Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Jellyfin over the internet

Jellyfin over the internet

Scheduled Pinned Locked Moved Selfhosted
selfhosted
263 Posts 144 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S [email protected]

    Do you at least have it on a VLAN?

    M This user is from outside of this forum
    M This user is from outside of this forum
    [email protected]
    wrote last edited by [email protected]
    #250

    I dunno. It’s plugged in directly to the modem/router provided by my ISP while my wifi is provided by a separate mesh setup, which is also plugged in to the modem/router 🤷‍♂️

    S 1 Reply Last reply
    0
    • M [email protected]

      I dunno. It’s plugged in directly to the modem/router provided by my ISP while my wifi is provided by a separate mesh setup, which is also plugged in to the modem/router 🤷‍♂️

      S This user is from outside of this forum
      S This user is from outside of this forum
      [email protected]
      wrote last edited by
      #251

      Yeah, you’ll definitely want to make sure that computer is isolated. It doesn’t sound like it’s currently on a VLAN. The real danger isn’t just someone messing up that one machine, once they’re in, they’re behind your firewall and can potentially access anything else on your network. Smart home devices are often the next targets, things like light bulbs, security cameras, and especially Windows computers, which are usually easy to compromise if they’re on the same network.

      You might be wondering, “How likely is that?” Honestly, very likely. Back when my website was online, it would get hit by hackers, mostly script kiddies, several times an hour.

      1 Reply Last reply
      1
      • F [email protected]

        Specifically these issues: https://github.com/jellyfin/jellyfin/issues/5415

        The big one is that video/audio playing endpoints can be used without authentication. However, you have to guess a UUID. If Jellyfin is using UUIDv4 (fully random), then this shouldn't be an issue; the search space is too big. However, many of the other types of UUIDs could hypothetically be enumerated through brute force. I'm not sure what Jellyfin uses for UUIDs.

        maggiwuerze@feddit.orgM This user is from outside of this forum
        maggiwuerze@feddit.orgM This user is from outside of this forum
        [email protected]
        wrote last edited by
        #252

        They don't. Ids in Jellyfin are based on the path of the file, so easily guessable with a sufficiently large rainbow table

        1 Reply Last reply
        0
        • P [email protected]

          You can also use a router that can run wireguard/openvpn and have that run the tunnel back to home for you. I've got a portable GL-Inet router with OpenWRT that I use for this when I'm on the road

          W This user is from outside of this forum
          W This user is from outside of this forum
          [email protected]
          wrote last edited by
          #253

          or that yes, but I often don't want to give the whole network access to my home network for security reasons, so that's something to consider

          1 Reply Last reply
          0
          • A [email protected]

            How would you do this off network?

            W This user is from outside of this forum
            W This user is from outside of this forum
            [email protected]
            wrote last edited by
            #254

            what do you mean by off network? on the wifi of a different home's network, that has internet access?

            the wireguard client on your laptop is supposed to give the laptop (and the laptop only) access to your home network, and the reverse proxy running on the laptop is supposed to give local devices access to services at home selectively, by listening on port 443 on the local network, and processing requests to services that you defined, by forwarding them through the vpn tunnel.
            this requires that a machine at home runs a wireguard server, and that its port is forwarded in your router

            1 Reply Last reply
            0
            • D [email protected]

              Even more secure is having a VPS and self hosting Heascale, even better is Wireguard

              P This user is from outside of this forum
              P This user is from outside of this forum
              [email protected]
              wrote last edited by
              #255

              I'm trying to move away from needing a VPN to connect to make it simpler for less technically inclined family members

              D 1 Reply Last reply
              0
              • E [email protected]

                Not so much a fight as an exercise in futility lol

                dbtng@eviltoast.orgD This user is from outside of this forum
                dbtng@eviltoast.orgD This user is from outside of this forum
                [email protected]
                wrote last edited by
                #256

                Well, I might as well put a dog in the fight. I'm considering my final, actually secure deployment of nextcloud.

                This discussion has convinced me that a vpn is the only answer.
                And almost everyone says wireguard.

