The more I am selfhosting the more ports I do open to my reverse proxy.

I also have a VPN (wireguard) but there are also 3 family members that want to access some services.

Open ports are much easier to handle for them.

How many users do you have and how many ports are open?

My case: 4 users (family)/ 8 reversed proxy ports

How many users and open ports have you?

  • oendha@jlai.lu
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Currently I expose port 22 for SSH, 443 for Nginx and a couple extra for Syncthing (to mirror my media files between a Hetzner Storage Box and my NAS at home).
    There’s a specific setup I tried to build once but didn’t manage:

    • Expose only Wireguard port from my VPS
    • make it so that when (and only when) a device is connected to the VPS via Wireguard, then mydomain.xyz will target the VPS’ IP (and therefore hit my Nginx proxy which redirects to my various services at myservices.mydomain.xyz.

    I tried by having a Adguard Home running on that same VPS, and setting its IP as the DNS in the wg0.conf that goes on the client device but it didn’t work.

  • giant_smeeg@feddit.uk
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 year ago

    VPN because I don’t know enough about all the random arrr services to expose them trustworthily.

    • grue@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Do you even need a reverse proxy if you’re using Tailscale? What advantage does it give you over setting up your DHCP correctly such that you can access your services by hostname?

      • ShinNoodleBlackCup@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Because I have my own custom domain internally and don’t use tailscale while on I’m on my network physically. But I get the best of both worlds, however I do have Tailscale setup with DNsMasq to set to my domain name anyway instead of using the Tailscale domain

  • funk@lemmy.ca
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 year ago

    I’ve got a reverse proxy for stuff I want to be able to hit from the outside. It’s behind an SSO portal with 2fa (hardware token). Then for everything else I VPN in.

  • naeap@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    Wireguard, as only a handful of people need access to the services, I manage it manually - and not with Tailscale or something similar.

    With that my server looks nothing like a server from the outside, as I’m exposing nothing - Wireguard doesn’t even show up in a port scan

    • Jason2357@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      I like this approach, but I’m currently sitting in a foreign hotel who’s wifi seems to block WG. Annoying. Keep a TLS-protected reverse proxy for things you might need through obscure networks.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    2
    ·
    edit-2
    1 year ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    DNS Domain Name Service/System
    HTTP Hypertext Transfer Protocol, the Web
    IP Internet Protocol
    NAS Network-Attached Storage
    SSH Secure Shell for remote terminal access
    SSL Secure Sockets Layer, for transparent encryption
    SSO Single Sign-On
    TLS Transport Layer Security, supersedes SSL
    UDP User Datagram Protocol, for real-time communications
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)
    nginx Popular HTTP server

    [Thread #60 for this sub, first seen 18th Aug 2023, 07:55] [FAQ] [Full list] [Contact] [Source code]

  • JDubbleu@programming.dev
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I never open any ports to the open Internet other than the two my friend client uses.

    For remote access I use a P2P VPN called ZeroTier leaving it always running on the Pi, and switching it on for the remote device when needed. It’s free for up to like 50 users and is very powerful, but dead simple.

    • InvertedParallax@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      I used to, but less so now, I get that weakens the separation.

      Mostly the vps is hardened to f and that’s my defense but I agree it’s a bad one.

  • Engywuck@lemm.ee
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    1 year ago

    Reverse proxy and allowing connection only to IP from my country.

  • Ungoliantsspawn@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    1 year ago

    May I ask what do you guys have exposed to the internet?

    I personally just have a wireguard VPN (single UDP port open) and everything is accessible through an internal reverse proxy. I just never felt the need to expose nothing ant least not web related.

    • CumBroth@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 year ago

      One thing I need to publicly expose is my own instance of Mealie. It’s a recipe manager that supports multiple users. I share it with family and friends, but also with more distant acquaintances. I don’t want to have to provide and manage access to my network for each and every one of them.

      • grue@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        What made you pick Mealie over other stuff like Nextcloud Cookbook or Grocy or whatnot?

        • CumBroth@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 year ago

          I’ve never heard of NextCloud Cookbook before. Looking at its Github page, it says it’s “mostly for testers” and is unstable, so no point in even considering it for regular use at this point in time. Besides, I’m assuming you’d need to have your own instance of Nextcloud up and running to use it; I don’t use Nextcloud.

          As for Grocy and other more mature alternatives (Tandoori also comes to mind), I think I initially went with Mealie because it had the most pleasant UI out of all of them. I liked it and found that it satisfied all of my requirements, so I just kept using it.

    • Reborn2966@feddit.it
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 year ago

      a lot of stuff:

      • owncloud
      • paperless
      • immich
      • jellyfin
      • jellyseerr
      • traefik

      than i have stuff only accessible from local, like the *arr stack.

      i’m not using cloudflare or anything, should I?

      the only exposed ports i have are http / https and a random port for ssh.

      i also don’t use any sso… maybe i should set one up.

  • freddo@feddit.nu
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    Depending on the services you provide, the usual standard ports. So if you run http/https services, port 80 and 443 respectively.

    You seem to answer your own question.

  • Bezerker03@lemmy.bezzie.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I have two nginx ingress running on my cluster. One of private one public. Public one is what’s exposed on 80 and 443 to the net.

    The private is only available via VPN or lan. The public is for services I want internet exposed.

    My family have a VPN network set up to my lan on their router and have access to most services but the public stuff is for the internet friends

  • eximo@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Anything that is exposed is done through nginx proxy manager and 2FA is enforced on those apps either through the app or through Authelia.

    Some of the exposed apps are shared with friends and family so easier to expose securely than mess with VPN for them.

    Anything else is only accessible via VPN on my router.

    I need to look at tailscale.

  • eratic@feddit.uk
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    A reverse proxy isn’t a substitute for a VPN for access outside your network. And it isn’t any less secure; you only need to open 1 port however all of your services will be accessible via that single port which is arguably less secure.

    • MaggiWuerze@feddit.de
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Everything that is managed by that RP, yes. One should obviously be careful when selecting what to expose.