• 1 Post
  • 71 Comments
Joined 6 months ago
cake
Cake day: December 28th, 2023

help-circle


  • Do you think webdav somehow dumps you database? No it’s just a protocol to save your files on your webserver. It’s just a middelman.

    recommended to somebody an option that is the exact opposite of what you know to be true.

    Yeah it’s my recommendation from my personal experience. Is that wrong? I use it nearly everyday without any data corruption. Is my personal experience not valide?

    The point is, syncthing is rock solid, never had any issue being it with my zotero database or syncing files between my devices. If you’re a Nextcloud advocate or are against my personal opinion so be it :).

    Agree that we disagree !



  • Nextcloud and syncthing a 2 different things. While synching keeps your files synchronized between your devices, nextcloud is a cloud platforme which gives you access to your files on your server. The difference is actually very important even though a lot would argue that they are the same.

    It really depends what type of technology you want/need. I would recommended syncthing for it’s simplicity and robustness. It only does one thing but it does it very well !!

    To give you an example, I have a syncthing sever which is a middleman for my Zotero database. Laptop <-> Server (syncthing) <-> desktop. It’s very important to keep it in sync for the integrity of the zotero database !

    This kind of workflow wouldn’t work with nextcloud or rather will most of the time corrupt my database.

    Nextcloud works as a simple cloud platforme wich is also great (with it’s up and downs) but works only as a cloud platforme to keep your files on your server.


  • N0x0n@lemmy.mltoSelfhosted@lemmy.worldShould I use a rolling distro?
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    18 days ago

    One downside of debian testing is you don’t get security patches when the package is freezed under testing.

    Rather use sid, but comes with it’s own share of troubles !

    Edit: I’m currently on Manjaro, wich is somehow a “semi-rolling” release based on arch. It takes a few weeks before it hits the stable branch. But while I love it as daily drive, don’t know if I would recommend it as server.

    Servers need to be stable, that’s why I use debian stable on my server.

    Maybe give fedora server a try? Which is more uptodate than debian and maybe more stable as a server OS than a rolling release !







  • N0x0n@lemmy.mltoSelfhosted@lemmy.world2 ports for 2 applications
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 month ago

    Not OP, but thanks for the write up !

    Regarding macvlan’s with docker, I tried to use them in the past and while I liked the idea of having every container on it’s own mac /ip address in the home network space, I couldn’t get the host to communicate directly with them.

    Everyone on the LAN could talk to my containers, except the host itself. IIRC there was/is some tricky part where you have to change the default route and create new iptables to make it work that way, but It seemed rather hacky and not secure at all.

    Now that I’m a bit more experienced with docker and all, do you know if this is possible or still one of the downside of macvlan’s?

    Edit: reference. I see he updated his post in 2023, maybe worth a new shot !!


  • You’re right, but only if you are an experienced IT guy in enteprise environnement. Most users (myself included) on Lemmy do not have the necessary skills/hardware to properly configure and protect their networking system, thats way I consider something like wireguard way more secure than opening an SSH port.

    Sure SSH key based configuration is also doing a great job but there is way more error prone configuration with an SSH connection than a wireguard tunnel.


  • Opening ports on your router is never safe ! There’re alot of bots trying to bruteforce opening ports on the web (specially ssh port 22)

    With SSH I would disable the password authentication a only used key based authentication. Also disable root access. (Don’t know how it works with forgero though)

    I would recommend something like wireguard, you still need to open a port on your router, but as long as they don’t have your private key, they can’t bruteforce it. (You can even share the wireguard tunnel with your friend :))

    Also use a reverse proxy with your docker containers.

    There are a lot of things you could do to secure everything, but If you relatively new to selfhosting, there’s a steep learning curve and a lot of time needed to properly secure everthing up. You could be safe by doing nothing for a few months but as soon as someone got into your system, you’re fucked !

    But don’t discourage yourself, selfhosting is fun !







  • Congrats !!!

    Only one day? Lucky you ! It took me a whole week to get it to work with self-signed ssl certificate behind Traefik + docker + Adguardhome.

    Adguard home rewrites and the correct certificate configuration solved most of my isues (android can be picky with self-signed root certificates). But I learned ALOT through the whole week, so I didn’t waste my time :).

    I hope you too learned alot :) but if I may, I would switch from AdguardHome to Pi-hole.

    I know… AdguardHomes functionalities and UI are awesome and overpass Pi-Holes’ but since I saw they add some strange trackers and very sketchy DNS request in their AdguardVPN android application, I don’t trust them anymore !