For example, I prefer to use a VPN instead of port forwarding. And I use SSH for anything I used to use an FTP for.

  • @thisisawayoflife@lemmy.world
    link
    fedilink
    1010 months ago

    I share services with the public, so… strong passwords on everything, MFA, host scanning, SSH MAC/KEX/ciphers tweaked to ultra modern set and exposed only with keys with f2b activating on first failure, constant backups and automatic updates and scheduled reboots. Has worked great for a decade+.

  • poVoq
    link
    fedilink
    English
    210 months ago

    TOTP MFA highly recommended on SSH and webconsole. The so called “google-authenticator” makes it easy and despite the name does not use any external Google services.

    • @ReversalHatchery@beehaw.org
      link
      fedilink
      510 months ago

      Yes, but if using an android phone, the Aegis app may be a better choice. Guaranteed to not have tracking, and secrets are encrypted

      • poVoq
        link
        fedilink
        1
        edit-2
        10 months ago

        That is indeed what I am using as well. The “google-authenticator” is just an (badly named) open source software that runs on the server and is available in most Linux distro repositories.

    • @splendoruranium
      link
      English
      3
      edit-2
      10 months ago

      IP whitelisting

      How do you do that? I understand how blocklisting would work but how does whitelisting work in practice? How can you know in advance from which IPs you will connect to your home network in the future? That just seems like a recipe for getting stranded in some hotel without a way into your network.

      • @const_void@lemmy.ml
        link
        fedilink
        110 months ago

        Blacklist everything then whitelist the IPs you know you’ll be connecting from (work, cell phone, etc). I don’t connect from random places usually. If I need to then I use cellular. You might be better off with a VPN if you need to connect from random places.

        • @splendoruranium
          link
          English
          110 months ago

          Blacklist everything then whitelist the IPs you know you’ll be connecting from (work, cell phone, etc). I don’t connect from random places usually. If I need to then I use cellular. You might be better off with a VPN if you need to connect from random places.

          I see, thanks!
          Is there any concern with whitelisting a cellular CGNAT’s public IP? Presumably that would potentially whitelist thousands or tens of thousands of other mobile devices at once, wouldn’t it?

          • @const_void@lemmy.ml
            link
            fedilink
            010 months ago

            Is there any concern with whitelisting a cellular CGNAT’s public IP?

            It depends on how much you decide to whitelist. In my case I whitelist my cellular carrier’s IP block. Which does expose those services a little more broadly but I’m willing to risk it.