73

I have a Jellyfin server, NextCloud instance, etc that I share with friends and family. Currently, I serve them over the open-internet using Cloudflare tunnels. Obviously this has some security implications that I don't love. Also recently one of my domains got flagged as malicious by google and now Chrome browsers won't go to the site - annoying.

I use Tailscale already to access my server infra remotely, but honestly I don't see this as a viable option for my non-technical friends and family. Plus, I need to support all kinds of devices like smart tvs. How do you fine folks deal with this issue?

you are viewing a single comment's thread
view the rest of the comments
[-] Haui@discuss.tchncs.de 1 points 1 year ago

Might be way off here but have you checked if you actually got hacked and they just didn’t destroy anything?

[-] lemmyvore@feddit.nl 1 points 1 year ago

I would entertain the possibility if there was any sign, or if I knew how Google takes these decisions.

[-] Haui@discuss.tchncs.de 1 points 1 year ago

Honestly, I would just take this as an indicator of something fishy going on. Either google crawled your ip and found things it didn’t like or stuff came out of it to google. Either a scripted action (which looks malicious from the outside) or advertising emails. Your logs should at least tell you if there have been any suspicious logins on any of the exposed services.

[-] lemmyvore@feddit.nl 1 points 1 year ago

That's the thing, the only thing I have open to the Internet is a port forwarded SSH with non-root key authentication, into an up-to-date Debian stable. The logs show no attempts. The odds of someone breaking into public key OpenSSH and getting root, with daily security updates, are rather slim IMHO. The router is also an attack surface but it runs up to date OpenWRT.

[-] Haui@discuss.tchncs.de 1 points 1 year ago

In this case I‘m out of ideas. :) but thanks for elaborating. I appreciate it.

[-] lemmyvore@feddit.nl 1 points 1 year ago* (last edited 1 year ago)

No problem, you made a good point.

In any case, my main beef was that relying solely on IP is a pretty shitty way to deal with this on Google's part. They make you jump through hoops and establish over half a dozen ways of proving who you are (user & password, secret question & answer, secondary emails, OTP codes, secondary auth codes, phone SMS, phone confirmation – which are behind phone unlock) and none of that matters when they don't like your current IP? Then what are they for?

[-] Haui@discuss.tchncs.de 1 points 1 year ago

Makes total sense. Good luck figuring it out. :)

this post was submitted on 01 Sep 2023
73 points (94.0% liked)

Selfhosted

40406 readers
383 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS