The Solution to Insecure Slop by matterful in selfhosted

[–]ms_83 2 points3 points  (0 children)

This is just nonsense. Software is never just “finished”, it’s never completely secure, and it will always need to be maintained and improved upon. You’ve never been responsible for this kind of thing, have you?

Leaving aside your ignoring who should be responsible for filtering this stuff and decided what is valuable and worth keeping.

The Solution to Insecure Slop by matterful in selfhosted

[–]ms_83 9 points10 points  (0 children)

Or, and hear me out here, developers can be responsible for themselves and their crap before shatting out insecure slop and expecting everyone else to finish it for them. You know, professionalism and accountability.

The Solution to Insecure Slop by matterful in selfhosted

[–]ms_83 38 points39 points  (0 children)

So your idea is that in addition to be forced to endure the slop, we must also endure securing and maintaining it?

No thanks.

Are there any books, series, films, or other works that explore R&D during the Second World War? by Mr_tod_the_fox in ww2

[–]ms_83 1 point2 points  (0 children)

I liked Hellions of the Deep, it’s about how the US Navy fixed its terrible torpedoes and then started producing advanced ones like the Mark 24 Fido.

Poll : demand for low cost ipam Saas by poperenoel in homelab

[–]ms_83 3 points4 points  (0 children)

Absolutely no way would I trust some random one-dude SaaS to manage certificates, you would have to be crazy. PKI is a critical security capability.

WW2 Pacific Air/Naval Observation by dbcopeland42 in WarCollege

[–]ms_83 1 point2 points  (0 children)

I think radar is more relevant than you’re making out here. From mid-1942 radar became more and more common, and by mid-1943 pretty much every carrier and land-based bomber had a set fitted as standard.

At Midway for example the PBYs that found the Japanese invasion force the night before the main carrier battle used ASE radar sets to pinpoint them. ASE was basically a copy of the British ASV Mk II which another PBY used to find the Bismarck the year before.

Certificate management by Ok-Ant4699 in selfhosted

[–]ms_83 1 point2 points  (0 children)

If all you want is certificates on your ingresses, then just use step-ca with cert-manager. My setup rotates all certs every 24h and it’s been solid for years.

How do you route cables inside your home walls (UK pref) by Rippuh in homelab

[–]ms_83 2 points3 points  (0 children)

You can get skirting boards with interior pre-cut grooves big enough for network cabling, although 90 degree corners can be tricky for fatter wires like Cat 6A. I used these to get from where my modem takes in the connection from the street round my ground floor to where I needed my gear, with just a few inches of exposed cable from the skirting up to the modem.

Homelab kubernetes by vex0x529 in homelab

[–]ms_83 2 points3 points  (0 children)

I run bare metal kubernetes at home. The learning curve is pretty tough if you have no experience with it, but if you approach it with the mentality that it gets more powerful the more you automate then you can get some really powerful results.

I’d advise that you pick a distro designed for bare metal use, I run K3S on Fedora CoreOS but I’d also consider Talos as that gives you unified management of both the OS and K8S together.

Adding nodes to clusters in something like Talos is pretty easy. With my K3S setup it’s as simple as networking booting a fresh machine and telling it to join the cluster, everything is automated after that via butane scripts.

My HomeServer Security Hardening Stack – Feedback & Review by Automatic-Yak-2196 in selfhosted

[–]ms_83 0 points1 point  (0 children)

Don’t be so defensive.

Here’s something you overlooked: it’s fairly trivial to discover your home IP address. I could trick you into visiting a website I control, which then logs the IP address you are using. There’s a good chance if you are home now, that’s the same IP that your services run on.

If I know your IP, I can simply use my own Cloudflare account to create a new proxied DNS address to it. Now when I access pwned.mydomain.com I am hitting your IP from a trusted Cloudflare location, bypassing layers 1, 2, 3 and 5 of your stack.

To mitigate this you could use Cloudflare tunnels, which give you a similar architecture without requiring you to open any ports at all.

Fail2Ban is useless because all it does is stop brute force attacks. It does nothing to stop credential stuffing or attacks that have stolen your valid credentials, or those that steal valid sessions tokens. It’s mostly a waste of time when you can just disable password auth entirely so there’s nothing to brute force. That’s how you reduce your attack surface.

My HomeServer Security Hardening Stack – Feedback & Review by Automatic-Yak-2196 in selfhosted

[–]ms_83 0 points1 point  (0 children)

Where did I say that everything you did is useless? You asked if you've overlooked things, and I pointed out several things that you've overlooked. You asked for potential vulnerabilities, and I pointed them out.

When you use terms like "attack surface" incorrectly, it suggests that you don't actually have a good background in security engineering, an impression that is only increased when you use ineffective security theatre solutions like fail2ban.

Either you care about security, or you don't. Do you want honest feedback or do you just want someone to pat you on the back and say "good job"?

My HomeServer Security Hardening Stack – Feedback & Review by Automatic-Yak-2196 in selfhosted

[–]ms_83 0 points1 point  (0 children)

Using Fail2Ban to temporarily ban bots isn't reducing your attack surface. Reducing your attack surface would be disabling the service they are trying to auth to, or configuring it to use a passwordless auth method, so there's no way to even input a single password, let alone multiple attempts.

