Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Jellyfin over the internet

Jellyfin over the internet

Scheduled Pinned Locked Moved Selfhosted
selfhosted
263 Posts 144 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A [email protected]

    I use a cloudflare tunnel, ISP won't give me a static IP and I wanna keep my firewall locked down tight.

    A This user is from outside of this forum
    A This user is from outside of this forum
    [email protected]
    wrote last edited by
    #143

    I tried really hard to get a named CloudFlare tunnel working with a domain name I registered (I share my personal home videos with a non technical family member in Italy) but couldn't get it working no matter what I tried.

    A 1 Reply Last reply
    0
    • oyzmo@lemmy.worldO [email protected]

      Wow, a "for dummies" guide for doing all this would be great 😊 know of any?

      ohshit604@sh.itjust.worksO This user is from outside of this forum
      ohshit604@sh.itjust.worksO This user is from outside of this forum
      [email protected]
      wrote last edited by [email protected]
      #144

      If you aren’t already familiarized with the Docker Engine - you can use Play With Docker to fiddle around, spin up a container or two using the docker run command, once you get comfortable with the command structure you can move into Docker Compose which makes handling multiple containers easy using .yml files.

      Once you’re comfortable with compose I suggest working into Reverse Proxying with something like SWAG or Traefik which let you put an domain behind the IP, ssl certificates and offer plugins that give you more control on how requests are handled.

      There really is no ā€œguide for dummiesā€ here, you’ve got to rely on the documentation provided by these services.

      1 Reply Last reply
      2
      • T [email protected]

        What’s your go too (secure) method for casting over the internet with a Jellyfin server.

        I’m wondering what to use and I’m pretty beginner at this

        F This user is from outside of this forum
        F This user is from outside of this forum
        [email protected]
        wrote last edited by [email protected]
        #145

        I think my approach is probably the most insane one, reading this thread…

        So the only thing I expose to the public internet is a homemade reverse proxy application which supports both form based and basic authentication. The only thing anonymous users have access to is the form login page. I’m on top of security updates with its dependencies and thus far I haven’t had any issues, ever. It runs in a docker container, on a VM, on Proxmox. My Jellyfin instance is in k8s.

        My mum wanted to watch some stuff on my Jellyfin instance on her Chromecast With Google TV, plugged into her ancient Dumb TV. There is a Jellyfin Android TV app. I couldn’t think of a nice way to run a VPN on Android TV or on any of her (non-existent) network infra.

        So instead I forked the Jellyfin Android TV app codebase. I found all the places where the API calls are made to the backend (there are multiple). I slapped in basic auth credentials. Recompiled the app. Deployed it to her Chromecast via developer mode.

        Solid af so far. I haven’t updated Jellyfin since then (6 months), but when I need to, I’ll update the fork and redeploy it on her Chromecast.

        couldbealeotard@lemmy.worldC epicfailguy@lemmy.worldE 2 Replies Last reply
        33
        • T [email protected]

          What’s your go too (secure) method for casting over the internet with a Jellyfin server.

          I’m wondering what to use and I’m pretty beginner at this

          C This user is from outside of this forum
          C This user is from outside of this forum
          [email protected]
          wrote last edited by
          #146

          I use a wire guard tunnel into my Fritz box and from there I just log in because I'm in my local network.

          1 Reply Last reply
          5
          • T [email protected]

            What’s your go too (secure) method for casting over the internet with a Jellyfin server.

            I’m wondering what to use and I’m pretty beginner at this

            W This user is from outside of this forum
            W This user is from outside of this forum
            [email protected]
            wrote last edited by
            #147

            Full guide to setting up Jellyfin with Reverse Proxy using Caddy and DuckDNS

            I followed this video and modified some things like ports

            1 Reply Last reply
            3
            • T [email protected]

              What’s your go too (secure) method for casting over the internet with a Jellyfin server.

              I’m wondering what to use and I’m pretty beginner at this

              P This user is from outside of this forum
              P This user is from outside of this forum
              [email protected]
              wrote last edited by
              #148

              VPN or Tailscale

              1 Reply Last reply
              1
              • S [email protected]

                And which one of those are actually vulnerabilities that are exploitable? First, yes ofc unauthenticated endpoints should be fixed, but with those there is no real damage to be done.

                If you know the media path then you can request a playback, and if you get the user ids then you can get all users. That's more or less it.

                Good? No. But far from making it a poor choice exposing it.

                douglasg14b@lemmy.worldD This user is from outside of this forum
                douglasg14b@lemmy.worldD This user is from outside of this forum
                [email protected]
                wrote last edited by [email protected]
                #149

                These are all holes in the Swiss cheese model.

                Just because you and I cannot immediately consider ways of exploiting these vulnerabilities doesn't mean they don't exist or are not already in use (Including other endpoints of vulnerabilities not listed)


                This is one of the biggest mindset gaps that exist in technology, which tends to result in a whole internet filled with exploitable services and devices. Which are more often than not used as proxies for crime or traffic, and not directly exploited.

                Meaning that unless you have incredibly robust network traffic analysis, you won't notice a thing.

                There are so many sonarr and similar instances out there with minor vulnerabilities being exploited in the wild because of the same"Well, what can someone do with these vulnerabilities anyways" mindset. Turns out all it takes is a common deployment misconfiguration in several seedbox providers to turn it into an RCE, which wouldn't have been possible if the vulnerability was patched.

                Which is just holes in the swiss cheese model lining up. Something as simple as allowing an admin user access to their own password when they are logged in enables an entirely separate class of attacks. Excused because "If they're already logged in, they know the password". Well, not of there's another vulnerability with authentication....

