This is the only one I seriously doubt.
Really? Almost all of it is wrong.
This is the only one I seriously doubt.
Really? Almost all of it is wrong.
No point talking to you then.
… You’re joking right?
I’m positive that F5’s marketing department knows more than me about security and has not ulterior motive in making you think you’re more secure.
Snark aside, they may do some sort of WAF in addition to being a proxy. Just “adding a proxy” does very little.
They may offer some sort of WAF (web application firewall) that inspects traffic for potentially malicious intent. Things like SQL injection. That’s more than just a proxy though.
Otherwise, they really don’t.
HDDs don’t do well when rotated
The original iPod had an HDD in it. You can rotate HDDs. Sharp impacts may be risky though, especially for a non-laptop drive.
Put your reverse proxy in a DMZ, so that only it is directly facing the intergoogles
So what? I can still access your application through the rproxy. You’re not protecting the application by doing that.
Install a single wildcard cert and easily cover any subdomains you set up
This is a way to do it but not a necessary way to do it. The rproxy has not improved security here. It’s just convenient to have a single SSL endpoint.
There’s even nginx configuration files out there that will block URL’s based on regex pattern matches for suspicious strings. All of this (probably a lot more I’m missing) adds some level of layered security.
If you do that, sure. But that’s not the advice given in this forum is it? It’s “install an rproxy!” as though that alone has done anything useful.
For the most part people in this form seem to think that “direct access to my server” is unsafe but if you simply put a second hop in the chain that now you can sleep easily at night. And bonus points if that rproxy is a VPS or in a separate subnet!
The web browser doesn’t care if the application is behind one, two or three rproxies. If I can still get to your application and guess your password or exploit a known vulnerability in your application then it’s game over.
My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web,
The mapping is helpful but not a security benefit. The latter can be done with a firewall.
Paraphrasing - there is a bunch of stuff you can also do with a reverse proxy
Yes. But that’s no longer just a reverse proxy. The reverse proxy isn’t itself a security tool.
I see a lot of vacuous security advice in this forum. “Install a firewall”, “install a reverse proxy”, etc. This is mostly useless advice. Yes, do those things but they do not add any protection to the service you are exposing.
A firewall only protects you from exposing services you didn’t want to expose (e.g. NFS or some other service running on the same system), and the rproxy just allows for host based routing. In both cases your service is still exposed to the internet. Directly or indirectly makes no significant difference.
What we should be advising people to do is “use a valid ssl certificate, ensure you don’t use any application default passwords, use very good passwords where you do use them, and keep your services and servers up-to-date”.
A firewall allowing port 443 in and an rproxy happily forwarding traffic to a vulnerable server is of no help.
Reverse proxies don’t add security.
I like Subsonic. The interface is a bit dated but it supports multiple users and has excellent android apps.
This is a good approach. I’ve always found it beneficial to learn “the standard things” than relying on a customized setup.
I’ve seen some people absolutely lost when they login to a system without 500 custom aliases on it…
I do. Anyone else when asked simply says “oops, sorry, done”. You pitch a fit and act like it’s a civil rights violation.
What a moron.
It’s not censorship. 🙄
The android nextcloud client works great if you’re willing to setup/maintain a nextcloud server.
IP was invented in the '70s. Sometimes older protocols that work are just fine.
I picked up a second hand monitor from a goodwill shop for like $7USD. It would be worth having a display of some sort for troubleshooting.
Thanks! Updated.
Quick pros/cons from what I’ve read (correct me if I’m wrong - I’ve not used syncthing myself):
syncthing
Pros:
Cons:
Nextcloud
Pros:
Cons:
Do you think webdav somehow dumps you database? No it’s just a protocol to save your files on your webserver. It’s just a middelman.
Umn. It allows the application to do its own synchronization and diff resolution. It’s why they recommend it.
Directory synchronization is a “best effort” to copy files back and forth without considering the application’s needs. Copying database files while they’re being written can be problematic for example.
Both Nextcloud and syncthing will synchronize a folder. And it will probably work if you aren’t making lots of changes on both systems. But there is increased risk.
Yeah it’s my recommendation from my personal experience. Is that wrong?
Yes - absolutely. “I’ve been lucky so far” and recommending against what the product you’re using says you should do is TERRIBLE advice.
The point is, syncthing is rock solid, never had any issue being it with my zotero database or syncing files between my devices. If you’re a Nextcloud advocate or are against my personal opinion so be it :).
Why are you getting defensive towards syncthing? It seems fine. It’s the wrong tool for what you’re using it for.
Go home Mr Stallman.