this post was submitted on 02 Oct 2024
31 points (86.0% liked)

Selfhosted

40198 readers
860 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I’m happily serving a few websites and services publicly. Now I would like to host my Navidrome server, but keep the contents private on the web to stay out of trouble. I’m afraid that when I install a reverse proxy, it’ll take my other stuff ~~online~~ offline and causes me various headaches that I’m not really in the headspace for at the moment. Is there a safe way to go about doing this selectively?

you are viewing a single comment's thread
view the rest of the comments
[–] maxwellfire@lemmy.world 2 points 1 month ago* (last edited 1 month ago) (1 children)

You have two options for setting up https certificates and then some more options for enabling it on the server:

1: you can generate a self signed certificate. This will make an angry scary warning in all browsers and may prevent chrome from connecting at all (I can't remember the status of this). Its security is totally fine if you are the one using the service since you can verify the key is correct

2: you can get a certificate to a domain that you own and then point it at the server. The best way to do this is probably through letsencrypt. This requires owning a domain, but those are like $12 a year, and highly recommended for any services exposed to the world. (You can continue to use a dynamic DNS setup, but you need one that supports custom domains)

Now that you have a certificate you need to know, Does the service your hosting support https directly. If it does, then you install the certificates in it and call it a day. If it doesn't, then this is where a reverse proxy is helpful. You can then setup the reverse proxy to use the certificate with https and then it will connect to the server over http. This is called SSL termination.

There's also the question of certificate renewal if you choose the letsencrypt option. Letsencrypt requires port 80 to do a certificate renewal. If you have a service already running on port 80 (on the router's external side), then you will have a conflict. This is the second case where a reverse proxy is helpful. It can allow two services (letsencrypt certificates renewal and your other service) to run on the same external port. If you don't need port 80, then you don't need it. I guess you could also setup a DNS based certificate challenge and avoid this issue. That would depend on your DNS provider.

So to summarize:

IF service doesn't support SSL/https OR (want a letsencrypt certificate AND already using port 80)

Then use a reverse proxy (or maybe do DNS challenge with letsencrypt instead)

ELSE:

You don't need one, but can still use one.

[–] FarraigePlaisteach@lemmy.world 1 points 1 month ago

Thank you again for the response. The summary is very helpful too.

It looks like I don’t need the reverse proxy, since the sensitive services* support authentication and HTTPS.

I would need the lighttpd service to be available over unsecured HTTP too, but if that’s not possible I could always use a different subdomain.

  • A small music and film library