104

Some services run really good behind a reverse proxy on 443, but some others can really become an hassle.. And sometimes just opening other ports would be easier than to try configuring everything to work through 443.

An example that comes to my mind is SSH, yeah you can use SSLH to forward requests coming from 443 to 22, but it's so much easier to just leave 22 open..

Now, for SSH, if you have certificate authentication or a strong password, I think you can feel quite safe, but what about other random ports? What risks I'm exposing my server to if I open some of them when needed for a service? Is the effort of trying to pass everything through 443/80 worth it?

you are viewing a single comment's thread
view the rest of the comments
[-] ryokimball@infosec.pub 32 points 1 day ago* (last edited 1 day ago)

If you are trying to access several different services through the internet to your home network, you are better off setting up a home VPN than trying to manage multiple public facing services. The more you publish directly to the public, the more difficult it is to keep up with everything; It is likely needlessly expanding your threat exposure. Plus you never know when a new exploit gets published against any of the services you have available.

[-] 0x0@lemmy.zip 11 points 1 day ago

setting up a home VPN then trying to manage multiple public facing services.

You mean than? Not being anal it but does change the meaning.

[-] ryokimball@infosec.pub 8 points 1 day ago

You're correct, imma let voice-to-text take the blame there.

[-] Dagnet@lemmy.world 5 points 1 day ago

Self hosted newbie here. What if those services are docker containers? Wouldn't the threat be isolated from the rest of the machine?

[-] Technus@lemmy.zip 19 points 1 day ago

No. Docker containers aren't a full sandbox. There's a number of exploits that can break out of a container and gain root access to the host.

[-] kurikai@lemmy.world 9 points 1 day ago

Rootless podman helps

[-] possiblylinux127@lemmy.zip 8 points 1 day ago

Yes and no

Breaking out of docker in a real life context would require either a massive misconfiguration or a major security vulnerability. Chances are you aren't going to have much in the way of lateral movement but it is always good to have defense in depth.

[-] Technus@lemmy.zip 4 points 1 day ago

If someone's self-hosting, I'd be willing to bet they don't have the same hardened config or isolation that a cloud provider would.

[-] possiblylinux127@lemmy.zip 2 points 1 day ago

Docker restricts the permissions of software running in the container. It is hardened by default and you need to manually grant permissions in some rare cases.

[-] Onomatopoeia@lemmy.cafe 3 points 1 day ago

Others have clarified, but I'd like to add that security isn't one thing - it's done in layers so each layer protects from potential failures in another layer.

This is called The Swiss Cheese Model. of risk mitigation.

If you take a bunch of random slices of Swiss cheese and stack them up, how likely is there to be a single hole that goes though every layer?

Using more layers reduces the risk of "hole alignment".

Here's an example model:

So a router that has no open ports, then a mesh VPN (wireguard/Tailscale) to access different services.

That VPN should have rules that only specific ports may be connected to specific hosts.

Hosts are on an isolated network (could be VLANS), with only specific ports permitted into the VLAN via the VPN (service dependent).

Each service and host should use unique names for admin/root, with complex passwords, and preferably 2FA (or in the case of SSH, certs).

Admin/root access should be limited to local devices, and if you want to get really restrictive, specific devices.

In the Enterprise it's not unusual to have an admin password management system that you have to request an admin password for a specific system, for a specific period of time (which is delivered via a secure mechanism, sometimes in person). This is logged, and when the requested time frame expires the password is changed.

Everyone's risk model and Swiss cheese layering will fall somewhere on this scale.

[-] non_burglar@lemmy.world 7 points 1 day ago

Is your container isolated from your internal network?

If I were to compromise your container, I'd immediately pivot to other systems on your private network.

Why do the difficult thing of breaking out of a container when there's a good chance I can use the credentials I got breaking in to your container to access other systems on your network?

[-] oddlyqueer@lemmy.ml 5 points 1 day ago

it's an extra hurdle, but it's far from a guaranteed barrier. There's a whole class of exploits called container escapes (or hypervisor escapes if you're dealing with old-school VMs) that specifically focus on escalating an attack from a compromised container into whatever machine is hosting the container.

this post was submitted on 03 Oct 2025
104 points (100.0% liked)

Selfhosted

51974 readers
1050 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS