Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Jellyfin over the internet

Jellyfin over the internet

Scheduled Pinned Locked Moved Selfhosted
selfhosted
258 Posts 143 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T [email protected]

    I’m fidgeting with Tailscale right now, only to stream on a AppleTV at a friend house. So far no luck but that’s not me that set up Infuse, so could be an operator error on my friend part

    H This user is from outside of this forum
    H This user is from outside of this forum
    [email protected]
    wrote last edited by
    #37

    I tried tailscale first but to be honest wasn't a fan. I moved to Twingate and found it much simpler to set up

    T 1 Reply Last reply
    2
    • H [email protected]

      I tried tailscale first but to be honest wasn't a fan. I moved to Twingate and found it much simpler to set up

      T This user is from outside of this forum
      T This user is from outside of this forum
      [email protected]
      wrote last edited by
      #38

      Will look into it, thanks !

      1 Reply Last reply
      1
      • T [email protected]

        What’s your go too (secure) method for casting over the internet with a Jellyfin server.

        I’m wondering what to use and I’m pretty beginner at this

        alk@sh.itjust.worksA This user is from outside of this forum
        alk@sh.itjust.worksA This user is from outside of this forum
        [email protected]
        wrote last edited by
        #39

        SWAG reverse proxy with a custom domain+subdomain, protected by authentik and fail2ban. Easy access from anywhere once it's set up. No vpn required, just type in the short subdomain.domain.com and sign in (or the app keeps me signed in)

        T I 2 Replies Last reply
        2
        • H [email protected]

          Use a reverse proxy (caddy or nginx proxy manager) with a subdomain, like myservice.mydomain.com (maybe even configure a subdir too, so …domain.com/guessthis/). Don’t put anything on the main domain / root dir / the IP address.

          If you’re still unsure setup Knockd to whitelist only IP addresses that touch certain one or two random ports first.

          So security through obscurity 🙂 But good luck for the bots to figure all that out.

          VPN is of course the actually secure option, I’d vote for Tailscale.

          alk@sh.itjust.worksA This user is from outside of this forum
          alk@sh.itjust.worksA This user is from outside of this forum
          [email protected]
          wrote last edited by
          #40

          I kept the main domain open, but redirected it to a rickroll

          H 1 Reply Last reply
          1
          • T [email protected]

            What’s your go too (secure) method for casting over the internet with a Jellyfin server.

            I’m wondering what to use and I’m pretty beginner at this

            G This user is from outside of this forum
            G This user is from outside of this forum
            [email protected]
            wrote last edited by
            #41

            I rent a cheap $5/mo VPS and use it to run a wireguard server with wgeasy and nginx proxy manager. Everything else runs on my home server connected by wireguard.

            B M T 3 Replies Last reply
            8
            • alk@sh.itjust.worksA [email protected]

              SWAG reverse proxy with a custom domain+subdomain, protected by authentik and fail2ban. Easy access from anywhere once it's set up. No vpn required, just type in the short subdomain.domain.com and sign in (or the app keeps me signed in)

              T This user is from outside of this forum
              T This user is from outside of this forum
              [email protected]
              wrote last edited by
              #42

              That’s probably this type of setup I would want but I miss the technical know how, so if you have a cool beginner guide

              alk@sh.itjust.worksA 2 Replies Last reply
              1
              • T [email protected]

                I’ll try looking into that

                kingthrillgore@lemmy.mlK This user is from outside of this forum
                kingthrillgore@lemmy.mlK This user is from outside of this forum
                [email protected]
                wrote last edited by
                #43

                Just remember to test with something better than your phone, T-Mobile aggressively filters VPNs. Try a coffee shop.

                T 1 Reply Last reply
                0
                • T [email protected]

                  What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                  I’m wondering what to use and I’m pretty beginner at this

                  N This user is from outside of this forum
                  N This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #44

                  I don't use jellyfin but my general approach is either:

                  1. Expose it over a VPN only. I usually use Tailscale for this so that I can expose individual machines but you do you
                  2. Cloudflare tunnel that exposes a single port on a single internal machine to a subdomain I own

                  There are obviously ways to do this all on your own but... if you are asking this question you probably want to use one of those to roll it. Because you can leave yourself ridiculously vulnerable if you do it yourself.

