Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Jellyfin over the internet

Jellyfin over the internet

Scheduled Pinned Locked Moved Selfhosted
selfhosted
263 Posts 144 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jraccoon@discuss.tchncs.deJ [email protected]

    I see everyone in this thread recommending a VPN or reverse proxy for accessing Jellyfin from outside the LAN. While I generally agree, I don't see a realistic risk in exposing Jellyfin directly to the internet. It supports HTTPS and certificates nowadays, so there’s no need for outside SSL termination anymore. (See Edit 2)

    In my setup, which I've been running for some time, I've port-forwarded only Jellyfin's HTTPS port to eliminate the possibility of someone ending up on pure HTTP and sending credentials unencrypted. I've also changed the Jellyfin's default port to a non-standard one to avoid basic port-scanning bots spamming login attempts. I fully understand that this falls into the security through obscurity category, but no harm in it either.

    Anyone wanna yell at me for being an idiot and doing everything wrong? I'm genuinely curious, as the sentiment online seems to be that at least a reverse proxy is almost mandatory for this kind of setup, and I'm not entirely sure why.

    Edit: Thank you everyone for your responses. While I don't agree with everything, the new insight is appreciated.

    Edit 2: I've been informed that infact the support for HTTPS will be removed in a future version. From v10.11 release notes:

    Deprecation Notice: Jellyfin’s internal handling of TLS/SSL certificates and configuration in the web server will be removed in a future version. No changes to the current system have been made in 10.11, however future versions will remove the current system and instead will provide advanced instructions to configure the Kestrel webserver directly for this relatively niche usecase. We strongly advise anyone using the current TLS options to use a Reverse Proxy for TLS termination instead if at all possible, as this provides a number of benefits

    douglasg14b@lemmy.worldD This user is from outside of this forum
    douglasg14b@lemmy.worldD This user is from outside of this forum
    [email protected]
    wrote last edited by [email protected]
    #105

    Jellyfin has a whole host of unresolved and unmitigated security vulnerabilities that make exposing it to the internet. A pretty poor choice.

    https://github.com/jellyfin/jellyfin/issues/5415

    S 1 Reply Last reply
    6
    • M [email protected]

      It feels like everything is a tradeoff and I think a setup like this reduces the complexity for people you share with.

      If you added fail2ban along with alert email/notifications you could have a chance to react if you were ever targeted for a brute force attempt. Jellyfin docs talk about setting this up for anyone interested.

      Blocking IP segments based on geography of countries you don't expect connections from adds the cost of a VPN for malicious actors in those areas.

      Giving Jellyfin its own VLAN on your network could help limit exposure to your other services and devices if you experience a 0day or are otherwise compromised.

      douglasg14b@lemmy.worldD This user is from outside of this forum
      douglasg14b@lemmy.worldD This user is from outside of this forum
      [email protected]
      wrote last edited by
      #106

      Fail2ban isn't going to help you when jellyfin has vulnerable endpoints that need no authentication at all.

      M 1 Reply Last reply
      5
      • P [email protected]

        If your reverse proxy only acknowledges jellyfin exists if the hostname is correct, you won't get discovered by an IP scanner.

        Mine's on jellyfin.[domain].com and you get a completely different page if you hit it by IP address.

        If it does get found, there's also a fail2ban to rate-limit someone brute-forcing a login.

        I've always exposed my home IP to the internet. Haven't had an issue in the last 15 years. I'm running about 10 public-facing services including NTP and SMTP.

        douglasg14b@lemmy.worldD This user is from outside of this forum
        douglasg14b@lemmy.worldD This user is from outside of this forum
        [email protected]
        wrote last edited by
        #107

        Please to see: https://github.com/jellyfin/jellyfin/issues/5415

        Someone doesn't necessarily have to brute Force a login if they know about pre-existing vulnerabilities, that may be exploited in unexpected ways

        1 Reply Last reply
        2
        • E [email protected]

          Wireguard.

          W This user is from outside of this forum
          W This user is from outside of this forum
          [email protected]
          wrote last edited by [email protected]
          #108

          and a local reverse proxy that can route through wireguard when you want to watch on a smart tv.

          its not as complicated as it sounds, it's just a wireguard client, and a reverse proxy like on the main server.

          it can even be your laptop, without hdmi cables

          P A 2 Replies Last reply
          7
          • S [email protected]

            Why would you need to expose SSH for everyday use? Or does Jellyfin require it to function?

            Maybe leave that behind some VPN access.

