What’s your go too (secure) method for casting over the internet with a Jellyfin server.

I’m wondering what to use and I’m pretty beginner at this

  • drkt@scribe.disroot.org
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    4 hours ago

    it attempts to log in using a list of credentials.

    Do you read what you post or do you just google “ssh vulnerability” and post the first result to waste my inbox space?

    Software doesn’t get patched all the time,

    SSH does, it is one of the codebases with the most eyeballs on it at any given time and patches to it get fast-tracked downstream.

    advising hobbiests on how to configure and maintain their personal server, not the engineering meeting for a fortune 500

    You don’t need to be a genius to enable keys, disable root and install fail2ban.

    it remains best practice not to expose ssh to raw internet unless absolutely necessary

    This is correct, but we are arguing about a case in which it is necessary to expose something and it’s better that it’s one of the most secure and battle-tested pieces of software in the world as opposed to some open source hobby *arr stack.

    arguing against the industry standard … more experience and engineering time than you or I.

    I work in this industry, ma’am.

    Did you know that simply being connected to the internet puts you at risk? Your firewall could have a vulnerability! Your router’s admin panel could be misconfiguration and exposed to the internet! The only way to be safe is to unplug your cable and stop replying to me. Also rip out your bluetooth modules and any LEDs in every device you own because they have been demonstrated to be attack vectors. In fact just stop using anything more complicated than a MOSFET.

    • Ptsf@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 hours ago

      People like you in this industry are legitimately the reason botnets and significant compromise still exists. “You don’t need to be a genius to do all this additional config to make this thing I’m referring to as secure, secure.” Do you even read your own writings before you hit post? Also your final argument is so slathered in whataboutism I can’t even. Yes, any internet connectivity is going to be less secure than an air gap, but when you’re advising implementations you should keep security posture and best practices in mind. What you’re speaking on is more complex than any one person’s understanding of it due to significant layers of abstraction. Exhibit a? Ssh is not a codebase. It’s a network protocol. The codebase is literally different depending on implementation.