                  T 1 Reply Last reply
                  3
                  • andrew@mnstdn.monsterA [email protected]

                    Nobody here with a tailscale funnel?? It's such a simple way to get https access from anywhere without being on the tailnet.

                    W This user is from outside of this forum
                    W This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #45

                    Is the funnel URL accessible by everyone who knows it? I.e what are the chances someone finds the URL and gets access to it?

                    1 Reply Last reply
                    0
                    • kingthrillgore@lemmy.mlK [email protected]

                      Just remember to test with something better than your phone, T-Mobile aggressively filters VPNs. Try a coffee shop.

                      T This user is from outside of this forum
                      T This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #46

                      Not in the US, most providers are asshole-y but seems less asshole that T-Mobile

                      1 Reply Last reply
                      1
                      • N [email protected]

                        I don't use jellyfin but my general approach is either:

                        1. Expose it over a VPN only. I usually use Tailscale for this so that I can expose individual machines but you do you
                        2. Cloudflare tunnel that exposes a single port on a single internal machine to a subdomain I own

                        There are obviously ways to do this all on your own but... if you are asking this question you probably want to use one of those to roll it. Because you can leave yourself ridiculously vulnerable if you do it yourself.

                        T This user is from outside of this forum
                        T This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #47

                        That’s my feeling too

                        S 1 Reply Last reply
                        0
                        • T [email protected]

                          What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                          I’m wondering what to use and I’m pretty beginner at this

                          L This user is from outside of this forum
                          L This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #48

                          no idea how safe or secure but i use cloudflare tunnel to point my jellyfin port on my computer

                          stopspazzing@lemmy.worldS 1 Reply Last reply
                          1
                          • N [email protected]

                            I would not publicly expose ssh. Your home IP will get scanned all the time and external machines will try to connect to your ssh port.

                            F This user is from outside of this forum
                            F This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #49

                            Change the port it runs on to be stupid high and they won't bother.

                            C 1 Reply Last reply
                            4
                            • T [email protected]

                              I’m fidgeting with Tailscale right now, only to stream on a AppleTV at a friend house. So far no luck but that’s not me that set up Infuse, so could be an operator error on my friend part

                              ladfrombrad@lemdro.idL This user is from outside of this forum
                              ladfrombrad@lemdro.idL This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #50

                              The way I do it for a family member with Tailscale is them having a couple of boxes down there (n100 with their Jellyfin server, and a RPI4 with a TVHServer) with my Tailnet signed in, and those boxes running both a "subnet router" and an "exit node"that both me and said fam member can use.

                              This means she has permissions to use the exit node wherever like I do to my own local LAN, to connect to her LAN and access things locally since you can assign them via the ACL's / device perms.

                              I know reading docs can suck sometimes but honest to god the ones that Tailscale put up are pretty awesome.

                              https://tailscale.com/kb

                              Along with all the YT videos about it I didn't even have to go nagging on forums to get it to work, and that's a general first for me.

                              1 Reply Last reply
                              2
                              • T [email protected]

                                That’s my feeling too

                                S This user is from outside of this forum
                                S This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #51

                                I would look into Tailscale based on your responses here. I don’t know what your use case is exactly but you set TS up on your server and then again on your phone/laptop and you can connect them through the vpn directly. No extra exposed ports or making a domain or whatnot.

                                If you want other people to access the server they will need to make a TS account and you can authorize them.

                                1 Reply Last reply
                                1
                                • T [email protected]

                                  What’s your go too (secure) method for casting over the internet with a Jellyfin server.