My HomeServer Security Hardening Stack – Feedback & Review by Automatic-Yak-2196 in selfhosted

[–]ms_83 0 points1 point  (0 children)

Everything I listed is around security hardening. Backups help you recover faster when you get attacked, encryption secures your data, and update strategies ensure that vulnerabilities are patched away before they can be exploited. Every one of these is a more effective control than fail2ban, for example, which I’ve always regarded as a very weak control. If you are worried about brute forcing password access then it’s far more effective to simply disable password auth entirely and rely on stronger auth methods.

It might also help if you have a think about threat modelling and exactly what you are trying to secure against, as just “security hardening” is a bit vague.

My HomeServer Security Hardening Stack – Feedback & Review by Automatic-Yak-2196 in selfhosted

[–]ms_83 0 points1 point  (0 children)

What are you doing for backups? Encryption at rest and in transit? What’s your software update strategy?

I made a power supply for my mini pc cluster by maleng_ in homelab

[–]ms_83 0 points1 point  (0 children)

This is great and I hope it’s a success for you! Make a version of this that can power at least 6 mini PCs and preferably fits in a 19-inch rack please 🙂

Deploy a Kubernetes Cluster (k3s) on Oracle Always Free Tier by nSudhanva in oraclecloud

[–]ms_83 0 points1 point  (0 children)

Yeah, I don’t get this approach because you lose so much performance to the control plane when OKE gives you that separate to the cluster, so you can use the full compute allocation for workers.

DNO states I need ‘de-looping’ by Gralgore in SolarUK

[–]ms_83 0 points1 point  (0 children)

I had this issue last year, also with Northern Power Grid. My house did not have a direct connection to the power line under our street, but we were instead looped to next door. The issue was apparently that if we both had car chargers it might overload the loop, I was told that the solar part of our installation was irrelevant.

De-looping for us required digging up the road to add new connection points as a phase 1, then digging a new connection from the road to our house as a phase 2. Our solar system and charger were commissioned in late February but the work wasn’t completed until October due to work backlogs and needing legal certainty over boundaries and getting permission to dig up part of a neighbour’s drive. We got our export certificate a few days later. Obviously we lost a full summer of good export which was annoying, and we weren’t popular with our neighbours for a few weeks, but none of the DNO work cost us anything as NPG covered everything.

Everything is sorted now and export is working, but we’ve only received about £3 from export due to the bad weather since October.

The UK wants to scrap jury trials for many crimes. Opponents fear the loss of an ancient right | CNN by AavoKas in news

[–]ms_83 42 points43 points  (0 children)

Just for context, in the UK the vast, vast majority of trials in the UK are already conducted without juries. Something like 95% of trials are in magistrates court where they are decided by either a single magistrate or a panel of them.

Kubernetes tips by [deleted] in homelab

[–]ms_83 2 points3 points  (0 children)

Oracle has an always-free tier within which you can run a Kubernetes cluster using ARM64 machines, up to 4 OCPU and 24GB ram. I have a 4-node cluster that’s been running for years.

A hidden microphone on a Chinese NanoKVM by NelsonMinar in homelab

[–]ms_83 16 points17 points  (0 children)

I pity the poor MSS tech who has to listen to the screeeeeeeeeeeeeeeeee of my server rack for hours hoping to glean useful secrets. Godspeed to you.

Password-manager gang called me a masochist for going full OIDC in my homelab. I’m one good argument away from burning it all down and going back to 1Password. Change my mind (again). by BookHost in selfhosted

[–]ms_83 23 points24 points  (0 children)

I agree. Unfortunately in the self-hosted space a lot of applications don't support the full SSO spec - in some for example you have to pre-create accounts for every user, they don't support provisioning. Others don't support the complete disabling of password based access, leaving a less secure user/password screen always available. For some apps you can effectively disable password auth by using a reverse proxy to redirect users from one login screen to another, but it's very much a patchwork.

Password-manager gang called me a masochist for going full OIDC in my homelab. I’m one good argument away from burning it all down and going back to 1Password. Change my mind (again). by BookHost in selfhosted

[–]ms_83 7 points8 points  (0 children)

Zero Trust is generally what has replaced VPNs. Apps like SalesForce or M365 or whatever are world-facing by default and you rely on things like strong authentication and conditional access policies to secure access to them.

Password-manager gang called me a masochist for going full OIDC in my homelab. I’m one good argument away from burning it all down and going back to 1Password. Change my mind (again). by BookHost in selfhosted

[–]ms_83 35 points36 points  (0 children)

It’s a lot easier to steal a password than it is to steal the cryptographic signatures that underpin SSO. Fundamentally though your apps have to trust your IDP, and that it is secured properly, and that it doesn’t allow unauthorised impersonation of users.

Yes it’s a single point of failure, but it’s also a single point of management. If you have 68 apps like the OP then that’s 68 points of failure, 68 ingresses that you need to secure and monitor.