this post was submitted on 12 Sep 2023
3 points (71.4% liked)

Selfhosted

39980 readers
726 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

Hello selfhosters. I have a Linux VM spun up on my server that I access via Remmina. Would it be ok for me to expose Remmina for external access? It would be behind a reverse proxy as well as Authelia 2FA of course. Is that secure "enough", just for a VM?

top 18 comments
sorted by: hot top controversial new old
[–] Boris_NotTooBadinoff@lemmy.world 4 points 1 year ago (2 children)

You could try ZeroTier. I've not used it personally, but it's free if you host your own instance. Your traffic gets routed through that VM, and everything behaves like it's on the same LAN

[–] socphoenix@midwest.social 4 points 1 year ago

It’s free with their account using their services for up to 25 nodes. It uses direct connections where possible so your information goes straight from one device to the other without having to self host their program.

[–] chandz05@lemmy.world 1 points 1 year ago (1 children)

Looks like that's blocked on my work network too

[–] vector_zero@lemmy.world 2 points 1 year ago (1 children)

Maybe consider routing your traffic through an SSH tunnel?

[–] chandz05@lemmy.world 1 points 1 year ago

Yes that's what someone else said below. I will try that

[–] nottheengineer@feddit.de 4 points 1 year ago (1 children)

You can use tailscale for that, it took literally 1 minute to set up for me and is completely free for use cases like this.

[–] chandz05@lemmy.world 1 points 1 year ago (1 children)

Should have mentioned, Tailscale is blocked on my work network

[–] Snowplow8861@lemmus.org 1 points 1 year ago

Luckily on your own network you have control over these decisions! Especially with source and destination firewall rules.

[–] harrim4n@feddit.de 3 points 1 year ago (2 children)

In the end it depends on your risk profile and adversary model. Usually it's not a good idea though. Why not have an SSH tunnel to the network/machine and use port forwarding to forward the RDP connection? Or why not use SSH for remote access, period?

[–] chandz05@lemmy.world 1 points 1 year ago

My work's network is pretty locked down, which is why I'm trying to think of other solutions that would work.

[–] chandz05@lemmy.world 1 points 1 year ago (1 children)

Hey man, so I've been thinking about this and doing a lot of reading since I read your comment... Question: what makes an SSH tunnel any more secure than an SSL connection through a browser? I only have port 443 opened on my home network for reverse proxy and wouldn't want to open anything more to the internet. Am I missing something fundamental in terms of security? I would definitely like to understand this more.

[–] dragnet@kbin.social 1 points 1 year ago* (last edited 1 year ago) (1 children)

The nice thing about an SSH tunnel is that it only exists when you create it, on the fly, per use, with your SSH credentials. And it is only accessible if you possess an authorized private key. An SSL connection through a browser doesn't fill the same role. SSL provides privacy and security in the communication between server and client. It doesnt have authentication built in. If you are accessing through a web browser you are probably talking to a web server, but SSH allows you to tunnel any protocol (web, rdp, whatever) forwarding traffic, encrypted, across a chosen port.

Edit to add a bit more: attack surface. SSH is a very robust and heavily used protocol with well tested implementations. Other solutions involving the web are probably involving software stacks with layers of configuration, more rapid iteration to add features and therefore a higher probability of vulnerabilities existing or being introduced in updates. Is this consideration relevant to your use? Probably not, =P but you asked about what might differentiate these two approaches from a security standpoint.

[–] chandz05@lemmy.world 2 points 1 year ago

Ah perfect! Exactly what I was looking for! Thank you so much for that explanation. Definitely trying to understand more about security and your explanation just made something click in my brain :)

[–] lilShalom@lemmy.basedcount.com 1 points 1 year ago (1 children)

Do you have that VM siloed off from the rest of your network

[–] chandz05@lemmy.world 1 points 1 year ago
[–] dirtyrig@lemmy.sdf.org 1 points 1 year ago (1 children)

Personally my go-to for this would be the ipv6 experimental Yggdrasil-network. https://yggdrasil-network.github.io/

[–] chandz05@lemmy.world 1 points 1 year ago (1 children)

So from reading the site, is this an IPV6 end-to-end encrypted p2p network? That's super interesting, but I'm sure my work firewall would be hardened against any incoming traffic. Will definitely experiment with this though. And I love the name