Hi guys I was wondering if there is a streamlined way to disable remote acess to a selfhosted service (say at a reverse proxy level) if a published security vunerability is present.

I know, ideally you want to keep all your selfhosted services up to date. However on certain selfhosted service auto updates may not be viable (due to major changes between updates) and you being unavailable 24/7 to respond to vunerabilities.

Curious on your thoughts and suggestions. So far the only middle ground I can find is realying on a vpn wireguard, tailscale, etc.

Page regarding homeassistant remote ui autodisable: https://www.nabucasa.com/config/remote/

  • catloaf@lemm.ee
    link
    fedilink
    English
    arrow-up
    2
    ·
    6 months ago

    If you know of a data source for these vulnerabilities, I’m all ears. Because currently, that aggregation work is done by companies selling the feeds for quite a lot of money.

    Personally, I’d just put everything behind a VPN. The attack surface is much smaller.

    • Tinkerer@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      6 months ago

      I tried this for 2 months with tailscale and love it, however having it run 24/7 on both my wife’s and my phone was too much. It literally wiped out the battery on my wife’s iPhone 12 unless she charged it in the middle of the day. I lost about 40% more battery throughout the day on my android. I had to switch back to cloudflare and nginx proxy manager for now.

      • catloaf@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 months ago

        Hmm. It shouldn’t do that. If you try it again, I’d check the configuration, and if you verify it with the Android battery metrics, open an issue.

        I assume it also supports split tunneling, which might help.