

It’s been quite a while since I’ve messed with Yunohost, so memory is a bit sketchy.
Incessant tinkerer since the 70’s. Staunch privacy advocate. SelfHoster. Musician of mediocre talent. https://soundcloud.com/hood-poet-608190196


It’s been quite a while since I’ve messed with Yunohost, so memory is a bit sketchy.
SimplePush and Kuma


change the default SSH port
I run most everything on a nonstandard port if I can get away with it. However, a bot scan of your server will reveal everything about the ports on your server.
There are literally tons of ways to skin the security cat and you’ll probably hear a ton of them mentioned. Personally, I use the evil Cloudflare Tunnels/Zero Trust with Tailscale as an overlay on the server and on the standalone pFsense firewall. Cloudflare Tunnels/Zero Trust there is no need to fiddle with NAT, closing/opening ports, etc. Install it on the server, and it takes care of the rest. You will need a FQDN which you can change the nameservers to the ones Cloudflare will assign. The free tier is more than generous and covers a lot of ground as far as security.
Disable root ssh access completely
You can, and this ties in with nonstandard ssh port, use key pairs.
Scan your machine and ensure no extra ports are open
Lynis is a great way to get a handle on what needs to be done to your server as far as hardening it. Run a scan, in a few minutes it will spit out a list of things that need attention. Not all of the recommendations will be applicable to your server.
You can always use host allow/host deny to really tighten things up. The only users that will have critical access are the ones you assign in the config.
Fail2ban is effective, along with Crowdsec, Wazuh, etc
There are plenty of others. Those just come to mind


I’ve been using LinkWarden for a long time now. I also use Readeck for ‘read it later’ kind of data but it could be used to bookmark. I use Karakeep for archiving. I have not tried Betula, Linkwallet, Nextcloud Bookmarks, Postmarks, or xBrowserSync.


+1 for OliveTin


I’ve been using Cloudflare’s Tunnel/Zero Trust for a while now and I find it does the job just jammy. I’m not sure I need Mesh, but I will at least familiarize myself with it.
+1 for Nessus - pretty comprehensive scans


In as much as I rail against regulation, or more so…over regulation, AI needs some heavy regulation. We stand at the crossroads of a very useful tool that is unfortunately hung up in the novelty stage of pretty pictures and AI rice cookers. It could be so much more. I use AI in a few things. For one, I use AI to master the music I create. I am clinically deaf, so there are frequencies that I just can’t hear well enough to make a call. So, I lean on AI to do that, and it does it quite well actually. I use AI to solve small programming issues I’m working on, but I wouldn’t dare release anything I’ve done, AI or not, because I can always see some poor chap who used my ‘code’, and now smoke is billowing out of his computer. It’s also pretty damn good at compose files. I’ve read about medical uses that sound very efficient in ingesting tons of patient records and reports and pinpointing where services could do better in aiding the patient so that people don’t fall through the cracks and get the medical treatment they need. So, it has some great potential if we could just get some regulation and move past this novelty stage.
https://lemmy.world/post/45508262/23179666
ETA: I know what opnsense is, I have never used it so I am unaware of all of the packages it can run.
DNSBL and filter lists. You can use PfBlockerNG to import abuse lists, botnets, known open relays which reduce spam. You can also apply GeoIP blocklists to upstream SMTP hosts.
Are you serving from a homelab or VPS? If a homelab, then you could use pFsense to filter spam. I don’t run my own email server but I do use pFsense to filter 95% of the junk from my inbox. I’m not sure how you’d accomplish that on a VPS other than employing some type of spam filtering software.
I’ve installed MX before, but I’m not sure why you would want to make a server out of it. I guess it’s possible, but it seems to me with all the hoops you’re going to have to jump through, why (not) use an OS built to be a server and be done with it?
LubeLogger
Otherwise known as the Diddy. Gotta keep the Astroglide in stock.


I keep it simple, although reading down through the thread, there are some really nice and ingenious ways people accomplish about the same thing, which is totally awesome. I use a WatchTower fork and run it with --run-once --cleanup. I do this when I feel comfortable that all the early adopters have done all the beta testing for me. Thanks early adopters. So, about 1 a month or so, I update 70 Docker containers. As far as OS updates, I usually hit those when they deploy. I’m running Ubuntu Jammy, so not a lot of breaking changes in updates. I don’t have public facing services, and I am the only user on my network, so I don’t really have to worry too much about that aspect.
RAM: https://www.memorystock.com/
Not EU, but I have used them for years and never had an issue with any of my purchases.


The real issue is all the misinformation in the text
Initially, it didn’t seem as if most weren’t focusing on that. It was the fact that AI was involved…somehow, which prompted my tongue in cheek ‘delete the em dashes’ comment. If there is misinformation, like the opensource of AI, sure by all means, point that out. I mean, unless the mods make a ‘no-AI rule’ which would seem almost impossible to determine with a bit of rewording and editing of an AI generated text, then they will come. It didn’t seem to fit into the ‘low-effort’ rule. So, I wonder what would happen if no one responded and just ignored the thread until the mods made a decision. I scroll right by plenty of threads. A good tongue lashing by the users here doesn’t seem effective at all.
I’d say chances this is a person from Japan is slim to none.
I have no way to confirm that. On the internet, no one knows I’m a horse. Hell, even in real life, you really never know a person. You just know what they let you know.
https://mtlynch.io/claude-code-found-linux-vulnerability/?ref=selfh.st
Pretty interesting.
OP, I forgot I had made a post about my setup. So, for what it’s worth, this is what and how I run my network:
https://lemmy.world/post/43533409