kristoff

joined 1 year ago
[–] kristoff@infosec.pub 5 points 8 months ago (4 children)

Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.

So, get S3 storage for your backups from a completely different company?

I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as "of-premises"

[–] kristoff@infosec.pub 2 points 8 months ago

First of all, thanks to all who replied! I didn't think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.

As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a "light redundant" senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the "makeing a backup" question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?

Or are there other caviats I haven't thought about?

[–] kristoff@infosec.pub 1 points 8 months ago

Great thanks! (also thanks to Mike .. you have some valid points)

[–] kristoff@infosec.pub 2 points 9 months ago

For me, the first goal is to simply understand the setup. I now have been able to create a setup with two frontend jvb-instances and one backend. In the end, the architecture setup of a jitsi-server is quite nicely explained, and -by delving a little bit into the startup scripts of the docker-based jitsi setup, you do get some idea of how things fit together.

From a practicle point of view, I think I'll go for the basic setup (1 backend, 2 frontends) natively on two servers, and -if the backend server would go down- just have a dockerised backup-setup ready to go if it would be needed.

Thanks!

[–] kristoff@infosec.pub 1 points 1 year ago* (last edited 1 year ago)

Hi,

Good idea!

And once you have you domainname, you can do the following:

  • set up a reverse reverse proxy (apache, nginx) in front of nextcloud
  • in the configuration of apache/bginx use virtual hosts.
  • make sure that the default virtualhost (in apache, that is the the one that does not have "ServerName") first in the configuration. Point that to a local website with just an empty directory
  • then, AFTER the default virtual host, add the reverse-proxy configuration of your nextcloud instance.

What this does, is that if somebody addresses your website with a URL that does not contain the exact hostname of your nextcloud, the webquery will go to the empty website and simply return a 404. A hacker who does a webrequest to "https://your-ip-address/login" will just get a "404 not found" and not reach your nextcloud instance.

This keeps people who just scan the internet for vulnerable systems and try out all kind of URLs to try to get in out of your nextcloud.

Of course, this only works if you keep the full hostname of your instance to yourself and do not post it somewhere (including social media, mailing-lists, ...)

Good luck with your nextcloud server

[–] kristoff@infosec.pub 2 points 1 year ago

for the nextcloud instance on my local LAN , I use the .local domain (multicast DNS). Just enable avahi on your server and you can use hostname.local on your network without having to deal with local DNS on your router and so on.

[–] kristoff@infosec.pub 7 points 1 year ago* (last edited 1 year ago) (2 children)

Hi,

What is the reason you do not want a domain? it is not that DNS-domains are that expensive these days. The cheapest option I found is .ovh (which is one of the major cloud-providers in France), which is 3 euro / year (+VAT). You can then put as much hosts or subdomains under it, and it supports dynamic IP.

Agreed, .ovh is not the most "professional" looking domain, but it depends on what you want to do. If your goal is simply to have something for yourself / family / friends, then this is good enough.

BTW. Having your own domain for a nextcloud instance has additional advances: you can get a real https/tls certificate from letsencrypt, and -if you put a reverse proxy in front of your NC- it shields you from people who just scan the complete IP-space of the internet but who do not know your domain.

[–] kristoff@infosec.pub 2 points 1 year ago

Hi, I have it running as of today. apache reverse-proxy native on the server and "stable-8922" in docker.

I have been wondering if it makes sense to move the jvb from docker to the server. I guess that is the part of the system that pulls most of the traffic. I don't know if this make any real difference for performance or not.

Anycase. All, thanks again for the help. Appriciate it. :-)

Kr.

[–] kristoff@infosec.pub 2 points 1 year ago

Hi Neutrom, I don't know this one. I'll check it out. Thx! 👍

[–] kristoff@infosec.pub -1 points 1 year ago (1 children)

The question is .. do we care about THAT 80 % of the people. I would be more then happy if we can have that 20 % of more technical-oriented audience :-)

[–] kristoff@infosec.pub 0 points 1 year ago (1 children)

I use fedilabs. Works very well. Allows hashtag-following following the public feed of a remote instance multi-account with cross-account actions

[–] kristoff@infosec.pub 1 points 1 year ago

Hi all. Thanks for the feedback. Very much appreciated 👍. ... I will set it up in docker.

view more: ‹ prev next ›