I have a Jellyfin instance on my local server which I forward to the public web via a cloudflare tunnel. I’m not sure how secure it is, and I keep getting random requests from all over the world. It’s my first experience maintaining something on a public domain so I may be worrying about something obvious, but some advice would still be appreciated.

My SSL/TLS encryption mode appears to be “Full”.

89 points

Any time I’ve ever had a server of any kind connected to the net it’s gotten endless ‘doorknob turning’ from bots scanning for stuff. At the very least, bots trying ssh passwords on common accounts.

I don’t have any specific jellyfin advice, but random attempts from all over is pretty usual on the net these days.

permalink
report
reply
-42 points
Removed by mod
permalink
report
parent
reply
30 points

“wHAt aRe yOu 12”

Be less of a cock. Everyone was 12 once.

permalink
report
parent
reply
7 points

Not me, I went from 11 to 30 :(

permalink
report
parent
reply
5 points

Dude are you thinking for a fraction of second before writing your comment or just typing some random insults for the sake of insulting random people?

Why would he say these days if he were 12? The situation woul’ve been the same for his whole life.

permalink
report
parent
reply
1 point

Mean but admining a public endpoint without this even crossing your mind is a good way to out how green you are

permalink
report
parent
reply
66 points
*

That will always happen with something exposed to internet. Attackers scan every IP and domain they can looking for vulnerabilities to exploit. There’s software you can put in place to block requests that look like exploit attempts. Cloudfare WAF is one example. But those are mitigations only and not perfectly effective. Beyond that there’s not much you can do. Always make sure anything you expose to the internet is configured securely and kept up to date. If it makes you uncomfortable, reconsider exposing it like that.

permalink
report
reply
13 points
*

bots will start hitting a brand new subdomain on my web server literally seconds after creating it. looking for exploitable scripts like wordpress, usually.

permalink
report
parent
reply
5 points

You can avoid these scans by only using wildcards on your DNS entries and SSL certificates.

Both of these are commonly used by bots to find new domains.

permalink
report
parent
reply
3 points

Wildcard SSL subjects make sense as the certificate is public. But how does wildcard DNS help? They aren’t public other than the requests coming from the client which don’t use wildcard anyway.

permalink
report
parent
reply
8 points

Thanks, that helped!

permalink
report
parent
reply
6 points

Fail2ban works if they don’t have infinite IP addresses

permalink
report
parent
reply
26 points

It sounds like you made your Jellyfin server public-facing, which is probably not what you want, even though it is supposed to be secured.

I recommend that you setup access through an exclusive and private connection of some kind. E.g: VPN, Tailscale, ZeroTier.

permalink
report
reply
16 points

Thanks! No, that’s exactly what I wanted to do :) I was just wondering if it’s okay to have this many random requests, which seems to be fine.

permalink
report
parent
reply
14 points

Understood. Any public-facing server will be bombarded by bots. You need to deploy measures to avoid being hacked:

  1. Firewall: lockdown everything, allow only the strict necessary
  2. Remote login/SSH: update default username and pasword, only allow remote login using Encryption Key authentification
  3. (Optional) configure fail2ban to slowdown the attacks
  4. Keep your server up-to-date: configure auto-update, unattended-update or similare
  5. Setup and keep regular backups: be ready to nuke your server at anytime, with the confidence you can restart fresh in a short time and low effort

Obviously, there are many other security steps that can be put in place, but firewall and ssh hardening are absolutely mandatory

permalink
report
parent
reply
2 points

Thank you, these are great tips!

permalink
report
parent
reply
23 points

I‘d only access my jellyfin through a VPN like WireGuard. As a plus, you can route your DNS calls to your DNS server in your home network (like AdGuard) and have always most ads blocked in any app even on iOS.

permalink
report
reply
4 points

If I didn’t use wireless android auto I would totally use a VPN at all times but the fact AA refuses to connect with wireless AA with a VPN sucks.

permalink
report
parent
reply
4 points

You can exclude AA from VPN, at least with Wireguard.

permalink
report
parent
reply
1 point

Yeah I am using unifi I might have to switch my client if I can figure out how to connect to my existing wire guard setup that I have on my dream machine.

permalink
report
parent
reply
1 point

😳what?? Why would AA not work with VPN?! What a deal break, lol, I guess I’ll keep my iPhone X in the car for CarPlay after switching to a new (maybe not apple) phone in that case

permalink
report
parent
reply
3 points

Wired works but because wireless AA needs to use WiFi the VPN blocks the communication. It only works with VPN providers that allow split tunnels which the one I use does not. I use unifi one click VPN which is subscription free.

permalink
report
parent
reply
14 points

It’s just bots, they scan IP address and open ports looking for vulnerabilities. I remember my first experience with this putting my first game server online for a game I was making, thinking to my self “who the fuck are these people trying to connect to my game? How did they even have it”. It’s nothing to worry about unless you have lack of or poor authentication.

permalink
report
reply

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

!piracy@lemmy.dbzer0.com

Create post
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don’t request invites, trade, sell, or self-promote

3. Don’t request or link to specific pirated titles, including DMs

4. Don’t submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-fi Liberapay

Community stats

  • 4.7K

    Monthly active users

  • 3.3K

    Posts

  • 86K

    Comments