Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Jellyfin over the internet

Jellyfin over the internet

Scheduled Pinned Locked Moved Selfhosted
selfhosted
263 Posts 144 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T [email protected]

    What’s your go too (secure) method for casting over the internet with a Jellyfin server.

    I’m wondering what to use and I’m pretty beginner at this

    N This user is from outside of this forum
    N This user is from outside of this forum
    [email protected]
    wrote last edited by
    #123

    This is my setup.

    Read more, here.

    blah3166@piefed.socialB 1 Reply Last reply
    2
    • T [email protected]

      What’s your go too (secure) method for casting over the internet with a Jellyfin server.

      I’m wondering what to use and I’m pretty beginner at this

      vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
      vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
      [email protected]
      wrote last edited by [email protected]
      #124

      Jellyfin isn't secure and is full of holes.

      That said, here's how to host it anyway.

      1. Wireguard tunnel, be it tailscale, netbird, innernet, whatever
      2. A vps with a proxy on it, I like Caddy
      3. A PC at home with Jellyfin running on a port, sure, 8096

      If you aren't using Tailscale, make your VPS your main hub for whatever you choose, pihole, wg-easy, etc. Connect the proxy to Jellyfin through your chosen tunnel, with ssl, Caddy makes it easy.

      Since Jellyfin isn't exactly secure, secure it. Give it its own user and make sure your media isn't writable by the user. Inconvenient for deleting movies in the app, but better for security.

      more...

      Use fail2ban to stop intruders after failed login attempts, you can force fail2ban to listen in on jellyfin's host for failures and block ips automatically.

      More!

      Use Anubis and yes, I can confirm Anubis doesn't intrude Jellyfin connectivity and just works, connect it to fail2ban and you can cook your own ddos protection.

      MORE!

      SELinux. Lock Jellyfin down. Lock the system down. It's work but it's worth it.

      I SAID MORE!

      There's a GeoIP blocking plugin for Caddy that you can use to limit Jellyfin's access to your city, state, hemisphere, etc. You can also look into whitelisting in Caddy if everyone's IP is static. If not, ddns-server and a script to update Caddy every round? It can get deep.

      Again, don't do any of this and just use Jellyfin over wireguard like everyone else does(they don't).

      oyzmo@lemmy.worldO umbrella@lemmy.mlU L 3 Replies Last reply
      38
      • F [email protected]

        Nah, setting non-standard ports is sound advice in security circles.

        People misunderstand the "no security through obscurity" phrase. If you build security as a chain, where the chain is only as good as the weakest link, then it's bad. But if you build security in layers, like a castle, then it can only help. It's OK for a layer to be weak when there are other layers behind it.

        Even better, non-standard ports will make 99% of threats go away. They automate scans that are just looking for anything they can break. If they don't see the open ports, they move on. Won't stop a determined attacker, of course, but that's what other layers are for.

        As long as there's real security otherwise (TLS, good passwords, etc), it's fine.

        If anyone says "that's a false sense of security", ignore them. They've replaced thinking with a cliche.

        M This user is from outside of this forum
        M This user is from outside of this forum
        [email protected]
        wrote last edited by [email protected]
        #125

        People misunderstand the "no security through obscurity" phrase. If you build security as a chain, where the chain is only as good as the weakest link, then it's bad. But if you build security in layers, like a castle, then it can only help. It's OK for a layer to be weak when there are other layers behind it.

        And this is what should be sung from the hills and mountaintops. There’s some old infosec advice that you should have two or three honeypots, buried successively deeper behind your security, and only start to worry when the second or third gets hit; The first one getting hit simply means they’re sniffing around with automated port scanners and bots. They’re just throwing common vulnerabilities at the wall to see if any of them stick. The first one is usually enough for them to go “ah shit I guess I hit a honeypot. They must be looking for me now. Never mind.” The second is when you know they’re actually targeting you specifically. And the third is when you need to start considering pulling plugs.

        1 Reply Last reply
        3
        • F [email protected]

          In 3 years I haven't had a single attempted connection that wasn't me. Once you get to the ephemeral ports nobody is scanning that high.

          I'm not saying run no security or something. Just nobody wants to scan all 65k ports. They're looking for easy targets.

          M This user is from outside of this forum
          M This user is from outside of this forum
          [email protected]
          wrote last edited by
          #126

          Just nobody wants to scan all 65k ports.

          Shodan has entered the chat.

          1 Reply Last reply
          2
          • T [email protected]

            What’s your go too (secure) method for casting over the internet with a Jellyfin server.

            I’m wondering what to use and I’m pretty beginner at this

            S This user is from outside of this forum
            S This user is from outside of this forum
            [email protected]
            wrote last edited by
            #127

            Tailscale + Caddy (automatic certificates FTW).

            1 Reply Last reply
            3
            • T [email protected]

              What’s your go too (secure) method for casting over the internet with a Jellyfin server.

              I’m wondering what to use and I’m pretty beginner at this

              B This user is from outside of this forum
              B This user is from outside of this forum
              [email protected]
              wrote last edited by
              #128

              Is putting it behind an Oauth2 proxy and running the server in a rootless container enough?

