Skip Navigation
Is it practically impossible for a newcomer selfhost without using centralised services, and get DDOSed or hacked?
  • I'm positive that F5's marketing department knows more than me about security and has not ulterior motive in making you think you're more secure.

    Snark aside, they may do some sort of WAF in addition to being a proxy. Just "adding a proxy" does very little.

  • CBS News poll: In debate, Democrats want more forceful Biden, GOP wants polite Trump; most want to hear about issues
  • They can't fulfill their campaign promises and they won't get elected if they didn't make them.

    People are stupid. They want the sweet lies even knowing that they're lies. If a candidate said "I'll try to do X but since that's mostly up to Congress then in reality I'll maybe get 50% of X done" then nobody would vote for them.

  • Is it practically impossible for a newcomer selfhost without using centralised services, and get DDOSed or hacked?
  • Put your reverse proxy in a DMZ, so that only it is directly facing the intergoogles

    So what? I can still access your application through the rproxy. You're not protecting the application by doing that.

    Install a single wildcard cert and easily cover any subdomains you set up

    This is a way to do it but not a necessary way to do it. The rproxy has not improved security here. It's just convenient to have a single SSL endpoint.

    There’s even nginx configuration files out there that will block URL’s based on regex pattern matches for suspicious strings. All of this (probably a lot more I’m missing) adds some level of layered security.

    If you do that, sure. But that's not the advice given in this forum is it? It's "install an rproxy!" as though that alone has done anything useful.

    For the most part people in this form seem to think that "direct access to my server" is unsafe but if you simply put a second hop in the chain that now you can sleep easily at night. And bonus points if that rproxy is a VPS or in a separate subnet!

    The web browser doesn't care if the application is behind one, two or three rproxies. If I can still get to your application and guess your password or exploit a known vulnerability in your application then it's game over.

  • Is it practically impossible for a newcomer selfhost without using centralised services, and get DDOSed or hacked?
  • My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web,

    The mapping is helpful but not a security benefit. The latter can be done with a firewall.

    Paraphrasing - there is a bunch of stuff you can also do with a reverse proxy

    Yes. But that's no longer just a reverse proxy. The reverse proxy isn't itself a security tool.

    I see a lot of vacuous security advice in this forum. "Install a firewall", "install a reverse proxy", etc. This is mostly useless advice. Yes, do those things but they do not add any protection to the service you are exposing.

    A firewall only protects you from exposing services you didn't want to expose (e.g. NFS or some other service running on the same system), and the rproxy just allows for host based routing. In both cases your service is still exposed to the internet. Directly or indirectly makes no significant difference.

    What we should be advising people to do is "use a valid ssl certificate, ensure you don't use any application default passwords, use very good passwords where you do use them, and keep your services and servers up-to-date".

    A firewall allowing port 443 in and an rproxy happily forwarding traffic to a vulnerable server is of no help.

  • Will the Debate This Week Be ‘Rah-Rah’ or ‘Ruh-Roh?’
  • There are two candidates. No, the others are not viable. Yes I know that's unfair. Yes voting for them is basically not voting and potentially helps another candidate you "hate more" to win instead.

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)AT
    atzanteol @sh.itjust.works
    Posts 0
    Comments 1.8K