Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Jellyfin over the internet

Jellyfin over the internet

Scheduled Pinned Locked Moved Selfhosted
selfhosted
263 Posts 144 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F [email protected]

    I used to do all the things mentioned here. Now, I just use Wireguard. If a family member wants to use a service, they need Wireguard. If they don't want to install it, they dont get the service.

    M This user is from outside of this forum
    M This user is from outside of this forum
    [email protected]
    wrote last edited by
    #182

    Came here to say this. I use wireguard and it simply works.

    1 Reply Last reply
    4
    • C [email protected]

      The issue is not encryption, it's the unauthenticated API. People can interact with your server without an account.

      F This user is from outside of this forum
      F This user is from outside of this forum
      [email protected]
      wrote last edited by
      #183

      Specifically these issues: https://github.com/jellyfin/jellyfin/issues/5415

      The big one is that video/audio playing endpoints can be used without authentication. However, you have to guess a UUID. If Jellyfin is using UUIDv4 (fully random), then this shouldn't be an issue; the search space is too big. However, many of the other types of UUIDs could hypothetically be enumerated through brute force. I'm not sure what Jellyfin uses for UUIDs.

      maggiwuerze@feddit.orgM 1 Reply Last reply
      2
      • _cryptagion@lemmy.dbzer0.com_ [email protected]

        My go to secure method is just putting it behind Cloudflare so people can’t see my IP, same as every other service. Nobody is gonna bother wasting time hacking into your home server in the hopes that your media library isn’t shit, when they can just pirate any media they want to watch themselves with no effort.

        E This user is from outside of this forum
        E This user is from outside of this forum
        [email protected]
        wrote last edited by
        #184

        Nobody is gonna bother wasting time hacking into your home server

        They absolutely will lol. It’s happening to you right now in fact. It’s not to consume your media, it’s just a matter of course when you expose something to the internet publicly.

        _cryptagion@lemmy.dbzer0.com_ A dbtng@eviltoast.orgD 3 Replies Last reply
        13
        • T [email protected]

          What’s your go too (secure) method for casting over the internet with a Jellyfin server.

          I’m wondering what to use and I’m pretty beginner at this

          E This user is from outside of this forum
          E This user is from outside of this forum
          [email protected]
          wrote last edited by [email protected]
          #185

          If you’re a beginner and you’re looking for the most secure way with least amount of effort, just VPN into your home network using something like WireGuard, or use an off the shelf mesh vpn like Tailscale to connect directly to your JF server. You can give access to your VPN to other people to use. Tailscale would be the easiest to do this with, but if you want to go full self-hosted you can do it with WireGuard if you’re willing to put in a little extra leg work.

          What I’ve done in the past is run a reverse proxy on a cloud VPS and tunnel that to the JF server. The cloud VPS acts as a reverse proxy and a web application firewall which blocks common exploits, failed connection attempts etc. you can take it one step beyond that if you want people to authenticate BEFORE they reach your server by using an oauth provider and whatever forward Auth your reverse proxy software supports.

          1 Reply Last reply
          11
          • E [email protected]

            Nobody is gonna bother wasting time hacking into your home server

            They absolutely will lol. It’s happening to you right now in fact. It’s not to consume your media, it’s just a matter of course when you expose something to the internet publicly.

            _cryptagion@lemmy.dbzer0.com_ This user is from outside of this forum
            _cryptagion@lemmy.dbzer0.com_ This user is from outside of this forum
            [email protected]
            wrote last edited by
            #186

            No, people are probing it right now. But looking at the logs, nobody has ever made it through. And I run a pretty basic setup, just Cloudflare and Authelia hooking into an LDAP server, which powers Jellyfin. Somebody who invests a little more time than me is probably a lot safer. Tailscale is nice, but it’s overkill for most people, and the majority of setups I see posted here are secure enough to stop any random scanning that happens across them, if not dedicated attention.

            E 1 Reply Last reply
            4
            • E [email protected]

              Nobody is gonna bother wasting time hacking into your home server

              They absolutely will lol. It’s happening to you right now in fact. It’s not to consume your media, it’s just a matter of course when you expose something to the internet publicly.

