Background: 15 years of experience in software and apparently spoiled because it was already set up correctly.

Been practicing doing my own servers, published a test site and 24 hours later, root was compromised.

Rolled back to the backup before I made it public and now I have a security checklist.

  • @Valmond
    link
    33 days ago

    I’m interested, how do you expose your services (on your PC I assume) to the internet through wireguard? Is it theough some VPN?

    • @Zanathos
      link
      93 days ago

      Wireguard IS a VPN. He has somehow through his challenges of exposing services to the internet, exposed wireguard from his home to the internet for him to connect to. Then he can connect to his internal services from there.

      It’s honestly the best option and how I operate as well. I only have a handful of items exposed and even those flow through a DMZ proxy before hitting their destination servers.

      • @Valmond
        link
        3
        edit-2
        3 days ago

        Oh, I thought it was a protocol for virtual networks, that merely VPNs used. The more you know!

        Edit: spelled out VPN 😅

    • @[email protected]
      link
      fedilink
      English
      43 days ago

      VPN’s are neat, besides the fact they’re capable of masking your IP & DNS they’re also capable of providing resources to devices outside a network.

      A good example is the server at my work is only accessible on my works network, to access the server remotely without exposing it directly to the internet would be to use a VPN tunnel.

    • @[email protected]
      link
      fedilink
      13 days ago

      Just a note, while wireguard makes its own VPN tunnel, it differs slightly in that it isn’t the typical VPN server with vpn connecting clients, it is more akin to a peer network. Each peer device gets it’s own “server” and “client” config section in the setup file. And you share the public keys between each peer before hand, and set the IPs to use.