              1 Reply Last reply
              1
              • T [email protected]

                What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                I’m wondering what to use and I’m pretty beginner at this

                remembertheapollo_@lemmy.worldR This user is from outside of this forum
                remembertheapollo_@lemmy.worldR This user is from outside of this forum
                [email protected]
                wrote last edited by
                #129

                OpenVPN into my own LAN. Stream from there to my device.

                1 Reply Last reply
                0
                • vanilla_puddinfudge@infosec.pubV [email protected]

                  Jellyfin isn't secure and is full of holes.

                  That said, here's how to host it anyway.

                  1. Wireguard tunnel, be it tailscale, netbird, innernet, whatever
                  2. A vps with a proxy on it, I like Caddy
                  3. A PC at home with Jellyfin running on a port, sure, 8096

                  If you aren't using Tailscale, make your VPS your main hub for whatever you choose, pihole, wg-easy, etc. Connect the proxy to Jellyfin through your chosen tunnel, with ssl, Caddy makes it easy.

                  Since Jellyfin isn't exactly secure, secure it. Give it its own user and make sure your media isn't writable by the user. Inconvenient for deleting movies in the app, but better for security.

                  more...

                  Use fail2ban to stop intruders after failed login attempts, you can force fail2ban to listen in on jellyfin's host for failures and block ips automatically.

                  More!

                  Use Anubis and yes, I can confirm Anubis doesn't intrude Jellyfin connectivity and just works, connect it to fail2ban and you can cook your own ddos protection.

                  MORE!

                  SELinux. Lock Jellyfin down. Lock the system down. It's work but it's worth it.

                  I SAID MORE!

                  There's a GeoIP blocking plugin for Caddy that you can use to limit Jellyfin's access to your city, state, hemisphere, etc. You can also look into whitelisting in Caddy if everyone's IP is static. If not, ddns-server and a script to update Caddy every round? It can get deep.

                  Again, don't do any of this and just use Jellyfin over wireguard like everyone else does(they don't).

                  oyzmo@lemmy.worldO This user is from outside of this forum
                  oyzmo@lemmy.worldO This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #130

                  Wow, a "for dummies" guide for doing all this would be great 😊 know of any?

                  ohshit604@sh.itjust.worksO vanilla_puddinfudge@infosec.pubV 2 Replies Last reply
                  8
                  • douglasg14b@lemmy.worldD [email protected]

                    Jellyfin has a whole host of unresolved and unmitigated security vulnerabilities that make exposing it to the internet. A pretty poor choice.

                    https://github.com/jellyfin/jellyfin/issues/5415

                    S This user is from outside of this forum
                    S This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #131

                    And which one of those are actually vulnerabilities that are exploitable? First, yes ofc unauthenticated endpoints should be fixed, but with those there is no real damage to be done.

                    If you know the media path then you can request a playback, and if you get the user ids then you can get all users. That's more or less it.

                    Good? No. But far from making it a poor choice exposing it.

                    douglasg14b@lemmy.worldD 1 Reply Last reply
                    3
                    • W [email protected]

                      and a local reverse proxy that can route through wireguard when you want to watch on a smart tv.

                      its not as complicated as it sounds, it's just a wireguard client, and a reverse proxy like on the main server.

                      it can even be your laptop, without hdmi cables

                      P This user is from outside of this forum
                      P This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #132

                      You can also use a router that can run wireguard/openvpn and have that run the tunnel back to home for you. I've got a portable GL-Inet router with OpenWRT that I use for this when I'm on the road

                      W 1 Reply Last reply
                      4
                      • N [email protected]

                        This is my setup.

                        Read more, here.

                        blah3166@piefed.socialB This user is from outside of this forum
                        blah3166@piefed.socialB This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #133

                        good article! thanks for that

                        1 Reply Last reply
                        0
                        • D [email protected]

                          Anyone wanna yell at me for being an idiot and doing everything wrong?

                          Not yell, but: Jellyfin is dropping HTTPS support with a future update so you might want to read up on reverse proxies before then.

                          Additionally, you might want to check if Shodan has your Jellyfin instance listed: https://www.shodan.io/

                          jraccoon@discuss.tchncs.deJ This user is from outside of this forum
                          jraccoon@discuss.tchncs.deJ This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #134

                          Jellyfin is dropping HTTPS support with a future update[...]

                          What's the source for this? I wasn't able to find anything with a quick google search

                          exu@feditown.comE 1 Reply Last reply
                          0
                          • T [email protected]

                            What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                            I’m wondering what to use and I’m pretty beginner at this

                            captainastronaut@seattlelunarsociety.orgC This user is from outside of this forum
                            captainastronaut@seattlelunarsociety.orgC This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #135

                            If it’s just so you personally can access it away from home, use tailscale. Less risky than running a publicly exposed server.

