Collection of potential security issues in Jellyfin This is a non exhaustive list of potential security issues found in Jellyfin. Some of these might cause controversy. Some of these are design fla…

  • t3rmit3@beehaw.org
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    23 hours ago

    Put the instance behind another authentication point like a VPN or reverse proxy with SSO. That will prevent the wider Internet from accessing it without legitimate users being cut off. You should be doing this with any server you operate (like Plex), but definitely one that may have legal implications.

    • ReversalHatchery@beehaw.org
      link
      fedilink
      English
      arrow-up
      6
      ·
      23 hours ago

      aaaand now you smart tv can’t connect. none of them. the clients dont even support http basic auth creds put into the URL for some crazy reason.

      for advanced HTTP-level authentication you would need to run a reverse proxy on the TV’s network that would add the authentication info. for the VPN idea you would need to tunnel the TV’s network’s internet connection at the router. or set up a gateway address in the TVs network settings that would do that. or use a reverse proxy here too so that it repeats the request to the real server.

      but honestly, this is the real and only secure way anyway. I wouldn’t be comfortable to expose jellyfin even if the devs are real experts. I mean vulns get discovered, in dotnet, jellyfin dependencies, linux filesystem, and reverse proxy, and honestly who has time to always tightly keep up to date with all that.

      that’s not to discount the seriousness of the issue though, it’s a real shame that jellyfin is so much against security

      • t3rmit3@beehaw.org
        link
        fedilink
        arrow-up
        5
        ·
        edit-2
        10 hours ago

        Your smart TV is (presumably) on your local network, so you should be routing the requests locally (point the client at the local ip, assuming it didn’t autodiscover it) not through the VPN/ tunnel.

        • ReversalHatchery@beehaw.org
          link
          fedilink
          English
          arrow-up
          3
          ·
          7 hours ago

          Your smart TV is (presumably) on your local network

          often, but not always. sometimes the TV is at a different house, when you are a guest or at a second property

          • t3rmit3@beehaw.org
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            50 minutes ago

            In which case there are still ways to make it work, like putting in an SSO bypass rule for the IP of your other property. Point is, under no circumstances is it impossible to both have it be protected against scanning attacks like the ones described in the gh issue, and keep it available to use over the internet for authorized users.

          • Saik0@lemmy.saik0.com
            link
            fedilink
            English
            arrow-up
            2
            ·
            3 hours ago

            Or even just on a differently vlan that you want to go through your reverse-proxy because that is where your security features are to separate you from shit you don’t trust.

    • kratoz29@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      20 hours ago

      I am sorry, I don’t think I follow, I am CGNATED anyway, so I need to use VPNs to access my server (if IPv6 is not available, for IPv4 I am experimenting with Tailscale funnels as of now).