We have water, heavy water, hydrogen infused water, nitrogen infused water, ice-9, h2o2...what will they think of next?!
Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
FYI I learned About VLANs that it is in no way „locked down“. I can spoof the MAC address of a known device from a specific VLAN and I’m in that VLAN. Yes your devices can’t reach the internet/other devices by default but it won’t stop a bad actor.
and this is why I have a completely separate physical network for my IOT stuff.
Well. The segmentation is to avoid security holes from Rogue third party devices. If you can access my pc vlan that only exists on my wired pcconnection, then you have indeed broken in to my domain. Letting the things that doesn't give a shit about security have their own network is just sanity/sanitary.
Isn't that what 802.1x is for? If you really want to lock down your network, there are options.
Depends on you hw. That seems rather poor implementation.. I believe my TP switch might handle that, because it rejects traffic to its management interface from mac X from vlan 20 because it sees the same mac in vlan 10.. (only vlan 20 is allowed for management)
That’s a very cool feature actually but how does it stop a hacker if he has obtained a trusted MAC address from another device and connect to vlan 20 directly while the real device is offline?
You configure vlans per physical port, so in a properly implemented system your attack won't be possible. When the packet comes to the switch the vlan tag is added to it according to the configuration for the port it was received from.
Or are you talking about mac-vlans?
Ok maybe I don’t fully understand yet. Let’s say an access point has 3 SSIDs, lan, guest and iot each client on each SSID gets a vlan tag accordingly. So it’s only connected to a single physical port, i think that’s what confused me. But SSIDs are interfaces just like an physical port afaik so your analogy still stands. The security here is the WiFi password anything that connects to LAN gets a LAN vlan tag. but it’s not like anything that connects to any of the SSIDs can get the DHCP lease of some random device on any vlan cuz it got tagged before. Or am I missing something?
I'm aware you need a firewall (I used sonicwall professionally) vlans are for segmentation
Yes, VLAN is an IT convenience feature, you don't need it just because it is a feature of the more expensive hardware.
Instead just establish separate L2s and operate proper L3 firewalls between them. For IoT devices, any kind of reliable potato will do just fine.
New kinds of water, you say? The marketing department is already on it and boy have I got news for you!
Wait... Is that heavy water?? /s
How about I hook you up with a brand new water softener on a 30 year lease but no payments in the first 5 years so it’ll be the next owner’s problem
Omfg it's like solar panel companies...
So many damn houses with solar leases more expensive than just electricity
i love it when my vacum makes a remote connction to a other countrye goverment that way i get tracked by mine and theres whatba time we live in
Yeah, companies have abused that to release buggy, incomplete products faster and only make the software stable and feature complete if they make a good profit.
Or add new bloat features / brick devices after updating TOS...
Remote device bricking is cheaper than researching part wear for planned obsolescence.
And both make me go with a different company next time so idk what they think they're gaining.
They gained a cost reduction for a single quarter of a single year. No further thought was put into it.
My house has manual windows, manual locks, and a dumb garage door controller... because I work in IT.
I do have a few smart appliances (environment reporting) but they are only allowed on the banishment VLAN so they don't get to interact with any single appliance inside my network. All they see is internet and nothing else.
The S in IoT stands for security
I was an idiot and bought a high end TPLink router, I can't even use Vlans without signing up for their back door service.
maybe install openwrt/ddwrt?
I was an idiot and bought a high end TPLink router, I can’t even use Vlans without signing up for their back door service.
Hm, at least with their enterprise equipment you can completely disable Omada.
Shit, are consumer appliances really getting that bad? ew!
I'd assume all Chinese devices are being backdoored via CCP incentives. Buy Asus perhaps, assuming Taiwan never gets infiltrated.
Don't buy ASUS, they have a terrible security record. At this point I would trust only MikroTik and Ubiquiti.
Ubiquiti
And they too aggressively push their cloud services and at least some point their management tool gave you ads on their other products.
Yeah. Even my old solid netgear got a firmware update that's begging me to get the app now. Shobe that shit up your ass.
At least give me a checkbox to stop bothering me