

There are a number of ways to install nextcloud, and docker is only one of those.
Yes, NC isn’t ideal in many ways, but it shouldn’t be as painful as you’re describing to run it.
There are a number of ways to install nextcloud, and docker is only one of those.
Yes, NC isn’t ideal in many ways, but it shouldn’t be as painful as you’re describing to run it.
Paperless-ngx is great, but it is particularly bad at handling PDF documents. Roughly half my documents just won’t import.
https://github.com/paperless-ngx/paperless-ngx/issues/3933
https://www.reddit.com/r/selfhosted/comments/yfjxww/paperlessngx_not_all_pdf_files_can_be_imported/
Turnkey images are usually built on popsicle sticks and chewing gum; they use old packages, their configs are often really janky and they do not like being updated.
I’m not kidding you, you’d be better off building nextcloud in a generic debian container.
As for the errors, as others have mentioned these are more or less easily fixed one at a time.
There’s a bunch of posts about the iptables-save function of the built-in iptables module not working in many cases, so I figured it was a safer bet to suggest the playbook include an actual command invocation.
In my personal experience, the module doesnt actually save the persistent rule in about half the cases. I haven’t looked into it much, but it seems happen more on systems where systemd iptables-firewall is present. (Not trying to start a flame war)
Generally, you set up a rule + command playbook, where the command invokes the iptables-save command.
I read the old thread and now this one.
As I understand it, you want to create connection between clients on your lan, but you don’t trust your lan, so it’s like having a raspberry pi server and some client both on the coffee shop network and you want them to communicate securely?
Tailscale is what you want. Easy setup, free, and allows exactly this to happen.
I was looking for this. Op seems to be obsessed with “zero trust”, so creating a trusted area for this stuff would be an easy win.
Do you have port 80 to nginx open? Certbot dry run will give you some diagnostics, but that is the most common issue (port 80 being closed).
I also run LE on nginx and afraid DNS.
The effect is similar to sticky ports, but sticky ports is just filtering based on Mac address, which can be spoofed.
802.11x allows traffic from a device only if they also have the correct EAP certificate.
https://en.m.wikipedia.org/wiki/IEEE_802.1X
802.1x are a set of protocols that allow port access to be locked to specific devices, which would preclude your need for multiple subnets. You would likely need a few extra physical ports on your white box router, the unmanaged switch could later become overwhelmed passing traffic in a more complicated setup, and you would still need to keep trusted and untrusted traffic separate at the gateway subnet.
Your use case is exactly why vlans were invented.
However, I suspect from your other answers that you are actually looking for an open source managed switch so your entire networking stack is auditable.
There are a few solutions like opx, but hardware supporting opx is prohibitively expensive and it is almost always cheaper to build a beige box and use Linux or get a 2nd hand supported device and use openwrt.
For simple cases you might be able to use 802.1x authentication if “trust” is the issue. This doesnt scale well as a solution on a larger network though.
Op specified they have a dumb switch
Kind of a vague question, but I take it you mean OS-level hardening, which should be fine with CIS hardening.
In a virtualized environment, there are many security layers to take care of: network access, storage, api control, identity access, cluster config, backups, etc.
Don’t be flippant.
This is like going to a car enthusiast forum and asking “any potential problems with driving a car that may or may not be stolen?”
You have indicated that you’re aware of the potential repercussions of running a personal project in a publicly-funded environment.You’ve already been told that this is unethical everywhere and illegal in many places.
If you are so sure of your indemnity because it’s “your device”, why are you asking on Lemmy?
It can manage KVM, so I don’t see why not .
Side question, but where are you hearing this about incus?
I’m wrapping up 9 years of using proxmox and I have very specific reasons for switching to incus, but I this is the third time I’m fielding questions in the last month about incus.
I think so.
It is LXD + KVM, so way more and finer tune control on lxc instances. It can run OCI images as well, so for docker instances with only a few configs and no persistent storage, it is actually quite handy. For docker instances that need pretty complicated compose files, I just run docker inside an lxc for now, until I figure that out.
Bash variable manipulation is really, really fun.
Oof, a lot of vitriol in this thread.
In the end, security is less about tooling and config, and more about understanding the risks and acting accordingly.
I expose jellyfin to the internet, but only to a specific public IP. That reduced my risk considerably.