versionc

joined 1 week ago
[–] versionc@lemmy.world 1 points 21 hours ago

That's a great watch, highly recommended.

[–] versionc@lemmy.world 4 points 21 hours ago (2 children)
[–] versionc@lemmy.world 9 points 23 hours ago (4 children)

as far as I know, there is no way to put a valid certificate like let's encrypt for a service that is not accessible from the net

There definitely is. All of my local services run on a wildcard cert that I got from a DNS challenge with Let's Encrypt. As long as the reverse proxy can access whatever source is issuing the certificate, and as long as the client browser can access public certificate ledgers and has DNS info about your services, things will work just fine locally.

I recommend Netbird to give access to services to your family members, for access control and for the DNS server it provides. It also gives you the bonus of accessing your services remotely.

Feel free to ask if you have any questions.

[–] versionc@lemmy.world 3 points 23 hours ago (5 children)

Good riddance.

Has anyone used Komga as an alternative? It's primarily for manga and comics but it seems to support books too (epub and PDF). It also seems to be able to sync books with Kobo devices.

[–] versionc@lemmy.world 16 points 23 hours ago (2 children)

Most games work on Linux. The ones that don't are online games with kernel level anti-cheats, which aren't relevant if we're discussing piracy anyway.

But yeah, a dedicated gaming machine with Windows is fine if that's the way you want to go. I was just arguing against the claim that running pirated games on Linux isn't seamless, which is wrong.

[–] versionc@lemmy.world 14 points 1 day ago (6 children)

Huh? Linux is the gold standard for running pirated games, mainly because of flatpaks and its sandboxing capabilities. The games won't have access to your filesystem and you can disable network access. Installing the games is as easy on Heroic as it is on Windows.

[–] versionc@lemmy.world 2 points 1 day ago* (last edited 1 day ago)

Yeah, pass has been discussed a bit in the thread already, but there are a few security issues that keep me from using it. Speaking of security, I had no idea the Android app was archived in 2024. That's quite a long time without updates. Are you using a fork?

Thank you for sharing your workflow either way! Using a git based solution would be amazing.

[–] versionc@lemmy.world 9 points 1 day ago* (last edited 1 day ago) (1 children)

I would get a router that supports an open source firmware or operating system like OpenWRT. Which one depends entirely on your use case. Getting a router from your ISP is fine if you're allowed to and capable of flashing it, and if you trust them (I'm lucky that I have an ISP with a track record of fighting for their users' privacy and integrity).

[–] versionc@lemmy.world 5 points 1 day ago (1 children)

Yeah, that's a good point. There are still a few cons though:

  1. If the server goes down (or your internet connection goes down), you can't add entries to your database. Local changes aren't allowed.
  2. Bitwarden doesn't support supplementing your passphrase with a key file.
  3. The Bitwarden clients aren't enitrely FOSS as far as I understand, the SDK used has a non-free license.

There are pros and cons in both alternatives, and there is unfortunately not a perfect solution. I like the idea and philosophy behind the KeePass format, so the increase in syncing complexity is worth it (for now at least).

[–] versionc@lemmy.world 9 points 2 days ago (4 children)

I'm using NixOS and I have had no problems gaming. Getting the kernel from CachyOS is also easy enough, if you want that.

[–] versionc@lemmy.world 2 points 2 days ago (1 children)

I managed to get it up and running now, thank you! It wasn't intuitive at all, compared to using nextcloud-client on the desktop. I'll try this for a while and see if it works for me.

 

What do you use for syncing your password manager between your Android phone and your PC? Apparently Nextcloud doesn't support two-way syncing on Android for some reason, and Syncthing-Fork is still untrustworthy since the disastrous handover. The AI generated profile picture of researchxxl doesn't exactly inspire confidence either, neither does his GitHub bio:

Hi! My name is Jonas and I like to use my coding skills from games and modding to continue work on the Syncthing for Android wrapper.

Everything about this person screams vibe coder.

