• 0 Posts
  • 136 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle
  • Like many other security mechanisms VLANs aren’t really about enabling anything that can’t be done without them.

    Instead it’s almost exclusively about FORBIDDING some kinds of interactions that are otherwise allowed by default.

    So if your question is “do I need VLAN to enable any features”, then the answer is no, you don’t (almost certainly, I’m sure there are some weird corner cases and exceptions).

    What VLANs can help you do is stop your PoE camera from talking to your KNX and your Chromecast from talking to your Switch. But why would you want that? They don’t normally talk to each other anyway. Right. That “normally” is exactly the case: one major benefit of having VLANs is not just stopping “normal” phone-homes but to contain any security incidents to as small a scope as possible. Imagine if someone figured out a way to hack your switch (maybe even remotely while you’re out!). That would be bad. What would be worse is if that attacker then suddenly has access to your pihole (which is password protected and the password never flies around your home network unencrypted, right?!) or your PC or your phone …

    So having separate VLANs where each one contains only devices that need to talk to each other can severely restrict the actual impact of a security issue with any of your devices.


  • Since most of those are run commercially and don’t make their data easily accessible, that’ll be a much different process, I assume. You’ll basically have to scrape them like any other web site, except you’ll specifically be targeting the edit/source view pages. Then find a wiki implementation that has as close a syntax as possible to the one they use (that could be tricky …) and upload there. So unless you happen to find some code from someone who wanted to do the exact same thing, I’m afraid this would involve quite some programming/scripting.





  • Increase the attack surface compared to what? If you don’t allow/enable any access to services inside your network from outside, then by definition you have fewer attack surfaces than if you add a VPN to that empty list.

    So trivially the answer is “yes, it adds an attack surface”.

    But what are the alternatives? If you directly expose each individual service on a dedicated port, for example, then you’d add many more (and usually less well hardened) attack surfaces instead.

    So if the comparison is “expose 5 web-based services directly” vs. “expose one VPN like wireguard”, then the second option is almost always the clear winner when it comes to security (and frequently also when it comes to ease of setup as well as comfort).










  • Now you make me feel old. In “the olden days” before streaming of media over the internet was as commonplace as it was now, that was the standard way that tech-savy people consumed media: Either on their PC or with some set-top box with built-in storage. I fondly remember my PopcornHour, which was basically a line of desktop-boxes that ranged from “basically a hard disk, video decoder and HDMI out” all the way to “can automatically rip your BlueRays”.




  • https://lemmy.world/post/12995686 was a recent question and most of the answers will basically be duplicates of that.

    One slight addition I want to add: “Docker” is just one implementation of “OCI containers”. It’s the one that broke through initially in the hype, but you can just as easily use any other (podman being a popular one) and basically all of the benefits that people ascribe to “docker” can be applied to.

    So you might (as I do) have some dislike for docker (the product) and still enjoy running containers.


  • rentar42@kbin.socialtoSelfhosted@lemmy.worldDocker or podman?
    link
    fedilink
    arrow-up
    16
    arrow-down
    1
    ·
    edit-2
    8 months ago

    I personally prefer podman, due to its rootless mode being “more default” than in docker (rootless docker works, but it’s basically an afterthought).

    That being said: there’s just so many tutorials, tools and other resources that assume docker by default that starting with docker is definitely the less cumbersome approach. It’s not that podman is signficantly harder or has many big differences, but all the tutorials are basically written with docker as the first target in mind.

    In my homelab the progression was docker -> rootless docker -> podman and the last step isn’t fully done yet, so I’m currently running a mix of rootless docker and podman.