just $10/
monthyear
Waryle
- 0 Posts
- 15 Comments
Waryle@jlai.luto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
13·7 months agoYou can look up for:
- Setting up max authentication attemps per connection -> slows up a lot brute force attacks. If your password is strong enough, that’s already a big step to secure your server.
- Generate SSH Keys and disable password authentication -> do this only if you’re connecting through the same devices, because you won’t be able to connect from any device that has not being set up. Personally I don’t use this because I want to be able to access my server even if I’m not home and without my laptop
- Set up Crowdsec -> it’s a local service which scans logs and will block access to any suspicious IPs. It also relies on a crowdsourced list of IPs that are identified as threat and will preventively block them
Waryle@jlai.luto
Technology@beehaw.org•I don't know who needs to hear this, but DO NOT EVER expose Jellyfin to the internet
1·7 months agoOh you insufferable rawgabbit. Even in the face of definitive proof, the only thing you care about is throwing a 4 paragraphs tantrum trying to twist every single word just to not say “OK, maybe I was wrong on that thing”. I’m out.
Waryle@jlai.luto
Technology@beehaw.org•I don't know who needs to hear this, but DO NOT EVER expose Jellyfin to the internet
1·7 months agohttps://www.legifrance.gouv.fr/juri/id/JURITEXT000030635061/
Case law from the Cour de Cassation, where the defendant was convicted, by Articles 323-1 and 323-5, of having extracted data freely following a proven failure of the protection system.
The complainant just had to show that the data SHOULD have been inaccessible, by expressing this “with a special warning” :
"3°) alors qu’en l’absence de dispositif de protection des données, la maître du système doit manifester clairement et expressément manifester, par une mise en garde spéciale, sa volonté d’interdire ou de restreindre l’accès aux données ; qu’en déduisant de la seule présence d’un contrôle d’accès sur la page d’accueil du site de l’ANSES que M. X… s’était irrégulièrement maintenu dans le système contre le gré de son propriétaire, la cour d’appel a violé l’article 323-1 du code pénal ;
Translated :
“3°) whereas in the absence of a data protection system, the master of the system must clearly and expressly manifest, by means of a special warning, his intention to prohibit or restrict access to the data; that in deducing from the mere presence of an access control on the home page of the ANSES site that Mr. X… had irregularly maintained himself in the system against the owner’s will, the Court of Appeal violated article 323-1 of the French Penal Code ;
In my case, the first thing you see when you arrive at my Jellyfin instance is a login form blocking your entry, and you have to go through a backdoor to access my data, so there’s no ambiguity on this point.
You’re wrong, period. Stop trying to debate laws interpretation of a country you don’t even speak the language of.
Waryle@jlai.luto
Technology@beehaw.org•I don't know who needs to hear this, but DO NOT EVER expose Jellyfin to the internet
1·7 months agoI live in France, and these are the relevant laws :
- Article 323-1 : you access my server without my authorization -> 3 years of prison, 100k€ fine
- Article 323-3 : you touch my data in any way -> 5 years of prison, 150k fine
Waryle@jlai.luto
Technology@beehaw.org•I don't know who needs to hear this, but DO NOT EVER expose Jellyfin to the internet
1·7 months agoUsing a flaw in a software to retrieve data you should not have access to is illegal where I live, the same way as you’re not suddenly allowed to enter my house and fetch my drawers just because I left a window open. I won’t debate this point further.
Waryle@jlai.luto
Technology@beehaw.org•I don't know who needs to hear this, but DO NOT EVER expose Jellyfin to the internet
1·7 months agoKeeping that copy on a web accessible platform that is accessible by anyone on the internet(unauthenticated) isn’t covered by your rights at a bare minimum.
It’s as accessible as my DVD collection in my living room: anyone can get into my home without a key by illegally breaking a window.
Using a flaw in my Jellyfin to access my content is illegal and can’t be used against me to sue me, period. The idea of rights holders who would hack me to sue me is just plain ridiculous.
Depending on the content “timing” if they trigger on something that doesn’t have a physical/consumer release yet… or all sorts of other “impossible” conditions. This is obviously reliant on what content you actually have on your server.
And again, the only proof they would have could not be used in courts.
For real, you’re just fear-mongering at this point.
I was sincerely hoping someone would bring some real concerns, like how one of these security breaches listed in the OP could allow privilege escalation or something, but if all you got is “Universal might hire hackers to break through your server and sue you”, you’re comforting me in my idea that I don’t have much to fear
Waryle@jlai.luto
Technology@beehaw.org•I don't know who needs to hear this, but DO NOT EVER expose Jellyfin to the internet
1·7 months agoWhere I live, I have the legal right to have a copy of a film of which I have a legal version, they can watch my media library as much as they want, it’s not enough to prove that it’s illegal.
And hacking my server is illegal, they can’t go to court by presenting evidence obtained through hacking, they would risk much more than me.
Waryle@jlai.luto
Technology@beehaw.org•I don't know who needs to hear this, but DO NOT EVER expose Jellyfin to the internet
1·7 months agoMy Jellyfin server is behind Cloudflare with IP outside of my country banned.
I got Crowdsec set up on Cloudflare, Traefik and Debian directly.
I got Jellyfin up in a docker container behind Traefik, my router opens only 80 and 443 ports and direct them to Traefik.
Jellyfin has only access to my media files which are just downloaded movies and shows hardlinked by Sonarr/Radarr from my download folder.
It is publicly exposed to be able to watch it from anywhere, and share it to family and friends.
So what? They might access the movies, even delete them, I don’t care, I’ll just hardlink them back or re-download them. What harm can they do that would justify locking everything down?
Waryle@jlai.luto
Selfhosted@lemmy.world•Help with Home Server Architecture and Hardware Selection?English
6·9 months agoZFS Raid Expansion has been released days ago in OpenZFS 2.3.0 : https://www.cyberciti.biz/linux-news/zfs-raidz-expansion-finally-here-in-version-2-3-0/
It might help you with deciding how much storage you want
The most popular sandwich in France is the Jambon-Beurre, which is just butter and ham
Waryle@jlai.luto
Linux@lemmy.ml•Extensions in GNOME 45 - New import system is not backwards compatible
2·2 years agoGnome Shell has been first released in 2011.
Waryle@jlai.luto
Firefox@lemmy.ml•Why is firefox losing market share? Why don't more people use Firefox?
11·2 years agoI’m curious, what is missing from Firefox compared to Vivaldi according to you?
It’s so out of context it’s almost untrue.
Bitwarden can’t find or change your password, and their admins absolutely can’t see them either.
You’re talking about the “admin password reset” feature offered to organizations (and which doesn’t concern lambdas users at all), which must be explicitly activated and which allows admins not to see our password, but to trigger a password reset with notification to the user.
Once the password has been reset, all you have to do is change it, and nobody else has access to it.


No, Jellyseerr is a selfhosted webapp where you request movies and shows, which will be searched and downloaded by your configured Sonarr/Radarr, which will populate your Jellyfin.
You can see it as a user-friendly Sonarr+Radarr front-end, that you can sync with Jellyfin users, so they can go and request content directly without you manually adding things in Radarr/Sonarr.