• 3 Posts
  • 6 Comments
Joined 1Y ago
cake
Cake day: Jul 21, 2023

help-circle
rss

Hm, after the initial upload, it shouldn’t really generate much traffic if I can only manage to upload the diff, so it might not be much of an issue for me. I am not yet really familiar with tools like rsync and rclone, and also don’t know how the changes are stored in the Borg repo (e.g. if I move a 1 GB file from one folder to another, does that get picked up as a 1 GB change by the syncing tools?), so I would need to do some more research to see if that would be achievable.

Hetzner also looks nicely priced, but it would’ve been nice if I could choose an even cheaper tier with less storage, as 1 TB is quite overkill for this particular use case. I could of course use it to backup other things.


Not a requirement that it is E2EE, as the Borg repo is already encrypted. Guess my knowledge of these services is biased towards E2EE from previous research for use cases where that was a requirement.

Thanks for the tip, hadn’t hard about Backblaze before. Very reasonable pricing. Would a good strategy then be to schedule rclone to have it synced, or are there other ways that would be better?


Best practice for duplicating Borg backup repo?
I am currently hosting Nextcloud on Linode using the AIO Docker container. I am very happy with how this works, but the running costs is more than I would like to spend on this. I am running a 4 GB Linode (anything less would cause severe lag in the Web UI), with 2x100GB block storage (one for data and one for the Borg backup). In addition, I pay to maintain backup images of the server itself. So I've been meaning to self-host this on a server at home instead, especially as I am looking to upgrade my media station to something more gaming friendly, freeing up a perfectly good mini-PC to host Nextcloud and other services. I've told myself that I am waiting for the Linux client of Proton Drive to arrive, so that I can utilize my 500 GB storage there to keep a synced copy of the Borg backup repo. I am not sure I am willing to wait for this anymore (who knows when that will be ready?), and thought that maybe something like [filen.io](https://www.filen.io) could be used in the mean-time, as I could get 200 GB there for €2/month. But I am open to other solutions as well. So here's the actual question: how would I best make sure I keep the backup repo safe so that I could restore it later if something went wrong? What would the ideal setup look like, including local and remote copies?
fedilink

I recently started organizing my music to use with Jellyfin and/or Navidrome. Since Jellyfin requires a particular folder structure, I used this, and I’ve also used MusicBrainz Picard to tag all my music so that it works better with Navidrome. I ended up just using Jellyfin as it suited my needs perfectly, and using it with a desktop client on my laptop (Feishin) and mobile client on my phone (Finamp).

The way Jellyfin requires it to be organised is the way I would’ve done it myself anyway:

Artist 1
|-- Album 1
||----Disc 1
||----Disc 2
|–Album 2
Artist 2
|-- Album 1
etc …

In my experience, if you try to organize based on genres, you need to have a very defined sense of what genres everything you have is. Either you stick with very broad genres (Rock, Jazz etc.) or you get tons of subgenres that you quickly lose control over if you don’t know exactly what is what. Since the clients I use have the possibility to sort by genre, I am planning on giving it an overhaul at some point, but then I will use very broad genres.


This is probably where my lack of knowledge in networking shines through more than ever, but I kinda thought that local IPs would be handled locally and not depend on which DNS servers I use? But I guess that if VPN is active and has not been explicitly told to allow local connections through split tunneling, then it actually do make that request with whatever DNS server I use, which obviously couldn’t resolve some random local hostname?


Thanks for the tip. I will be looking into setting up SSH keys fairly soon, and look more into strengthening ciphers et al.

From a practical point of view, what is the likelihood of a brute-force login attempt to succeed? There are plenty of login attempts, but most of them are for root, and as I’ve disabled root-login that will fail no matter what. Other attempts are typically for generic other names such as ‘admin’, ‘user’ and ‘test’ that has no associated user on the server, as well as some weird choices that I can only imagine comes from some database breach.


[Question] Can access local server through VPN on laptop, but not on phone
This is a question mostly for the sake of trying to learn more about how self-hosting works, and it is not vital that I resolve this. But if anyone wants to help me understand this, I would greatly appreciate it. I have a media server running at home with certain Docker containers (Jellyfin, Navidrome and Audiobookshelf currently). I have not exposed these services to the internet, so they are currently only accessible on my home network, which is all I need for the time being. The server itself is connected to an external VPN provider as there may or may not be some torrenting involved at some point. Let's say the name of the server is mediaserver. From my laptop connected to the same network, I can access all these services through `http://mediaserver.local:` or `http://:`, while connected via the same VPN provider on the laptop also. On my cell phone (running CalyxOS), I am unable to do so. I need to disable VPN in order to access the services. What is the difference between my laptop connected via VPN and my phone doing the same thing, both connected to my home network. I didn't actually think the VPN would come in to play before making requests outside my home network, but that's probably just me being ignorant.
fedilink

Thanks for your answers!

  1. Alright, I guess I should also use the Cloudflare proxy. I could not find the reason I had not enabled it previously.
  2. I’m a bit confused as to what a DMZ proxy server is compared to a reverse proxy. Is this a separate server you’ve set up specifically to handle inbound traffic where you’ve set up Traefik, or is this a container on your main server where you also host Nextcloud?
  3. As I understand it, Authelia is a SSO solution that seems very beneficial for when I am running several services from the same server. Right now, I only run Nextcloud on the VPS - is there any added security benefit of running it there also, or is this mostly for convenience when hosting multiple services?

Setting up auto update and reboot once a week seems smart. Do you set this up with cron?


[Question] Security considerations when self-hosting Nextcloud
I've been self-hosting Nextcloud for sometime on Linode. At some point in the not too distant future, I plan on hosting it locally on a server in my home as I would like to save on the money I spend on hosting. I find the use of Nextcloud to suit my needs perfectly, and would like to continue using the service. However, I am not so knowledgeable when it comes to security, and I'm not too sure whether I have done sufficient to secure my instance against potential attacks, and what additional things I should consider when moving the hosting from a VPS to my own server. So that's where I am hoping from some input from this community. Wherever it shines through that I have no idea what I'm talking about, please let me know. I have no reason to believe that I am being specifically targeted, but I do store sensitive things there that could potentially compromise my security elsewhere. Here is the basic gist of my setup: - My Linode account has a strong password (>20 characters, randomly generated) and I have 2FA enabled. It required security questions to set up 2FA, but the answers are all random answers that has no relation to the question themselves. - I've disabled ssh login for root. I have instead a new user that is in the sudo usergroup with a custom name. This is also protected by a different, strong password. I imagine this makes automated brute-force attacks a lot more difficult. - I have set up fail2ban for sshd. Default settings. - I update the system at the latest bi-weekly. - Nextcloud is installed with the AIO Docker container. It gets a security rating A from the Nextcloud scan, and fails on not being on the latest patch level as these are released slower for the AIO container. However, updates for the container is applied automatically, and maintaining the container is a breeze (except for a couple of problems I had early on). - I have server-side encryption enabled. Not client-side as my impression is that the module is not working properly. - I have daily backups with borg. These are encrypted. - Images of the server are also daily backed up on Linode. - It is served by an Apache web server that is exposed to outside traffic with HTTPS with DNS records handled by Cloudflare. - I would've wanted to use a reverse proxy, but I did not figure out how to use it together with the Apache server. I have previously set up Nginx Reverse Proxy on a test server, but then I used a regular Docker image for Nextcloud, and not the AIO. - I don't use the server to host anything else.
fedilink