                See how that works?

                1 Reply Last reply
                1
                • T [email protected]

                  Or you could use Plex and jump through zero of these hoops

                  E This user is from outside of this forum
                  E This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #150

                  I think paying for remote access counts as a hoop.

                  As in "that's a pain in my hoop"

                  1 Reply Last reply
                  7
                  • T [email protected]

                    What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                    I’m wondering what to use and I’m pretty beginner at this

                    P This user is from outside of this forum
                    P This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #151

                    I access it through a reverse proxy (nginx). I guess the only weak point is if someone finds out the domain for it and starts spamming the login screen. But I've restricted access to the domain for most of the world anyway. Wireguard would probably be more secure but its not always possible if like on vacation and want to use it on the TV there..

                    F P E 3 Replies Last reply
                    8
                    • B [email protected]

                      Tailscale, with nginx for https.

                      Very easy, very simple, just works, and i can share my jellyfin server with my friends

                      O This user is from outside of this forum
                      O This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #152

                      This is the easiest way for sure.

                      1 Reply Last reply
                      0
                      • T [email protected]

                        What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                        I’m wondering what to use and I’m pretty beginner at this

                        takios@discuss.tchncs.deT This user is from outside of this forum
                        takios@discuss.tchncs.deT This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #153

                        Wireguard VPN to my fritzbox lets me access my jellyfin.

                        1 Reply Last reply
                        4
                        • P [email protected]

                          I access it through a reverse proxy (nginx). I guess the only weak point is if someone finds out the domain for it and starts spamming the login screen. But I've restricted access to the domain for most of the world anyway. Wireguard would probably be more secure but its not always possible if like on vacation and want to use it on the TV there..

                          F This user is from outside of this forum
                          F This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #154

                          It is possible if you get something like an nvidia shield tho. But of course not everyone has it or the money for it

                          1 Reply Last reply
                          1
                          • T [email protected]

                            What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                            I’m wondering what to use and I’m pretty beginner at this

                            S This user is from outside of this forum
                            S This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #155

                            for me the easiest option was to set up tailscale on the server or network where jellyfin runs and then on the client/router where you want to watch the stream.

                            T F 2 Replies Last reply
                            16
                            • E [email protected]

                              lemm.ee :'''(

                              G This user is from outside of this forum
                              G This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #156

                              Oh no! I didn't realise , any other options that are good ?

                              1 Reply Last reply
                              1
                              • T [email protected]

                                What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                I’m wondering what to use and I’m pretty beginner at this

                                S This user is from outside of this forum
                                S This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #157

                                I use a VPS and a wiregusrd tunnel.

                                https://codeberg.org/skjalli/jellyfin-vps-setup

                                epicfailguy@lemmy.worldE 1 Reply Last reply
                                4
                                • S [email protected]

                                  for me the easiest option was to set up tailscale on the server or network where jellyfin runs and then on the client/router where you want to watch the stream.

                                  T This user is from outside of this forum
                                  T This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #158

                                  This is what I do as well. Works super well

                                  1 Reply Last reply
                                  2
                                  • oyzmo@lemmy.worldO [email protected]

                                    Wow, a "for dummies" guide for doing all this would be great 😊 know of any?

                                    vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                    vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #159

                                    I figured infodump style was a bit easier for me at the time so anyone could take anything I namedropped and go search to their heart's content.

                                    1 Reply Last reply
                                    1
                                    • umbrella@lemmy.mlU [email protected]

                                      .

                                      D This user is from outside of this forum
                                      D This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #160

                                      I've recently been working on my own server and a lot of this stuff can be accomplished by just chatting with chatgpt/gemini or any ai agent of your choosing.
                                      One thing to note tho is that they have some outdated information due to their training data so you might have to cross reference with the documentation.

                                      Use docker as much as you can, this will isolate the process so even if somehow you get hacked, the visibility the hackers get into your server is limited to the docker container.

                                      1 Reply Last reply
                                      0
                                      • F [email protected]

                                        I think my approach is probably the most insane one, reading this thread…

                                        So the only thing I expose to the public internet is a homemade reverse proxy application which supports both form based and basic authentication. The only thing anonymous users have access to is the form login page. I’m on top of security updates with its dependencies and thus far I haven’t had any issues, ever. It runs in a docker container, on a VM, on Proxmox. My Jellyfin instance is in k8s.

                                        My mum wanted to watch some stuff on my Jellyfin instance on her Chromecast With Google TV, plugged into her ancient Dumb TV. There is a Jellyfin Android TV app. I couldn’t think of a nice way to run a VPN on Android TV or on any of her (non-existent) network infra.

                                        So instead I forked the Jellyfin Android TV app codebase. I found all the places where the API calls are made to the backend (there are multiple). I slapped in basic auth credentials. Recompiled the app. Deployed it to her Chromecast via developer mode.

                                        Solid af so far. I haven’t updated Jellyfin since then (6 months), but when I need to, I’ll update the fork and redeploy it on her Chromecast.

                                        couldbealeotard@lemmy.worldC This user is from outside of this forum
                                        couldbealeotard@lemmy.worldC This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by
                                        #161

                                        Clever, but very hands on

                                        F 1 Reply Last reply
                                        6
                                        • couldbealeotard@lemmy.worldC [email protected]

                                          Clever, but very hands on

                                          F This user is from outside of this forum
                                          F This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by
                                          #162

                                          VERY hands on, wouldn’t recommend it haha.

                                          But that’s the beauty of open source. You CAN do it

                                          1 Reply Last reply
                                          9
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups