Kind of a quick off the cuff question… but is it difficult to get a docker hosted jellyfin server accessible outside of lan safely?

I have tailscale and a VPN I can use for my own devices but would like to be able to access it safely without needing those.

18 points

Stick with the VPN. No point in exposing more services with possible security vulnerabilities.

permalink
report
reply
18 points

I love Jellyfin but I would absolutely not make it accessible over the public internet. A VPN is the way to go.

permalink
report
parent
reply
5 points

Yeah I’m thinking maybe just have family sign up for tailscale.

permalink
report
parent
reply
3 points

Why not just run your own WireGuard instance? I have a pivpn vm for it and it works great. You could also just put jellyfin behind a TLS terminating reverse proxy.

permalink
report
parent
reply
1 point
*

Yep, that way you can set ACLs, you they can only access the jellyfin ports + the ports you allow them to.

Also, tailacale DNS.

The fact that tailscale has google/apple/etc logon integration will also help.

permalink
report
parent
reply
1 point

Why “absolutely” not?

permalink
report
parent
reply
2 points

Have you seen the link?

permalink
report
parent
reply
0 points

Oof, that’s bad… And lazy

permalink
report
parent
reply
5 points

Unfortunately a lot of these issues are architectural issues inherited from Emby

permalink
report
parent
reply
11 points

If you are not behind a CGNAT, it should be as easy as opening the necessary ports.

I have a reverse proxy running in ports 80, 443 and can safely access Jellyfin on a subdomain without issues from outside my LAN.

permalink
report
reply
4 points

To get it outside the LAN, you just need to forward the port it uses in your router. Example 8096 for regular http requests. I would highly recommend getting at least a reverse proxy with an SSL cert.

permalink
report
reply
4 points
*

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

Fewer Letters More Letters
CGNAT Carrier-Grade NAT
DNS Domain Name Service/System
NAT Network Address Translation
SSL Secure Sockets Layer, for transparent encryption
TLS Transport Layer Security, supersedes SSL
VPN Virtual Private Network

5 acronyms in this thread; the most compressed thread commented on today has 8 acronyms.

[Thread #204 for this sub, first seen 9th Oct 2023, 21:05] [FAQ] [Full list] [Contact] [Source code]

permalink
report
reply
2 points

Depends on your definition of safe.

If you do a public port forward and set up basic security and proper SSL its safe from the majority of people.

permalink
report
reply

Selfhosted

!selfhosted@lemmy.world

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

Community stats

  • 4.6K

    Monthly active users

  • 3.1K

    Posts

  • 69K

    Comments