                            1 Reply Last reply
                            6
                            • darkassassin07@lemmy.caD [email protected]

                              An $11/yr domain pointed at my IP. Port 443 is open to nginx, which proxies to the desired service depending on subdomain. (and explicitly drops any connection that uses my raw ip or an unrecognized name to connect, without responding at all)

                              ACME.sh automatically refreshes my free ssl certificate every ~2months via DNS-01 verification and letsencrypt.

                              And finally, I've got a dynamic IP, so DDClient keeps my domain pointed at the correct IP when/if it changes.


                              There's also pihole on the local network, replacing the WAN IP from external DNS, with the servers local IP, for LAN devices to use. But that's very much optional, especially if your router performs NAT Hairpinning.

                              This setup covers all ~24 of the services/web applications I host, though most other services have some additional configuration to make them only accessible from LAN/VPN despite using the same ports and nginx service. I can go into that if there's interest.

                              Only Emby/Jellyfin, Ombi, and Filebrowser are made accessible from WAN; so I can easily share those with friends/family without having to guide them through/restrict them to a vpn connection.

                              J This user is from outside of this forum
                              J This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #136

                              This is an interesting setup

                              1 Reply Last reply
                              1
                              • jraccoon@discuss.tchncs.deJ [email protected]

                                Jellyfin is dropping HTTPS support with a future update[...]

                                What's the source for this? I wasn't able to find anything with a quick google search

                                exu@feditown.comE This user is from outside of this forum
                                exu@feditown.comE This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #137

                                Upgrade notes for 10.11 RCs

                                https://notes.jellyfin.org/v10.11.0_features

                                jraccoon@discuss.tchncs.deJ 1 Reply Last reply
                                1
                                • T [email protected]

                                  What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                  I’m wondering what to use and I’m pretty beginner at this

                                  S This user is from outside of this forum
                                  S This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #138

                                  I host it publicly accessible behind a proper firewall and reverse proxy setup.

                                  If you are only ever using Jellyfin from your own, wireguard configured phone, then that's great; but there's nothing wrong with hosting Jellyfin publicly.

                                  I think one of these days I need to make a "myth-busting" post about this topic.

                                  G A 2 Replies Last reply
                                  26
                                  • S [email protected]

                                    I host it publicly accessible behind a proper firewall and reverse proxy setup.

                                    If you are only ever using Jellyfin from your own, wireguard configured phone, then that's great; but there's nothing wrong with hosting Jellyfin publicly.

                                    I think one of these days I need to make a "myth-busting" post about this topic.

                                    G This user is from outside of this forum
                                    G This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #139

                                    Please do so, it'll be very useful

                                    1 Reply Last reply
                                    9
                                    • exu@feditown.comE [email protected]

                                      Upgrade notes for 10.11 RCs

                                      https://notes.jellyfin.org/v10.11.0_features

                                      jraccoon@discuss.tchncs.deJ This user is from outside of this forum
                                      jraccoon@discuss.tchncs.deJ This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #140

                                      Thanks. This is kinda important info so I've edited my initial comment.

                                      They are not saying anything on why they are removing it.

                                      1 Reply Last reply
                                      0
                                      • vanilla_puddinfudge@infosec.pubV [email protected]

                                        Jellyfin isn't secure and is full of holes.

                                        That said, here's how to host it anyway.

                                        1. Wireguard tunnel, be it tailscale, netbird, innernet, whatever
                                        2. A vps with a proxy on it, I like Caddy
                                        3. A PC at home with Jellyfin running on a port, sure, 8096

                                        If you aren't using Tailscale, make your VPS your main hub for whatever you choose, pihole, wg-easy, etc. Connect the proxy to Jellyfin through your chosen tunnel, with ssl, Caddy makes it easy.

                                        Since Jellyfin isn't exactly secure, secure it. Give it its own user and make sure your media isn't writable by the user. Inconvenient for deleting movies in the app, but better for security.

                                        more...

                                        Use fail2ban to stop intruders after failed login attempts, you can force fail2ban to listen in on jellyfin's host for failures and block ips automatically.

                                        More!

                                        Use Anubis and yes, I can confirm Anubis doesn't intrude Jellyfin connectivity and just works, connect it to fail2ban and you can cook your own ddos protection.

                                        MORE!

                                        SELinux. Lock Jellyfin down. Lock the system down. It's work but it's worth it.

                                        I SAID MORE!

                                        There's a GeoIP blocking plugin for Caddy that you can use to limit Jellyfin's access to your city, state, hemisphere, etc. You can also look into whitelisting in Caddy if everyone's IP is static. If not, ddns-server and a script to update Caddy every round? It can get deep.

                                        Again, don't do any of this and just use Jellyfin over wireguard like everyone else does(they don't).

                                        umbrella@lemmy.mlU This user is from outside of this forum
                                        umbrella@lemmy.mlU This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by [email protected]
                                        #141

                                        .

                                        D 1 Reply Last reply
                                        2
                                        • T [email protected]

                                          What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                          I’m wondering what to use and I’m pretty beginner at this

                                          T This user is from outside of this forum
                                          T This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by
                                          #142

                                          Or you could use Plex and jump through zero of these hoops

                                          E T 2 Replies Last reply
                                          1
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups