in mind: you need layers of different security measures to protect your services (such as backups, control of network traffic, monitoring and detection, and so on).

[–] [email protected] 4 points 1 week ago (1 children)

has some basic monitoring on them.

What monitoring software are you using?

I feel like the other measures you talked about (backups, condom of network traffic, etc) I'm doing ok on. Its really just the monitoring where I'm stuck. There's so many options

[–] [email protected] 3 points 1 week ago

There are so many monitoring tools with various degrees of complicated setup / configuration or the amount of information you get. And honestly, I've looked into various tools: checkmk, monit, Prometheus... And realised that I rarely look into that information anyway. Of all "fancy" tools, I liked the ease of Netdata to set up and the amount of information that you get. However, beware that their in the process to make their free / homelad offering worse. I've been eyeing beszel and don't forget CLI based tools that are avaible such as atop, btop, htop or glances.

If you want to delve deeper into the rabbit hole of monitoring, I can recommend you to read this article below: https://matduggan.com/were-all-doing-metrics-wrong/

[–] [email protected] 7 points 1 week ago* (last edited 1 week ago) (1 children)

Wazuh

Active responses are like fail2ban but better

[–] [email protected] 2 points 1 week ago

I'll look into it, thank you

[–] [email protected] 5 points 1 week ago (1 children)

I've half ass thought about this but never have tried to actually self host. If you have access to all devices, why not just use your own self signed certificates to encrypt everything and require the certificate for all connections? Then there is never a way to log in or connect right? The only reason for any authentication is to make it possible to use any connection to dial into your server. So is that a bug or a feature. Maybe I'm missing something fundamental in this abstract concept that someone will tell me?

[–] [email protected] 6 points 1 week ago (4 children)

If you have access to all devices, why not just use your own self signed certificates to encrypt everything and require the certificate for all connections?

Sounds like you are describing a VPN. I was using that setup before but small stuff like immich album sharing via a link won't work properly. Also, having to ensure a vpn is on and connected is a little to much to ask of my partner; they would turn it off and forget about it and then ask why their app wasn't working :/

[–] [email protected] 2 points 1 week ago (2 children)

I mean more like a self signed TLS certificate with your own host manually set in the browser. Then only make the TLS port available, or something like that. If you have access to both(all) devices, you should be able to fully encrypt by bruit force and without registering the certificate with anyone. That is what I do with AI at home.

[–] [email protected] 4 points 1 week ago (5 children)

I don't know much about certificates, but doesn't that just alert the browser that the certificate is not trusted and you can decide if keep going or not?

load more comments (5 replies)
[–] [email protected] 2 points 1 week ago (1 children)

oh, my mistake. tbh, I don't know enough about it but I'm interested. Why set up a TLS cert for AI at home? How is that benefiting you and your setup?

I've seen some people set up SSL certs for self hosted services and not make them publicly available but I didn't get around to seeing why they were doing it

load more comments (1 replies)
load more comments (3 replies)
[–] [email protected] 4 points 1 week ago* (last edited 1 week ago) (2 children)

So among my services I self host, a few need to be publicly accessible for work. For those I wish to remain private, Caddy only allows private IP ranges, plus then Authelia as auth which is set to 30 days. There is then the login of each service behind Authelia as well. It's as good as it needs to be for my needs.

If I were only self hosting private services, then as others have said, I would put all access through a VPN.

Edit: I should add that of course the private services are then only accessed via VPN to the router (part of the private IP ranges). Caddy as reverse proxy also obfuscates the subdomain names I use.

load more comments (2 replies)
[–] [email protected] 2 points 1 week ago (1 children)

Some of these you're already doing, but writing a complete* list. *almost garuanteed not to be complete, suggestions welcome

  1. Have everything behind the same reverse proxy, so that you have only one endpoint to worry about. Run it through ssllabs or similar to check your config.
  2. On your reverse proxy, add one or more layers of authentication if possible. Many possibilities here: If one app supports client certificates, while another has limited capabilities, you could probably tie together something where IPs are whitelisted to the ither services based on that certificate auth.
  3. Geoblock all countries you won't be accessing from
  4. crowdsec is pretty nice, this detects/blocks threats. kinda like fail2ban but on steroids.
  5. if you use one of those 5$/month VPSes, with a VPN tunnel to your backend services, that adds one layer of "if it's compromised, they're not in your house".

lastly consider if these things need to be publically avilable at all. I'm happy with 95% of my services only being available through Tailscale (mesh VPN, paid service with good enough free tier, open source+free alternatives available), and I've got tailscale on all my devices

[–] [email protected] 4 points 1 week ago (1 children)
  1. check

  2. check

  3. check

  4. I saw someone else recommend crowdsec. I'll look into it, thanks

if you use one of those 5$/month VPSes, with a VPN tunnel to your backend services, that adds one layer of “if it’s compromised, they’re not in your house”.

I've heard this mentioned before but I don't really understand how this works in practice. If the VPS was compromised, couldn't they use the VPN to then connect to my home?

[–] [email protected] 1 points 1 week ago

I set the VPN tunnel from the VPS to deny everything to the internal network by default, then put the services that need to be accessed on the allow list in the firewall. So the VPN endpoint from the VPS can only hit the very specific IPs/ports/protocols that were explicitly allowed. There is still the possibility of a compromise chain of VPS->service->container/VM->hypervisor->internal network access, but I feel comfortable with those layers.

You could also setup an IDS such as Snort to pick up on that exploit traffic between the services and internal VPN endpoint if extra security is necessary on top of fail2ban and log alerts on the VPS.

load more comments
view more: next ›