              A This user is from outside of this forum
              A This user is from outside of this forum
              [email protected]
              wrote last edited by
              #187

              What a bunch of B's. Sure your up gets probed it's happening to every ipv4 address all the time. But that is not hacking.

              E 1 Reply Last reply
              6
              • S [email protected]

                I host it publicly accessible behind a proper firewall and reverse proxy setup.

                If you are only ever using Jellyfin from your own, wireguard configured phone, then that's great; but there's nothing wrong with hosting Jellyfin publicly.

                I think one of these days I need to make a "myth-busting" post about this topic.

                A This user is from outside of this forum
                A This user is from outside of this forum
                [email protected]
                wrote last edited by
                #188

                Same for me. But according to everyone I should be destroyed.

                1 Reply Last reply
                7
                • W [email protected]

                  and a local reverse proxy that can route through wireguard when you want to watch on a smart tv.

                  its not as complicated as it sounds, it's just a wireguard client, and a reverse proxy like on the main server.

                  it can even be your laptop, without hdmi cables

                  A This user is from outside of this forum
                  A This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #189

                  How would you do this off network?

                  W 1 Reply Last reply
                  0
                  • N [email protected]

                    I would not publicly expose ssh. Your home IP will get scanned all the time and external machines will try to connect to your ssh port.

                    A This user is from outside of this forum
                    A This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #190

                    Ssh has nothing to do with scanning. Your IP and everyone else up is being scanned constantly. In ipv4 space at least.

                    1 Reply Last reply
                    0
                    • _cryptagion@lemmy.dbzer0.com_ [email protected]

                      No, people are probing it right now. But looking at the logs, nobody has ever made it through. And I run a pretty basic setup, just Cloudflare and Authelia hooking into an LDAP server, which powers Jellyfin. Somebody who invests a little more time than me is probably a lot safer. Tailscale is nice, but it’s overkill for most people, and the majority of setups I see posted here are secure enough to stop any random scanning that happens across them, if not dedicated attention.

                      E This user is from outside of this forum
                      E This user is from outside of this forum
                      [email protected]
                      wrote last edited by [email protected]
                      #191

                      No, they are actively trying to get in right now. If you have Authelia exposed they’re brute forcing it. They’re actively trying to exploit vulnerabilities that exist in whatever outwardly accessible software you’re exposing is, and in many cases also in software you’re not even using in scattershot fashion. Cloudflare is blocking a lot of the well known CVEs for sure, so you won’t see those hit your server logs. If you look at your Authelia logs you’ll see the login attempts though. If you connect via SSH you’ll see those in your server logs.

                      You’re mitigating it, sure. But they are absolutely 100% trying to get into your server right now, same as everyone else. There is no consideration to whether you are a self hosted or a Fortune 500 company.

                      _cryptagion@lemmy.dbzer0.com_ 1 Reply Last reply
                      9
                      • A [email protected]

                        What a bunch of B's. Sure your up gets probed it's happening to every ipv4 address all the time. But that is not hacking.

                        E This user is from outside of this forum
                        E This user is from outside of this forum
                        [email protected]
                        wrote last edited by [email protected]
                        #192

                        Anything you expose to the internet publicly will be attacked, just about constantly. Brute force attempts, exploit attempts, the whole nine. It is a ubiquitous and fundamental truth I’m afraid. If you think it’s not happening to you, you just don’t know enough about what you’re doing to realize.

                        You can mitigate it, but you can’t stop it. There’s a reason you’ll hear terms like “attack surface” used when discussing this stuff. There’s no “if” factor when it comes to being attacked. If you have an attack surface, it is being attacked.

                        meltedcheese@c.imM M 2 Replies Last reply
                        11
                        • E [email protected]

                          Anything you expose to the internet publicly will be attacked, just about constantly. Brute force attempts, exploit attempts, the whole nine. It is a ubiquitous and fundamental truth I’m afraid. If you think it’s not happening to you, you just don’t know enough about what you’re doing to realize.

                          You can mitigate it, but you can’t stop it. There’s a reason you’ll hear terms like “attack surface” used when discussing this stuff. There’s no “if” factor when it comes to being attacked. If you have an attack surface, it is being attacked.

