Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. How to secure Jellyfin hosted over the internet?

How to secure Jellyfin hosted over the internet?

Scheduled Pinned Locked Moved Selfhosted
selfhosted
138 Posts 62 Posters 1.8k Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • spacecadet@feddit.nlS [email protected]

    That reminds me ... another annoying thing Google did was list my private jellyfin instance as a "deceptive site"

    A common issue it seems.

    N This user is from outside of this forum
    N This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #129

    They did that with most of my subdomains

    1 Reply Last reply
    0
    • gagootron@feddit.orgG [email protected]

      I use good ol' obscurity. My reverse proxy requires that the correct subdomain is used to access any service that I host and my domain has a wildcard entry. So if you access asdf.example.com you get an error, the same for directly accessing my ip, but going to jellyfin.example.com works.
      And since i don't post my valid urls anywhere no web-scraper can find them.
      This filters out 99% of bots and the rest are handled using authelia and crowdsec

      N This user is from outside of this forum
      N This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #130

      If you're using jellyfin as the url, that's an easily guessable name, however if you use random words not related to what's being hosted chances are less, e.g. salmon.example.com . Also ideally your server should reply with a 200 to * subdomains so scrappers can't tell valid from invalid domains. Also also, ideally it also sends some random data on each of those so they don't look exactly the same. But that's approaching paranoid levels of security.

      1 Reply Last reply
      0
      • spacecadet@feddit.nlS [email protected]

        That reminds me ... another annoying thing Google did was list my private jellyfin instance as a "deceptive site"

        A common issue it seems.

        Z This user is from outside of this forum
        Z This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #131

        Unsurprising, but still shitty. Par for the course for the company these days.

        1 Reply Last reply
        0
        • gagootron@feddit.orgG [email protected]

          It seems to that it works. I don't get any web-scrapers hitting anything but my main domain. I can't find any of my subdomains on google.

          Please tell me how you believe that it works. Maybe i overlooked something...

          O This user is from outside of this forum
          O This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #132

          My understanding is that scrappers check every domain and subdomain. You’re making it harder but not impossible. Everything gets scrapped

          It would be better if you also did IP whitelisting, rate limiting to prevent bots, bot detection via cloudflare or something similar, etc.

          1 Reply Last reply
          0
          • lambda@programming.devL [email protected]

            I already host multiple services via caddy as my reverse proxy. Jellyfin, I am worried about authentication. How do you secure it?

            ? Offline
            ? Offline
            Guest
            wrote on last edited by
            #133

            So i’ve been trying to set this up this exact thing for the past few weeks - tried all manner of different Nginx/Tailscale/VPS/Traefik/Wireguard/Authelia combos, but to no avail

            I was lost in the maze

            However, I realised that it was literally as simple as setting up a CloudFlare Tunnel on my particular local network I wanted exposed (in my case, the Docker network that runs the JellyFin container) and then linking that domain/ip:port within CloudFlare’s Zero Trust dashboard

            And you can even set up what looks like pretty robust authentication (2FA, limited to only certain emails, etc)

            Not sure what your use case is, but as mine is shared with only me and my partner, this worked like a charm

            C V 2 Replies Last reply
            0
            • ? Guest

              So i’ve been trying to set this up this exact thing for the past few weeks - tried all manner of different Nginx/Tailscale/VPS/Traefik/Wireguard/Authelia combos, but to no avail

              I was lost in the maze

              However, I realised that it was literally as simple as setting up a CloudFlare Tunnel on my particular local network I wanted exposed (in my case, the Docker network that runs the JellyFin container) and then linking that domain/ip:port within CloudFlare’s Zero Trust dashboard

              And you can even set up what looks like pretty robust authentication (2FA, limited to only certain emails, etc)

              Not sure what your use case is, but as mine is shared with only me and my partner, this worked like a charm

              C This user is from outside of this forum
              C This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #134

              I'm pretty sure that using Jellyfin over Cloudflare tunnels is against their TOS, just FYI. I'm trying to figure out an alternative myself right now because of that.

              1 Reply Last reply
              0
              • paequ2@lemmy.todayP [email protected]

                if the cameras don’t load, open Tailscale and make sure it’s connected

                I've been using Tailscale for a few months now and this is my only complaint. On Android and macOS, the Tailscale client gets randomly killed. So it's an extra thing you have to manage.

                It's almost annoying enough to make me want to host my services on the actual internet....... almost... but not yet.

                F This user is from outside of this forum
                F This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #135

                Try WG Tunnel instead. It will reconnect on loss, but you lose the Tailscale features (no big deal with dynamic DNS)

                1 Reply Last reply
                0
                • ? Guest

                  So i’ve been trying to set this up this exact thing for the past few weeks - tried all manner of different Nginx/Tailscale/VPS/Traefik/Wireguard/Authelia combos, but to no avail

                  I was lost in the maze

                  However, I realised that it was literally as simple as setting up a CloudFlare Tunnel on my particular local network I wanted exposed (in my case, the Docker network that runs the JellyFin container) and then linking that domain/ip:port within CloudFlare’s Zero Trust dashboard

                  And you can even set up what looks like pretty robust authentication (2FA, limited to only certain emails, etc)

                  Not sure what your use case is, but as mine is shared with only me and my partner, this worked like a charm

                  V This user is from outside of this forum
                  V This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #136

                  Pay attention to your email, when cloudflare decides to warn you for this (they will, it's very very much against TOS) they'll send you an email, if you don't remove the tunnel ASAP, your entire account will be terminated.

                  ? 1 Reply Last reply
                  0
                  • V [email protected]

                    Pay attention to your email, when cloudflare decides to warn you for this (they will, it's very very much against TOS) they'll send you an email, if you don't remove the tunnel ASAP, your entire account will be terminated.

                    ? Offline
                    ? Offline
                    Guest
                    wrote on last edited by
                    #137

                    Why would Cloudflare warn me against a service they themselves offer? The email authentication is all managed by them

                    V 1 Reply Last reply
                    0
                    • ? Guest

                      Why would Cloudflare warn me against a service they themselves offer? The email authentication is all managed by them

                      V This user is from outside of this forum
                      V This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #138

                      You're not allowed to tunnel video traffic.

                      1 Reply Last reply
                      0
                      • System shared this topic on
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups