this post was submitted on 23 Jul 2023
22 points (100.0% liked)
Self Hosted - