this post was submitted on 10 Feb 2025
844 points (99.4% liked)

linuxmemes

22744 readers
536 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     

    Background: 15 years of experience in software and apparently spoiled because it was already set up correctly.

    Been practicing doing my own servers, published a test site and 24 hours later, root was compromised.

    Rolled back to the backup before I made it public and now I have a security checklist.

    (page 2) 50 comments
    sorted by: hot top controversial new old
    [–] otacon239@lemmy.world 11 points 1 week ago (1 children)

    I’ve always felt that if you’re exposing an SSH or any kind of management port to the internet, you can avoid a lot of issues with a VPN. I’ve always setup a VPN. It prevents having to open up very much at all and then you can open configured web portal ports and the occasional front end protocol where needed.

    load more comments (1 replies)

    Weird. My last setup had a NAT with a few VMs hosting a few different services. For example, Jellyfin, a web server, and novnc/vm. That turned out perfectly fine and it was exposed to the web. You must have had a vulnerable version of whatever web host you were using, or maybe if you had SSH open without rate limits.

    [–] possiblylinux127@lemmy.zip 8 points 1 week ago (3 children)

    I like to spin up a public facing server and run tcpdump

    load more comments (3 replies)
    [–] Rentlar@lemmy.ca 7 points 1 week ago (2 children)

    I do worry about putting up public servers that other people might rely on because there's something I might not realize making it vulnerable.

    So far I have pubkey root login only on the VPSs I'm messing around with, but my ol' reliable private key from 6 years ago might be beginning to fall behind on encryption standards.

    [–] horse_battery_staple@lemmy.world 4 points 1 week ago (1 children)

    You may not want root login.

    ssh-keygen -t ed25519

    For that new key hotness

    load more comments (1 replies)
    load more comments (1 replies)

    Use gnome powder to shrink, go behind the counter, kick his ass and get your money back.

    [–] ikidd@lemmy.world 6 points 1 week ago (4 children)

    This is like browsing /c/selfhosted as everyone portforwards every experimental piece of garbage across their router...

    [–] smiletolerantly@awful.systems 10 points 1 week ago (1 children)

    Meh. Each service in its isolated VM and subnet. Plus just generally a good firewall setup. Currently hosting ~10 services plubicly, never had any issue.

    load more comments (1 replies)
    [–] Irelephant@lemm.ee 6 points 1 week ago

    hey, thats me!

    load more comments (2 replies)
    [–] MNByChoice@midwest.social 5 points 1 week ago

    Good on you learning new skills.

    This is why other sysadmins and cybetsecurity exist. Be nice to them.

    load more comments
    view more: β€Ή prev next β€Ί