                                  I’m wondering what to use and I’m pretty beginner at this

                                  jraccoon@discuss.tchncs.deJ This user is from outside of this forum
                                  jraccoon@discuss.tchncs.deJ This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by [email protected]
                                  #52

                                  I see everyone in this thread recommending a VPN or reverse proxy for accessing Jellyfin from outside the LAN. While I generally agree, I don't see a realistic risk in exposing Jellyfin directly to the internet. It supports HTTPS and certificates nowadays, so there’s no need for outside SSL termination anymore. (See Edit 2)

                                  In my setup, which I've been running for some time, I've port-forwarded only Jellyfin's HTTPS port to eliminate the possibility of someone ending up on pure HTTP and sending credentials unencrypted. I've also changed the Jellyfin's default port to a non-standard one to avoid basic port-scanning bots spamming login attempts. I fully understand that this falls into the security through obscurity category, but no harm in it either.

                                  Anyone wanna yell at me for being an idiot and doing everything wrong? I'm genuinely curious, as the sentiment online seems to be that at least a reverse proxy is almost mandatory for this kind of setup, and I'm not entirely sure why.

                                  Edit: Thank you everyone for your responses. While I don't agree with everything, the new insight is appreciated.

                                  Edit 2: I've been informed that infact the support for HTTPS will be removed in a future version. From v10.11 release notes:

                                  Deprecation Notice: Jellyfin’s internal handling of TLS/SSL certificates and configuration in the web server will be removed in a future version. No changes to the current system have been made in 10.11, however future versions will remove the current system and instead will provide advanced instructions to configure the Kestrel webserver directly for this relatively niche usecase. We strongly advise anyone using the current TLS options to use a Reverse Proxy for TLS termination instead if at all possible, as this provides a number of benefits

                                  B E anonion@lemmy.anonion.socialA F M 11 Replies Last reply
                                  27
                                  • G [email protected]

                                    I rent a cheap $5/mo VPS and use it to run a wireguard server with wgeasy and nginx proxy manager. Everything else runs on my home server connected by wireguard.

                                    B This user is from outside of this forum
                                    B This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #53

                                    This is 99% my setup, just with a traefik container attached to my wifeguard container.

                                    Can recommend especially because I can move apartments any time, not care about CGNAT (my current situation which I predicted would be the case), and easily switch to any backup by sticking my boxes on any network with DHCP that can reach the Internet (like a 4G hotspot or a nanobeam pointed at a public wifi down the road) in a pinch without reconfiguring anything.

                                    1 Reply Last reply
                                    0
                                    • L [email protected]

                                      no idea how safe or secure but i use cloudflare tunnel to point my jellyfin port on my computer

                                      stopspazzing@lemmy.worldS This user is from outside of this forum
                                      stopspazzing@lemmy.worldS This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #54

                                      Someone mentioned above that cloudflare will ban you for streaming through their tunnel. Just be warned.

                                      1 Reply Last reply
                                      1
                                      • T [email protected]

                                        I’ve look a little on it, didn’t understand most of it. I’m looking for a comprehensive beginner guide before going foward

                                        wreckedcarzz@lemmy.worldW This user is from outside of this forum
                                        wreckedcarzz@lemmy.worldW This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by [email protected]
                                        #55

                                        This isn't a guide, but any reverse proxy allows you to limit open ports on your network (router) by using subdomains (thisPart.website.com) to route connections to an internal port.

                                        So you setup a rev proxy for jellyfin.website.com that points to the port that jf wants to use. So when someone connects to the subdomain, the reverse proxy is hit, and it reads your configuration for that subdomain, and since it's now connected to your internal network (via the proxy) it is routed to the port, and jf "just works".

                                        There's an ssl cert involved but that's the basic understanding. Then you can add Some Other Services at whatever.website.com and rinse and repeat. Now you can host multiple services, without exposing the open ports directly, and it's easy for users as there is nothing "confusing" like port numbers, IP addresses, etc.

                                        S 1 Reply Last reply
                                        6
                                        • G [email protected]

                                          I rent a cheap $5/mo VPS and use it to run a wireguard server with wgeasy and nginx proxy manager. Everything else runs on my home server connected by wireguard.

                                          M This user is from outside of this forum
                                          M This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by
                                          #56

                                          Is Nginx Proxy Manager running on the VPS itself and then the proxy routes across the wireguard to your home server? Or is the VPS just port forwarding to your home server which runs the proxy?

                                          B G 2 Replies Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups