• realitaetsverlust@piefed.zip
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      1 day ago

      People who don’t care about security are the cancer of the selfhosting-world. Billions of devices are part of a botnet because lazy/stupid owners don’t care about even the most basic shit, like changing the stock password. It’s insane.

      • autriyo@feddit.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 day ago

        Still feels like I’m doing too little, but kinda hate 2fa.

        And I kinda don’t want to know if complex passwords and low retries before an account gets locked out are enough.

        • realitaetsverlust@piefed.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          10 hours ago

          And I kinda don’t want to know if complex passwords and low retries before an account gets locked out are enough.

          I’ve created a custom cert that I verify within my nginx proxy using ssl_client_certificate and ssl_verify_client on. I got that cert on every device I use in the browser storage, additionally on a USB stick on my keychain in case I’m on a foreign or new machine. That is so much easier that bothering with passwords and the likes, and it’s infinitely more secure.

          • autriyo@feddit.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            6 hours ago

            That would only work if I’m the only one using my hosted stuff, but can’t really expect non tech ppl to deal with stuff like that.

            They already struggle with the little 2fa they have to use. Introducing yet another system is too much to ask.

            • realitaetsverlust@piefed.zip
              link
              fedilink
              English
              arrow-up
              1
              ·
              4 hours ago

              Adding certificates is a 5 step process: Settings -> Privacy and Security -> View Certificates -> Import -> Select file and confirm. That’s on firefox at least, idk about chrome, but probably not significantly more complex. With screenshots, a small guide would be fairly easy to follow.

              Don’t get me wrong, I do get your point, but I don’t feel like making users add client certs to their browser storage is more work than helping them every 2 weeks because they forgot their password or shit like that lol. At least, that’s my experience. And the cool thing about client certs is they can’t really break it, unlike passwords which they can forget, or change them because they forgot, just to then forget they changed it. Once it runs, it runs.

    • LunaChocken@programming.dev
      link
      fedilink
      English
      arrow-up
      4
      ·
      2 days ago

      I setup caddy and a proxy server for ingress.

      Essentially I have a server with wireguard connections between my home server and the external VM.

      Proxy using proxy protocol with nginx so it preserves the ip.

      DNS certificate management with cloudflare, and I’ve got Authelia in front of the majority of my websites, with some exclusion rules, say for a share link.

      Authelia has mandatory 2FA, anything less is silly, with Grafana alloy scrapping caddy metrics.

      Anywho most of my stuff runs in docker. The stuff I don’t want on the WAN but on tailscale/Lan has a filter to block the wireguard interface.

      • Croquette@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        10
        ·
        2 days ago

        Tell that to someone starting out and look at their deer in the headlight face. Then you’ll realize that the point went over your head.