            W This user is from outside of this forum
            W This user is from outside of this forum
            [email protected]
            wrote last edited by
            #109

            I agree, but SSH is more secure than Jellyfin. it shouldn't be exposed like that, others in the comments already pointed out why

            1 Reply Last reply
            0
            • E [email protected]

              lemm.ee :'''(

              0 This user is from outside of this forum
              0 This user is from outside of this forum
              [email protected]
              wrote last edited by
              #110

              1 Reply Last reply
              6
              • F [email protected]

                Change the port it runs on to be stupid high and they won't bother.

                C This user is from outside of this forum
                C This user is from outside of this forum
                [email protected]
                wrote last edited by
                #111

                Yeah hey what's your IP address real quick? No reason

                F 1 Reply Last reply
                0
                • T [email protected]

                  What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                  I’m wondering what to use and I’m pretty beginner at this

                  swearengen@sopuli.xyzS This user is from outside of this forum
                  swearengen@sopuli.xyzS This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #112

                  I'm just using caddy and a cheap $2 a year .top domain with a $4 a month VPS. Works for my users, I only have 3 users on my server.

                  1 Reply Last reply
                  3
                  • T [email protected]

                    What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                    I’m wondering what to use and I’m pretty beginner at this

                    S This user is from outside of this forum
                    S This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #113

                    OpenVPN into my router

                    1 Reply Last reply
                    2
                    • C [email protected]

                      Yeah hey what's your IP address real quick? No reason

                      F This user is from outside of this forum
                      F This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #114

                      In 3 years I haven't had a single attempted connection that wasn't me. Once you get to the ephemeral ports nobody is scanning that high.

                      I'm not saying run no security or something. Just nobody wants to scan all 65k ports. They're looking for easy targets.

                      M 1 Reply Last reply
                      4
                      • T [email protected]

                        What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                        I’m wondering what to use and I’m pretty beginner at this

                        merlin@discuss.tchncs.deM This user is from outside of this forum
                        merlin@discuss.tchncs.deM This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #115

                        I just install tailscale at family houses. The limit is 100 machines.

                        1 Reply Last reply
                        5
                        • T [email protected]

                          What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                          I’m wondering what to use and I’m pretty beginner at this

                          T This user is from outside of this forum
                          T This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #116

                          I don't host my media outside my local network but, if I did, I would use my go to method of SWAG with Authentik. This is what I have done for my other self-hosted items.

                          U 1 Reply Last reply
                          3
                          • T [email protected]

                            I don't host my media outside my local network but, if I did, I would use my go to method of SWAG with Authentik. This is what I have done for my other self-hosted items.

                            U This user is from outside of this forum
                            U This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #117

                            1 Reply Last reply
                            6
                            • 30p87@feddit.org3 [email protected]

                              fail2ban with endlessh and abuseipdb as actions

                              Anything that's not specifically my username or git gets instantly blocked. Same with correct users but trying to use passwords or failing authentication in any way.

                              M This user is from outside of this forum
                              M This user is from outside of this forum
                              [email protected]
                              wrote last edited by [email protected]
                              #118

                              Youve minimized login risk, but not any 0 days or newly discovered vulnerabilites in your ssh server software. Its still best to not directly expose any ports you dont need to regularly interact with to the internet.

                              Also, Look into crowdsec as a fail2ban replacement. Its uses automatically crowdsourced info to pre block IPs. A bit more proactive compared to abuseipdb manual reporting.

                              T 1 Reply Last reply
                              21
                              • douglasg14b@lemmy.worldD [email protected]

                                Fail2ban isn't going to help you when jellyfin has vulnerable endpoints that need no authentication at all.

                                M This user is from outside of this forum
                                M This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #119

                                Your comment got me looking through the jellyfin github issues. Are the bugs listed for unauthenticated endpoints what you're referencing? It looks like the 7 open mention being able to view information about the jellyfin instance or view the media itself. But this is just what was commented as possible, there could be more possibilities especially if combined with other vulnerabilities.

                                Now realizing there are parts of Jellyfin that are known to be accessible without authentication, I'm thinking Fail2ban is going to do less but unless there are ways to do injection with the known bugs/a new 0day they will still need to brute force a password to be able to make changes. I'm curious if there is anything I'm overlooking.

                                R 1 Reply Last reply
                                2
                                • jraccoon@discuss.tchncs.deJ [email protected]

                                  I see everyone in this thread recommending a VPN or reverse proxy for accessing Jellyfin from outside the LAN. While I generally agree, I don't see a realistic risk in exposing Jellyfin directly to the internet. It supports HTTPS and certificates nowadays, so there’s no need for outside SSL termination anymore. (See Edit 2)

                                  In my setup, which I've been running for some time, I've port-forwarded only Jellyfin's HTTPS port to eliminate the possibility of someone ending up on pure HTTP and sending credentials unencrypted. I've also changed the Jellyfin's default port to a non-standard one to avoid basic port-scanning bots spamming login attempts. I fully understand that this falls into the security through obscurity category, but no harm in it either.