Bitwarden is an alternative, but I don't like how non-standard it is. It's cumbersome to manage and backup, meanwhile the KeePass format is just a file that I can backup wherever and however I want and there are many frontends to choose from.

Have you solved this?

 

Hello!

I've spent a lot of time struggling with Hetzner's KVM console, there are a lot of problems causing severe issues with setting up passwords and passphrases. I just thought I'd create this "guide" to get things rolling, for everyone who faces the same issues I've faced.

Step 1 - Firewall

Set up a firewall and only open port 22 with your IP (you can look it up using ip.me).

Step 2 - Installation

Perform the installation procedure as normal, setting very simple passwords and passphrases for the user accounts and the disk encryption. Set them to something like 123. These will be changed later!

I'm using Debian 13, the steps may or may not be the same for your choice of distribution.

Step 3 - SSH access

Unmount the ISO and reboot. Enter the console again, log in as root with your simple password. Now, if you have the same problem as me, keys like /, CTRL etc. won't work, so I used tab completion and vi to to modify the config file.

# cd ../etc/ssh/
# vi sshd<TAB>

Inside vi, press o to create a new line and enter insert mode. Add:

PermitRootLogin yes
PasswordAuthentication yes

Press ESC and then <SHIFT>-yy (so holding shift and pressing y twice). This will save the file and exit vi. Restart the SSH services:

# systemctl restart ssh sshd

Step 4 - Dropbear

ssh into your VPS. Now you have full keyboard access like usual. Install dropbear-initramfs, which is an SSH server that's placed in the initial RAM filesystem so that you can ssh into your VPS during start up so you can easily enter your encryption passphrase.

Generate a new key pair and add the public key to /etc/dropbear/initramfs/authorized_keys

Run update-initramfs -u and reboot. You should now be able to ssh into your VPS using the key you just generated. The following command lets you unlock the encrypted disk:

cryptroot-unlock

This will probably disconnect you from the tunnel, simply re-establish the SSH tunnel again.

Step 5 - Changing passwords and passphrases

To change the encryption passphrase:

# cryptsetup luksAddKey /dev/sdXY
# cryptsetup luksRemoveKey

Lock the root user and change the password of your user (don't forget to add the user to the sudo group!):

# passwd -l root
# passwd user

Done!

At this point you might want to use some other means to access the server, such as Netbird or Tailscale or Wireguard. Regardless of how you decide to access the server, you should revert the changes to sshd_config.

P.S.

I have no idea if this is a secure or good way to do this. Use at your own risk!

 

Hello!

I've been playing around with self-hosting for a while now and I've started moving over to a VPS. At home I have a PC that's on more or less 24/7 with an *arr stack, jellyfin and some other services. They can only be accessed through Netbird. The services aren't that important, the data doesn't really need to be backed up since it's not very important. On the VPS, however, I would like to host some more critical services, such as:

  • Vaultwarden
  • Immich
  • Gitea
  • Overleaf

I want them available 24/7, even if I decide to distrohop and wipe my PC at home. The problem is how to structure all this. My current idea is to run Gitea and Overleaf out in the open behind some reverse proxy without authentication (Nginx or Nginx Proxy Manager). I'd like Vaultwarden and Immich to be on the same VPS, but, I don't want those services to be accessible to anyone but me, so I'd need some form of ACL or authentication system. I'm thinking of using Netbird for this, since I already use it on all of my devices.

So I would set up DNS records from within Netbird that would point immich.domain.tld and vaultwarden.domain.tld to the internal Netbird IP of the VPS. In the reverse proxy, I'd set up access control such that it only redirects the Netbird IP range to those services. On Cloudflare, I'd point git.domain.tld to the external IP of the VPS with proxy enabled.

Everything would receive HTTPS certificates, and I'd block incoming traffic on every port except for 80 and 443.

Is this a good setup? Any tips or recommendations? Any pitfalls?

Thanks!

view more: next ›