• Noggog@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      7 hours ago

      Best I’ve done so far is crowdsec + pangolin geoblocking to just my country. I cant install tailscale subnet routers at all my friends to get their TVs to work. Non starter.

      • hperrin@lemmy.ca
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        4
        ·
        16 hours ago

        I’ve had my instance open to the internet for about two years with no issues.

        • dogs0n@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          2 hours ago

          I’m on your side. I don’t really see the difference hosting Jellyfin or Plex to the internet.

          If you want max security and headache for jellyfin, set up a VPN like they say, otherwise keep it exposed, It’s very unlikely for your server to be targeted and It hasn’t been worth the hassle for me.

          Edit: well not directly directly, do the minimum and put it behind a reverse proxy that adds HTTPS of course, but thats recommended in the docs so yah

          • hperrin@lemmy.ca
            link
            fedilink
            English
            arrow-up
            5
            arrow-down
            2
            ·
            16 hours ago

            I mean, the worst that could happen is they delete everything on the server and I have to spend time restoring from a backup. Not exactly the riskiest thing to do.

            • frongt@lemmy.zip
              link
              fedilink
              English
              arrow-up
              5
              arrow-down
              1
              ·
              15 hours ago

              Well, the worst that could happen is they start hosting CSAM out of your house and then the FBI knocks on your door.

                • frongt@lemmy.zip
                  link
                  fedilink
                  English
                  arrow-up
                  3
                  arrow-down
                  1
                  ·
                  10 hours ago

                  No. More likely is an automated botnet mining cryptocurrency or running a DDoS. That’s usually what happens.

                  • MaggiWuerze@feddit.org
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    arrow-down
                    1
                    ·
                    7 hours ago

                    Don’t forget automated tools of rights holders like Sony scouring your server and finding that Spiderman.3.bluRay.MKV, suing you for infringement

            • Appoxo@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              2
              ·
              16 hours ago

              I am using a non-privileged user on jellyfin.
              Admin stuff needs to be done with a hidden user.
              I might should be bothering to do rootless docker at some point…

        • Pika@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          14 hours ago

          depending what is on it, and your risk factor, theoretically an attacker can check known resource paths to confirm or deny whats on the server. That’s my main complaint currently on it is that the jellyfin team is aware of the fact that it doesn’t need authentication, but are looking for some miracle solution that won’t toss legacy clients out in order to fix, so therefore the issues are just perpetually open.

          edit: it looks like some of these issues may be being worked on now that they moved the problemic protocal into a plugin. I hope that that means they will close them in the next few releases!

    • ohshit604@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      13 hours ago

      VPN is the safest way for most, but if you do want to expose it to the internet just blacklist all IP’s and whitelist the known few, maybe slap Fail2Ban on it but honestly doesn’t make much of a difference.

      Traefik’s DDNS Allowlist plugin works great for such a task.