                          meltedcheese@c.imM This user is from outside of this forum
                          meltedcheese@c.imM This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #193

                          @EncryptKeeper That’s my experience. Zombied home computers are big business. The networks are thousands of computers. I had a hacker zombie my printer(!) maybe via an online fax connection and it/they then proceeded to attack everything else on my network. One older machine succumbed before I could lock everything down.

                          1 Reply Last reply
                          3
                          • vanilla_puddinfudge@infosec.pubV [email protected]

                            Jellyfin isn't secure and is full of holes.

                            That said, here's how to host it anyway.

                            1. Wireguard tunnel, be it tailscale, netbird, innernet, whatever
                            2. A vps with a proxy on it, I like Caddy
                            3. A PC at home with Jellyfin running on a port, sure, 8096

                            If you aren't using Tailscale, make your VPS your main hub for whatever you choose, pihole, wg-easy, etc. Connect the proxy to Jellyfin through your chosen tunnel, with ssl, Caddy makes it easy.

                            Since Jellyfin isn't exactly secure, secure it. Give it its own user and make sure your media isn't writable by the user. Inconvenient for deleting movies in the app, but better for security.

                            more...

                            Use fail2ban to stop intruders after failed login attempts, you can force fail2ban to listen in on jellyfin's host for failures and block ips automatically.

                            More!

                            Use Anubis and yes, I can confirm Anubis doesn't intrude Jellyfin connectivity and just works, connect it to fail2ban and you can cook your own ddos protection.

                            MORE!

                            SELinux. Lock Jellyfin down. Lock the system down. It's work but it's worth it.

                            I SAID MORE!

                            There's a GeoIP blocking plugin for Caddy that you can use to limit Jellyfin's access to your city, state, hemisphere, etc. You can also look into whitelisting in Caddy if everyone's IP is static. If not, ddns-server and a script to update Caddy every round? It can get deep.

                            Again, don't do any of this and just use Jellyfin over wireguard like everyone else does(they don't).

                            L This user is from outside of this forum
                            L This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #194

                            show me those “holes” this is just fear mongering

                            vanilla_puddinfudge@infosec.pubV 1 Reply Last reply
                            4
                            • S [email protected]

                              So I’m another newbie dummy to reverse proxies. I’ve got my jellyfin accessible at jellyfin.mydomain.com but I can only access it through the web. How do I share with other people who want to use the apps? I can’t get my apps to find my instance.

                              pory@lemmy.worldP This user is from outside of this forum
                              pory@lemmy.worldP This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #195

                              Can "your apps" access it when their device isn't on your home LAN?

                              S 1 Reply Last reply
                              0
                              • T [email protected]

                                What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                I’m wondering what to use and I’m pretty beginner at this

                                R This user is from outside of this forum
                                R This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #196

                                Cloudflare. No public exposure to the internet.

                                B 1 Reply Last reply
                                7
                                • L [email protected]

                                  show me those “holes” this is just fear mongering

                                  vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                  vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by [email protected]
                                  #197

                                  Here, since you can't use a search engine: https://www.cvedetails.com/vulnerability-list/vendor_id-22884/product_id-81332/Jellyfin-Jellyfin.html

                                  More, because I've been around this lap before, you'll ask for more and not believe that one, here's another: https://www.cvedetails.com/vulnerability-list/vendor_id-22884/product_id-81332/Jellyfin-Jellyfin.html

                                  Do what you want. Idgaf about your install, just mine.

                                  O 1 Reply Last reply
                                  1
                                  • E [email protected]

                                    No, they are actively trying to get in right now. If you have Authelia exposed they’re brute forcing it. They’re actively trying to exploit vulnerabilities that exist in whatever outwardly accessible software you’re exposing is, and in many cases also in software you’re not even using in scattershot fashion. Cloudflare is blocking a lot of the well known CVEs for sure, so you won’t see those hit your server logs. If you look at your Authelia logs you’ll see the login attempts though. If you connect via SSH you’ll see those in your server logs.

                                    You’re mitigating it, sure. But they are absolutely 100% trying to get into your server right now, same as everyone else. There is no consideration to whether you are a self hosted or a Fortune 500 company.

