zlacker

[parent] [thread] 2 comments
1. IgorPa+(OP)[view] [source] 2026-01-12 15:39:24
For every remote exploit and cloud-wide outage that has happened over the past 20 years my sshd that is exposed to the internet on port 22 has had zero of either. There were a couple of major OpenSSH bugs but my auto updater took care of that before I saw it on the news.

You can trust BugCorp all you want but there are more sshd processes out there than tailnets and the scrutiny is on OpenSSH. We are not comparing sshd to say WordPress here. Maybe when you don’t over engineer a solution you don’t need to spend 100x the resources auditing it…

replies(1): >>lillec+SF
2. lillec+SF[view] [source] 2026-01-12 18:43:14
>>IgorPa+(OP)
If you only expose SSH then you're fine, but if you're deploying a bunch of WebApps you might not want them accessible on the internet.

The few things I self host I keep out in the open. etcd, Kubernetes, Postgres, pgAdmin, Grafana and Keycloak but I can see why someone would want to hide inside a private network.

replies(1): >>IgorPa+r21
◧◩
3. IgorPa+r21[view] [source] [discussion] 2026-01-12 20:31:07
>>lillec+SF
Yeah any web app that is meant to be private is not something I allow to be accessible from the outside world. Easy enough to do this with ssh tunnels OR Wireguard, both of which I trust a lot more than anything that got VC funding. Plus that way any downtime is my own doing and in my control to fix.
[go to top]