• Login
  • Register
  • Login Register
    Login
    Username/Email:
    Password:
    Or login with a social network below
  • Forum
  • Website
  • GitHub
  • Status
  • Translation
  • Features
  • Team
  • Rules
  • Help
  • Feeds
User Links
  • Login
  • Register
  • Login Register
    Login
    Username/Email:
    Password:
    Or login with a social network below

    Useful Links Forum Website GitHub Status Translation Features Team Rules Help Feeds
    Jellyfin Forum Support General Questions is it enough to use caddy and your own domain name for more security ?

     
    • 0 Vote(s) - 0 Average

    is it enough to use caddy and your own domain name for more security ?

    Drake97
    Offline

    Member

    Posts: 75
    Threads: 22
    Joined: 2023 Oct
    Reputation: 0
    Country:Chile
    #1
    2025-04-18, 05:33 AM
    I have a doubt, I currently have jellyfin running on a pc with ubuntu desktop, I go out to the internet with caddy proxing to my jellyfin service through port 8096 and in my router I have open the tcp ports 80 and 443 for HTTP and HTTPS respectively.
    When I enter the url of my domain, it redirects directly to jellyfin, all ok with that, but my question is the following:
    Is that enough ? can someone who has that URL and has some computer knowledge, get into my physical server via SSH for example ? I hope you can understand me and not to be paranoid or anything haha, I'm just curious.

    Thanks and greetings.
    Jellyfin 10.10.7
    Ubuntu desktop 24.04.2 LTS
    Intel i5-7500
    16GB DDR4 2400Mhz
    OS-DRIVE: WDC SN720 256GB
    Storage (JF Library)
    1: x4 4TB Seagate IronWolf
    2: 6TB Seagate Ironwolf Pro
    3: 8TB HGST Dell Enterprise
    4: 2TB Seagate Barracuda
    5: 2TB WD RED
    TheDreadPirate
    Offline

    Community Moderator

    Posts: 15,374
    Threads: 10
    Joined: 2023 Jun
    Reputation: 460
    Country:United States
    #2
    2025-04-18, 03:01 PM (This post was last modified: 2025-04-18, 03:01 PM by TheDreadPirate.)
    Since SSH does not listen on port 80 or 443, a hypothetical attacker would not be able to gain ssh access to your PC.

    If you expose port 22 for remote shell access, that is a different story. But you can take extra steps to protect yourself.

    The primary way I protect ssh is by using PKI ONLY, no password logins via ssh. That significantly increases the difficulty of gaining access via brute force.

    Even with password logins, as long as you use a strong password and practive good password hygiene you are fine. Specifically limiting, or straight up not, reusing of passwords and definitely avoiding using passwords that have been leaked via data breaches on other sites.

    Another user asked a similar question and my message boils down to "Take security seriously, but also don't worry too much." As long as you update regularly, make efforts to do basic hardening of exposed applications, and practice good password hygiene, the likelihood of being hacked are very very very remote.
    Jellyfin 10.10.7 (Docker)
    Ubuntu 24.04.2 LTS w/HWE
    Intel i3 12100
    Intel Arc A380
    OS drive - SK Hynix P41 1TB
    Storage
        4x WD Red Pro 6TB CMR in RAIDZ1
    [Image: GitHub%20Sponsors-grey?logo=github]
    Drake97
    Offline

    Member

    Posts: 75
    Threads: 22
    Joined: 2023 Oct
    Reputation: 0
    Country:Chile
    #3
    2025-04-18, 09:37 PM
    (2025-04-18, 03:01 PM)TheDreadPirate Wrote: Since SSH does not listen on port 80 or 443, a hypothetical attacker would not be able to gain ssh access to your PC.

    If you expose port 22 for remote shell access, that is a different story.  But you can take extra steps to protect yourself.

    The primary way I protect ssh is by using PKI ONLY, no password logins via ssh.  That significantly increases the difficulty of gaining access via brute force.

    Even with password logins, as long as you use a strong password and practive good password hygiene you are fine.  Specifically limiting, or straight up not, reusing of passwords and definitely avoiding using passwords that have been leaked via data breaches on other sites.

    Another user asked a similar question and my message boils down to "Take security seriously, but also don't worry too much."  As long as you update regularly, make efforts to do basic hardening of exposed applications, and practice good password hygiene, the likelihood of being hacked are very very very remote.

    i get it, thanks for the response
    jimdogx
    Offline

    Team Member

    Posts: 15
    Threads: 0
    Joined: 2023 Jun
    Reputation: 3
    #4
    2025-04-19, 11:53 AM
    Quote:If you expose port 22 for remote shell access, that is a different story. But you can take extra steps to protect yourself.

    The primary way I protect ssh is by using PKI ONLY, no password logins via ssh. That significantly increases the difficulty of gaining access via brute force.


    I'll add to this.  Although very simple, if and when I do want to SSH remotely, I run SSH on a non-standard port.  Back in the day, when I ran SSH on port 22, the amount of remote failed login attempts from bots in my log files was insane.  Picking a random port helped a lot.
    TheDreadPirate
    Offline

    Community Moderator

    Posts: 15,374
    Threads: 10
    Joined: 2023 Jun
    Reputation: 460
    Country:United States
    #5
    2025-04-19, 07:23 PM
    (2025-04-19, 11:53 AM)jimdogx Wrote:
    Quote:If you expose port 22 for remote shell access, that is a different story. But you can take extra steps to protect yourself.

    The primary way I protect ssh is by using PKI ONLY, no password logins via ssh. That significantly increases the difficulty of gaining access via brute force.


    I'll add to this.  Although very simple, if and when I do want to SSH remotely, I run SSH on a non-standard port.  Back in the day, when I ran SSH on port 22, the amount of remote failed login attempts from bots in my log files was insane.  Picking a random port helped a lot.

    This.  Very much this.  I also run all of my services on non-standard ports.  Except for the Matrix federation port.  Back when I was young and dumb, I had MS RDP on its standard port exposed publicly.  Thousands and thousands and thousands of failed login attempts.  Lesson learned.

    Just don't become lazy with your other security best practices because you think "security by obscurity" is enough.
    Jellyfin 10.10.7 (Docker)
    Ubuntu 24.04.2 LTS w/HWE
    Intel i3 12100
    Intel Arc A380
    OS drive - SK Hynix P41 1TB
    Storage
        4x WD Red Pro 6TB CMR in RAIDZ1
    [Image: GitHub%20Sponsors-grey?logo=github]
    Host-in-the-Shell
    Offline

    Member

    Posts: 166
    Threads: 10
    Joined: 2023 Jun
    Reputation: 14
    #6
    2025-04-19, 07:46 PM (This post was last modified: 2025-04-19, 07:48 PM by Host-in-the-Shell. Edited 1 time in total.)
    A good rule of thumb is the ArchWiki Security page, which you should check from time to time. Not saying you need to implement all it lists there, but it can give you good ideas of what to do and improve. Although some things are Arch specific, most apply universally.
    Server specs => OS: Debian 12 | GPU: Arc A380 | CPU: Ryzen 5 5600X | 64GB RAM | 56TB
    « Next Oldest | Next Newest »

    Users browsing this thread: 1 Guest(s)


    • View a Printable Version
    • Subscribe to this thread
    Forum Jump:

    Home · Team · Help · Contact
    © Designed by D&D - Powered by MyBB
    L


    Jellyfin

    The Free Software Media System

    Linear Mode
    Threaded Mode