                                    _cryptagion@lemmy.dbzer0.com_ This user is from outside of this forum
                                    _cryptagion@lemmy.dbzer0.com_ This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #198

                                    No, they are actively trying to get in right now. If you have Authelia exposed they’re brute forcing it.

                                    No, they aren't. Just to be sure, I just checked it, and out of the over 2k requests made to the Authelia login page in the last 24 hours, none have made it to the login page itself. You don't know jack shit about what's going on in another persons network, so I'm not sure why you're acting like some kind of expert.

                                    E 1 Reply Last reply
                                    5
                                    • T [email protected]

                                      What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                      I’m wondering what to use and I’m pretty beginner at this

                                      ohshit604@sh.itjust.worksO This user is from outside of this forum
                                      ohshit604@sh.itjust.worksO This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by [email protected]
                                      #199

                                      “Technically” my jellyfin is exposed to the internet however, I have Fail2Ban setup blocking every public IP and only whitelisting IP’s that I’ve verified.

                                      I use GeoBlock for the services I want exposed to the internet however, I should also setup Authelia or something along those lines for further verification.

                                      Reverse proxy is Traefik.

                                      1 Reply Last reply
                                      5
                                      • M [email protected]

                                        Your comment got me looking through the jellyfin github issues. Are the bugs listed for unauthenticated endpoints what you're referencing? It looks like the 7 open mention being able to view information about the jellyfin instance or view the media itself. But this is just what was commented as possible, there could be more possibilities especially if combined with other vulnerabilities.

                                        Now realizing there are parts of Jellyfin that are known to be accessible without authentication, I'm thinking Fail2ban is going to do less but unless there are ways to do injection with the known bugs/a new 0day they will still need to brute force a password to be able to make changes. I'm curious if there is anything I'm overlooking.

                                        R This user is from outside of this forum
                                        R This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by
                                        #200

                                        unless there are ways to do injection with the known bugs/a new 0day

                                        TBH, that should be enough right here. That is a JUICY target for hacking.

                                        You can tell outside that someone is running JF.

                                        You know what packages are used.

                                        You have full access to the source.

                                        You know what endpoints are exposed and available.

                                        All you need is a whole in ffmpeg, a codec, a scaler, or something in libAV. There are a hundred different projects in there from everyone and their brother. And all somebody with experience needs is one of them to have an exploit in a spot where you can send it a payload through an endpoint that doesn't require authentication.

                                        We need something to gatekeep. Some form of firewall knocking, or VPN. We don't need JF to be as publicly accessible as Netflix; we just need a way for our friends and family to get in, prove they're who they are, and reject all anonymous traffic.

                                        1 Reply Last reply
                                        0
                                        • _cryptagion@lemmy.dbzer0.com_ [email protected]

                                          No, they are actively trying to get in right now. If you have Authelia exposed they’re brute forcing it.

                                          No, they aren't. Just to be sure, I just checked it, and out of the over 2k requests made to the Authelia login page in the last 24 hours, none have made it to the login page itself. You don't know jack shit about what's going on in another persons network, so I'm not sure why you're acting like some kind of expert.

                                          E This user is from outside of this forum
                                          E This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by [email protected]
                                          #201

                                          Yes they are. The idea that they’re not would be a statistical wonder.

                                          2k requests made to the Authelia login page in the last 24 hours

                                          Are you logging into your Authelia login page 2k times a day? If not, I suspect that some (most) of those are malicious lol.

                                          You don't know jack shit about what's going on in another persons network

                                          It’s the internet, not your network. And I’m well aware of how the internet works. What you’re trying to argue here is like arguing that there’s no possible way that I know your part of the earth revolves around the sun. Unless you’re on a different internet from the rest of us, you’re subject to the same behavior. I mean I guess I didn’t ask if you were hosting your server in North Korea but since you’re posting here, I doubt it.

                                          I'm not sure why you're acting like some kind of expert

                                          Well I am an expert with over a decade of experience in cybersecurity, but I’m not acting like an expert here, I’m acting like somebody with at least a rudimentary understanding of how these things work.

                                          _cryptagion@lemmy.dbzer0.com_ 1 Reply Last reply
                                          6
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups