Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)EA
Posts 4
Comments 65
What are the most paranoid network/OS security measures you've implemented in your homelab?
  • I used VMs some time ago but never managed to look deeper into separation of bare metal vs VMs. Hence I can’t assess this reasonably.
    Docker got me interested when it started and after discovering its networking capabilities I never looked back.
    Basically I’m trying to minimize the possibility that by intercepting one dockerized service the attacker is able to start interacting with all devices. And I have lots of devices because of a fully automated house. ;) My paranoia will ensure the constant growth of privacy and security :)

  • What are the most paranoid network/OS security measures you've implemented in your homelab?
  • Guessing it is more a habit from back in time when ssl certification wasn’t common. Panic of MITM attacks, friends sharing their trusted access to other friends, etc. all contributed to my actual status of paranoia.
    Don’t make me reconsider my cybersec approach ;)

  • What are the most paranoid network/OS security measures you've implemented in your homelab?
  • I’m somewhat paranoid therefore running several isolated servers. And it’s still not bulletproof and will never be!

    • only the isolated server, ie. no internet access, can fetch data from the other servers but not vice versa.
    • SSH access key based only
    • Firewall dropping all but non-standard ports on dedicated subnets
    • Fail2ban drops after 2 attempts
    • Password length min 24 characters, 2FA, password rotation every 6 months
    • Guest network for friends, can’t access any internal subnet
    • Reverse proxy (https;443 port only)
    • Any service is accessed by a non-privileged user
    • Isolated docker services/databases and dedicated docker networks
    • every drive + system Luks-encrypted w/ passphrase only
    • Dedicated server for home automation only
    • Dedicated server for docker services and reverse proxy only
    • Isolated data/backup server sharing data to a tv box and audio system without network access via nfs
    • Offsite data/backup server via SSH tunnel hosted by a friend
  • AdGuard/PiHole Blocklists merge duplicates
  • If I'm understanding you correctly, you could make use of a shell script for this. Use WGET to download lists, then combine them into a single large file, and finally create a new file with no duplicates by using “awk '!visited[$0]++'”

    wget URL1 URL2 URL3
    cat *.txt > all.txt (This overwrites all.txt)
    awk '!visited[$0]++' all.txt > no_duplicates.txt

  • Discover the Ultimate List of Privacy Alternatives & Tools!

    lemmy.dbzer0.com Guard Your Privacy Fortress - Discover the Ultimate List of Privacy Alternatives & Tools! - Divisions by zero

    Discover the ultimate list of privacy tools to safeguard your personal data. From secure messaging apps to anonymous browsing solutions, fortify your privacy and gain peace of mind. Take control of your digital presence with these essential tools. Hey, talk to me on Element: https://matrix.to/#/@dus...

    Guard Your Privacy Fortress - Discover the Ultimate List of Privacy Alternatives & Tools! - Divisions by zero

    Repost from https://lemmy.dbzer0.com/post/1978562

    3
    *Permanently Deleted*
  • Make sure the SQL server is not writing/blocking any files: docker-compose stop vaultwarden

    Backup that specific folder to another destination and restart docker-compose up -d

  • Hidden VNC Tool targeting MAC’s

    9to5mac.com Hidden VNC tool gives attackers access to Macs; $100K guarantee

    Cybersecurity firm Guardz has found Russian hackers offering for sale a Hidden VNC tool specifically designed to give attackers full...

    Hidden VNC tool gives attackers access to Macs; $100K guarantee
    0
    Recommended hard drive monitoring (Ubuntu server) options?
  • I think you can’t track data corruption either because you will find out only when it occurred. Same is valid for SMART values as you correctly state. I believe it is a mix of using zfs, ECC and SMART monitoring.
    https://phoenixnap.com/blog/data-corruption

    Thanks for clarifying the intricacies connected to SMART monitoring.

  • Recommended hard drive monitoring (Ubuntu server) options?
  • SMART value monitoring helped me finding faulty drives, not only once. And drives are tested before adding to a production system.
    Certainly system drives are separate from data drives. The latter can be perfectly monitored by SMART values.

  • Intel passed NUC baton to ASUS

    16

    Power struggle between Prigozhin and Putin

    www.cnn.com US has closely monitored power struggle between Prigozhin and Russian government for months | CNN Politics

    American officials determined as early as January there was an internal power struggle underway between the private military group Wagner and the Russian government, and have been gathering and closely monitoring intelligence on the volatile dynamic ever since, according to officials.

    1