Background: 15 years of experience in software and apparently spoiled because it was already set up correctly.

Been practicing doing my own servers, published a test site and 24 hours later, root was compromised.

Rolled back to the backup before I made it public and now I have a security checklist.

  • Valmond@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    10 hours ago

    I’m interested, how do you expose your services (on your PC I assume) to the internet through wireguard? Is it theough some VPN?

    • Zanathos@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      9 hours ago

      Wireguard IS a VPN. He has somehow through his challenges of exposing services to the internet, exposed wireguard from his home to the internet for him to connect to. Then he can connect to his internal services from there.

      It’s honestly the best option and how I operate as well. I only have a handful of items exposed and even those flow through a DMZ proxy before hitting their destination servers.

    • ohshit604@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 hours ago

      VPN’s are neat, besides the fact they’re capable of masking your IP & DNS they’re also capable of providing resources to devices outside a network.

      A good example is the server at my work is only accessible on my works network, to access the server remotely without exposing it directly to the internet would be to use a VPN tunnel.