Why tip someone for doing the their job?
Why tip someone for doing the their job?
I constantly hear this but I just want to be the counter argument here.
Self hosting email is not the impossible tasks that people make it out to be. It is on the more advanced side of things though if you are hosting your primary email that you rely on.
I’ve been hosting my own email forany years now and have had no issues whatsoever but I also have years of experience and know how email works better than many that have no interest in such.
I would NOT recommended starting your self hosting journey with email but I will never discourage people from doing it.
Take your time. Ask questions any time you don’t understand something. Be ready to learn a lot and design a solid plan for disaster recovery.
I don’t understand how to read this graph.
Let’s see the rule(s) then
Just configured your mail clients pop/IMAP server as your fetchmail target and SMTP as your hosted service.
Yes and what exactly is a radical feminist to you
I just recently learned this.
For OsmAnd, go to search, then the categories tab, and then hit “Online Search”.
Voila, address lookup.
In the scope of wireguard it’ll just be a matter of you building appropriate firewall rules.
Since you want their internet traffic to go through you then i assime you’re effectively pushing a 0.0.0.0/0 route to your clients. You then need to add firewall rules on your server to block traffic to its local subnet and in the future allow traffic to only your jellyfin server.
This is also pretty simple and nothing wrong with that setup.
You did not answer what VPN tech you are using.
Without that knowledge i would recommend setting up tailscale and having your users use that. If you want to be fully self hosted you can also run Headscale as the control plane instead of relying on Tailscales own service.
I recommend tailscale as it is very easy to grant a user privileges to ONLY use an endpoint as an exit node but also grant access to any other endpoints as needed (such as your future jellyfin server) via theor ACLs.
Yeah, and it’s pretty clear you are at fault.
Well that certainly removes any uncertainty from this “debate”. OP was rude and peoe didnt takd mind to his rudeness.
Best practices comes down to what you do or do not want the VPN clients to access. This mostly comes down to routing and firewall rules.
So, what should your users have access to?
Also what is the vpn?
I’m not entirely sure what the actual question is. Can you rephrase what exactly you are trying to accomplish?
If you want simple you’ll have to manually decrypt each time it needs doing.
If you want it to be “automatic” then your best bet is something network based. A “simple” would be to just have a script ssh’s somewhere, pulls the decryption key, and then decrypts the disks. There’s plenty of flaws with this though as while a threat actor couldn’t swipe a single encrypted disk they could just log in as root, get your script, and pull the decryption key themselves.
The optimal solution would be to also encrypt the root partition but now you need to do network based decryption at boot which adds further complexity. I’ve previously used Clevis and Tang to do this.
I personally don’tencrypt my server root and only encrypt my data disks. Then ssh in on a reboot or power event and manually decrypt. It is the simplest and most secure option.
I backed this: https://www.crowdsupply.com/cool-tech-zone/tangara
Its not yet released and is in the manufacturing process but I think it’s worth considering
They do not work well in already humid environments but in a hot and dry climate they do quite well. It absolutely does add to the humidity (obviously) but speaking from experience I’d rather have a evap cooler than not if my AC is out.
The largest difference in utilizing one over AC is that they rely on airflow so you need to actually ventilate the area you are cooling as compared to AC where you want a sealed space.
The main driver is power efficiency. Only thing they are doing is running a small water pump and a big fan.
Debian
Assuming the implementation is done in such a way that I am not indirectly owned by the manufacturer of the BCI and am capable of maintaining its software and firmware myself…yes yes absolutely yes stick that shit in my head.
But if it is not open source and I’m expected to be tied to some corporate entity just to utililze it, no, absolutely not.
What’s bad about it? I’m a Linux admin by nature but an admin of all by profession and overall I have no real complaints about Teams. Has always worked just fine for me and to my knowledge everyone else.