Hi folks. So, I know due to a myriad of reasons I should not allow Jellyfin access to the open internet. However, in trying to switch family over from Plex, I’ll need something that “just works”.

How are people solving this problem? I’ve thought about a few solutions, like whitelisting ips (which can change of course), or setting up VPN or tail scale (but then that is more work than they will be willing to do on their side). I can even add some level of auth into my reverse proxy, but that would break Jellyfin clients.

Wondering what others have thought about for this problem

    • Synestine@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      5
      ·
      18 hours ago

      The reverse proxy is the part that’s exposed. CrowdSec watches the logs for intrusion attempts like fail2ban would.

    • airgapped@piefed.social
      link
      fedilink
      English
      arrow-up
      3
      ·
      18 hours ago

      A reverse proxy saves you from having to expose your services directly and acts as a go-between.

      Internet <--> Reverse Proxy <--> Service

        • Codilingus@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          15 hours ago

          Think of it as more modular.

          I personally used Traefik, but only because I’m a masochist and it would be useful to know in IT workplace.

          Traefik + CrowdSec + CowdSec Traefik Bouncer.

          Traefik handles the traffic, and said traffic has to get a green light from CrowdSec + Bouncer before it can go anywhere.

          The concept of CrowdSec is honestly super awesome.

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          13 hours ago

          It protects against vulnerabilities in layer 3 of the OSI model. It is the thing that gets hit from the outside while the back end is hidden away. This makes some attacks much harder.