• 2 Posts
  • 62 Comments
Joined 1 year ago
cake
Cake day: June 26th, 2023

help-circle





  • If you dont fear using a little bit of terminal, caddy imo is the better choice. It makes SSL even more brainless (since its 100% automatic), is very easy to configure (especially for reverse proxying) yet very powerful if you need it, has a wonderful documentation and an extensive extension library, doesnt require a mysql database that eats 200 MB RAM and does not have unnecessary limitations due to UI abstractions. There are many more advantages to caddy over NPM. I have not looked back since I switched.

    An example caddyfile for reverse proxying to a docker container from a hostname, with automatic SSL certificates, automatic websockets and all the other typical bells and whistles:

    https://yourdomain.com {
      reverse_proxy radarr:7878
    }
    


  • Theres a Dockerfile that you can use for building. It barely changes the flow of how you setup the container. Bigger issue imo is that it literally is the code they use for their premium service, meaning that all the payment stuff is in there. And I don’t know if the apps even have support for connecting to a custom instance.

    Edit: their docs state that the apps all support custom instances, making this more intruiging




  • You make a good point. But I still find that directly exposing a port on my home network feels more dangerous than doing so on a remote server. I want to prevent attackers sidestepping the proxy and directly accessing the server itself, which feels more likely to allow circumventing the isolations provided by docker in case of a breach.

    Judging from a couple articles I read online, if i wanted to publicly expose a port on my home network, I should also isolate the public server from the rest of the local LAN with a VLAN. For which I’d need to first replace my router, and learn a whole lot more about networking. Doing it this way, which is basically a homemade cloudflare tunnel, lets me rest easier at night.



  • Your first paragraph hits the nail on the head. From what I’ve read, bots all over the net will find any openly exposed ports in no time and start attacking it blindly, putting strain on your router and a general risk into your home network.

    Regarding bandwith: 100% of the traffic via the domain name (not local network) runs through the proxy server. But these datacenters have 1 to 10 gigabit uplinks, so the slowest link in the chain is usually your home internet connection. Which, in my case, is 500mbit down and 50mbit up. And that’s easily saturated on both directions by the tunnel and VPS. plus, streaming a 4K BluRay remux usually only requires between 35 and 40 mbit of upload speed, so speed is rarely a worry.


  • Hey! I’m also running my homelab on unraid! :D

    The reverse proxy basically allows you to open only one port on your machine for generic web traffic, instead of opening (and exposing) a port for each app individually. You then address each app by a certain hostname / Domain path, so either something like movies.myhomelab.com or myhomelab.com/movies.

    The issue is that you’ll have to point your domain directly at your home IP. Which then means that whenever you share a link to an app on your homelab, you also indirectly leak your home location (to the degree that IP location allows). Which I simply do not feel comfortable with. The easy solution is running the traffic through Cloudflare (this can be set up in 15 minutes), but they impose traffic restrictions on free plans, so it’s out of the question for media or cloud apps.

    That’s what my proxy VPS is for. Basically cloudflare tunnels rebuilt. An encrypted, direct tunnel between my homelab and a remote server in a datacenter, meaning I expose no port at home, and visitors connect to that datacenter IP instead of my home one. There is also no one in between my two servers, so I don’t give up any privacy. Comes with near zero bandwith loss in both directions too! And it requires near zero computational power, so it’s all running on a machine costing me 3,50 a month.




  • I find there is less management overhead regarding inboxes with SL, compared to creating, managing and logging into multiple receiving addresses under a real mail server.

    Sure, you can set one mail account on your domain and define it as catch all, but then won’t be able to send from these names.

    Or you can create accounts you want, but then cannot quickly create new inboxes without opening your control dashboard.

    Obviously, if you want to register with a service anonymously, you’d use one of the SL domains, which I do plenty too!

    And at the end of the chain, all messages run into the same singular Google inbox, making it easier for me to manage all messages from all domains.

    I’m sure paid email hosters will have their own advantages, but as I said at the beginning of my original comment, I want to show an alternative solution, not a better solution.



  • Lots of people have said worthwhile things. Don’t selfhost email for example. While going with an email hoster has been recommended a couple times, which is good and easy, I want to offer an alternative: SimpleLogin (or comparable providers). Essentially a “email alias generator”, it forwards received emails to one or more mail addresses (Google, Hotmail, what have you). It also allows you to connect a domain and then create new inboxes on the fly by simply sending (or telling a service to send) an email to that non-existing inbox. Which is incredibly handy if you’re faced with a situation that demands an email, where you don’t want to give out an actual email.

    So say you have the domain doe.com, and you’re in a physical shop at the register, faced with the question if you want to get 10% off by registering for their members club. You can simply give the cashier the email “coupon_walmart@doe.com” (which does not yet exist), the email will be sent, received bei SL, the inbox created and the coupon code forwarded to your Gmail account. Afterwards, you can disable or delete the inbox and never have to worry about newsletters or data breaches. Nifty!

    Every one of these boxes also has its own “sent from” address visible in your actual mail account. Which means that you can simply respond to incoming emails, and the recipient will see the mail address they sent a message to. This also means that you can set up filters in your mail account to move messages from certain sender addresses into specific labels, as if they were real separate email accounts.