                K. Thats what I will build.

                E 1 Reply Last reply
                1
                • dbtng@eviltoast.orgD [email protected]

                  Well, I might as well put a dog in the fight. I'm considering my final, actually secure deployment of nextcloud.

                  This discussion has convinced me that a vpn is the only answer.
                  And almost everyone says wireguard.

                  K. Thats what I will build.

                  E This user is from outside of this forum
                  E This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #257

                  It’s not the only answer, but it’s the one that will get you the most secure with the least amount of effort.

                  dbtng@eviltoast.orgD 1 Reply Last reply
                  1
                  • P [email protected]

                    I'm trying to move away from needing a VPN to connect to make it simpler for less technically inclined family members

                    D This user is from outside of this forum
                    D This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #258

                    Usually just needs to be set up once. A small price to pay for security.

                    1 Reply Last reply
                    2
                    • E [email protected]

                      It’s not the only answer, but it’s the one that will get you the most secure with the least amount of effort.

                      dbtng@eviltoast.orgD This user is from outside of this forum
                      dbtng@eviltoast.orgD This user is from outside of this forum
                      [email protected]
                      wrote last edited by [email protected]
                      #259

                      Ya. I understand VPN. I do enterprise IT stuff. The things I build assume a secure environment. VPN is step one.
                      Nailing down a web server on the internet tho ... there's so many ways to attack. There's so many things to secure. And its a bit complex to manage all that.
                      The nextcloud site covers hardening the server, but doesn't even mention vpn.
                      I've been watching threads like this. I'm pretty convinced vpn is the answer.

                      E 1 Reply Last reply
                      0
                      • dbtng@eviltoast.orgD [email protected]

                        Ya. I understand VPN. I do enterprise IT stuff. The things I build assume a secure environment. VPN is step one.
                        Nailing down a web server on the internet tho ... there's so many ways to attack. There's so many things to secure. And its a bit complex to manage all that.
                        The nextcloud site covers hardening the server, but doesn't even mention vpn.
                        I've been watching threads like this. I'm pretty convinced vpn is the answer.

                        E This user is from outside of this forum
                        E This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #260

                        Yeah Nextcloud won’t mention VPN for hardening because the assumption is you want it publicly accessible.

                        I have a number of things publicly accessible and there are a number of things I do to secure them. crowdsec monitoring and blocking, a reverse proxy with OIDC for authentication, a WAF in front of it all. But those are only for the things I have exposed because I want other people to use them. If it’s something just for me, I don’t bother with all that and just access it via VPN.

                        dbtng@eviltoast.orgD 1 Reply Last reply
                        1
                        • stopspazzing@lemmy.worldS [email protected]

                          Someone mentioned above that cloudflare will ban you for streaming through their tunnel. Just be warned.

                          L This user is from outside of this forum
                          L This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #261

                          yeah it’s in the terms of service but my usage will be so small it’s not even going to register on their charts so i’m happy with the risk.

                          1 Reply Last reply
                          0
                          • E [email protected]

                            Yeah Nextcloud won’t mention VPN for hardening because the assumption is you want it publicly accessible.

                            I have a number of things publicly accessible and there are a number of things I do to secure them. crowdsec monitoring and blocking, a reverse proxy with OIDC for authentication, a WAF in front of it all. But those are only for the things I have exposed because I want other people to use them. If it’s something just for me, I don’t bother with all that and just access it via VPN.

                            dbtng@eviltoast.orgD This user is from outside of this forum
                            dbtng@eviltoast.orgD This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #262

                            Ok. Yes, my use case is a private document and media store. I'm ungoogling.
                            VPN seems like a good place to start. But I'd like a simple answer, and I expect there are none to be had. As you've illustrated here, I'll find a reason to punch holes in the firewall. And then I'm going to need to secure a web server. Life happens. I'll keep it simple for now while I sort things. Thanks for your perspective.

                            1 Reply Last reply
                            0
                            • T [email protected]

                              What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                              I’m wondering what to use and I’m pretty beginner at this

                              C This user is from outside of this forum
                              C This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #263

                              I keep jellyfin up to date in a container and forward tcp/8920 on my router to the container. Easy and plenty secure. People in this thread are wildly overthinking it.

                              1 Reply Last reply
                              1
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups