This is a continuation of my other post

I now have homeassistant, immich, and authentik docker containers exposed to the open internet. Homeassistant has built in 2FA and authentik is being used as the authentication for immich which supports 2FA. I went ahead and blocked connections from every country except for my own via cloudlfare (I’m aware this does almost nothing but I feel better about it).

At the moment, if my machine became compromised, I wouldn’t know. How do I monitor these docker containers? What’s a good way to block IPs based on failed login attempts? Is there a tool that could alert me if my machine was compromised? Any recommendations?

EDIT: Oh, and if you have any recommendations for settings I should change in the cloudflare dashboard, that would be great too; there’s a ton of options in there and a lot of them are defaulted to “off”

  • @q7mJI7tk1
    link
    English
    4
    edit-2
    2 days ago

    So among my services I self host, a few need to be publicly accessible for work. For those I wish to remain private, Caddy only allows private IP ranges, plus then Authelia as auth which is set to 30 days. There is then the login of each service behind Authelia as well. It’s as good as it needs to be for my needs.

    If I were only self hosting private services, then as others have said, I would put all access through a VPN.

    Edit: I should add that of course the private services are then only accessed via VPN to the router (part of the private IP ranges). Caddy as reverse proxy also obfuscates the subdomain names I use.

    • @a_fancy_kiwiOP
      link
      English
      11 day ago

      Caddy only allows private IP ranges

      Do you mind telling me more about this? How does that work; a VPN?

      • @q7mJI7tk1
        link
        English
        1
        edit-2
        1 day ago

        Sure, so I use Caddy as a reverse proxy for all my subdomains, the public ones direct straight to whatever service(s) are on IP:port etc, then the private ones only allow private IP ranges of which one is my VPN subnet, therefore only allowing LAN and VPN access. I then also have a section for each of the private subdomains with Authelia authentication which is omitted here in the caddyfile example:

        (allowed) {
        	@allowed client_ip 192.168.1.0/24 192.168.10.0/24 192.168.20.0/28
        }
        
        sub.domain.com {
        	import allowed
        	handle @allowed {
        		reverse_proxy 192.168.80.8:8080
        	}
        
        	handle {
        		abort
        	}
        }