                                  Anyone wanna yell at me for being an idiot and doing everything wrong? I'm genuinely curious, as the sentiment online seems to be that at least a reverse proxy is almost mandatory for this kind of setup, and I'm not entirely sure why.

                                  Edit: Thank you everyone for your responses. While I don't agree with everything, the new insight is appreciated.

                                  Edit 2: I've been informed that infact the support for HTTPS will be removed in a future version. From v10.11 release notes:

                                  Deprecation Notice: Jellyfin’s internal handling of TLS/SSL certificates and configuration in the web server will be removed in a future version. No changes to the current system have been made in 10.11, however future versions will remove the current system and instead will provide advanced instructions to configure the Kestrel webserver directly for this relatively niche usecase. We strongly advise anyone using the current TLS options to use a Reverse Proxy for TLS termination instead if at all possible, as this provides a number of benefits

                                  R This user is from outside of this forum
                                  R This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #120

                                  You remember when LastPass had a massive leak and it out of their production source code which demonstrated that their encryption security was horrible? That was a Plex vulnerability. All it takes is a zero day and one of the packages they're using and you're a prime target for ransomware.

                                  You can see from the number of unauthenticated processes in their security backlog that security really has been an afterthought.

                                  Unless you're running in a non-privileged container with read only media, I definitely would not put that out on the open network.

                                  1 Reply Last reply
                                  4
                                  • T [email protected]

                                    What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                    I’m wondering what to use and I’m pretty beginner at this

                                    S This user is from outside of this forum
                                    S This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #121

                                    Synology worked for me. They have built in reverse proxy. As well as good documentation to install it on their machine. Just gotta configure your wifi router to port forward your device and bam you're ready to rock and roll

                                    T 1 Reply Last reply
                                    1
                                    • S [email protected]

                                      Synology worked for me. They have built in reverse proxy. As well as good documentation to install it on their machine. Just gotta configure your wifi router to port forward your device and bam you're ready to rock and roll

                                      T This user is from outside of this forum
                                      T This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #122

                                      Didn’t they patch their things now that your stuck in their bubble/environment now or something like that ?

                                      S 1 Reply Last reply
                                      0
                                      • T [email protected]

                                        What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                        I’m wondering what to use and I’m pretty beginner at this

                                        N This user is from outside of this forum
                                        N This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by
                                        #123

                                        This is my setup.

                                        Read more, here.

                                        blah3166@piefed.socialB 1 Reply Last reply
                                        2
                                        • T [email protected]

                                          What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                          I’m wondering what to use and I’m pretty beginner at this

                                          vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                          vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by [email protected]
                                          #124

                                          Jellyfin isn't secure and is full of holes.

                                          That said, here's how to host it anyway.

                                          1. Wireguard tunnel, be it tailscale, netbird, innernet, whatever
                                          2. A vps with a proxy on it, I like Caddy
                                          3. A PC at home with Jellyfin running on a port, sure, 8096

                                          If you aren't using Tailscale, make your VPS your main hub for whatever you choose, pihole, wg-easy, etc. Connect the proxy to Jellyfin through your chosen tunnel, with ssl, Caddy makes it easy.

                                          Since Jellyfin isn't exactly secure, secure it. Give it its own user and make sure your media isn't writable by the user. Inconvenient for deleting movies in the app, but better for security.

                                          more...

                                          Use fail2ban to stop intruders after failed login attempts, you can force fail2ban to listen in on jellyfin's host for failures and block ips automatically.

                                          More!

                                          Use Anubis and yes, I can confirm Anubis doesn't intrude Jellyfin connectivity and just works, connect it to fail2ban and you can cook your own ddos protection.

                                          MORE!

                                          SELinux. Lock Jellyfin down. Lock the system down. It's work but it's worth it.

                                          I SAID MORE!

                                          There's a GeoIP blocking plugin for Caddy that you can use to limit Jellyfin's access to your city, state, hemisphere, etc. You can also look into whitelisting in Caddy if everyone's IP is static. If not, ddns-server and a script to update Caddy every round? It can get deep.

                                          Again, don't do any of this and just use Jellyfin over wireguard like everyone else does(they don't).

                                          oyzmo@lemmy.worldO umbrella@lemmy.mlU L 3 Replies Last reply
                                          38
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups