zlacker

[return to "A story on home server security"]
1. Shank+La[view] [source] 2025-01-05 14:41:31
>>todsac+(OP)
For all intents and purposes, the only ports you should ever forward are ones that are explicitly designed for being public facing, like TLS, HTTP, and SSH. All other ports should be closed. If you’re ever reaching for DMZ, port forwarding, etc., think long and hard about what you’re doing. This is a perfect problem for Tailscale or WireGuard. You want a remote database? Tailscale.

I even get a weird feeling these days with SSH listening on a public interface. A database server, even with a good password/ACLs, just isn’t a great safe idea unless you can truly keep on top of all security patches.

◧◩
2. downri+Cd1[view] [source] 2025-01-05 23:43:53
>>Shank+La
Good time to make sure UPnP is not enabled. Its an authenticationless protocol. Yeah, you read that right, no auth needed.
[go to top]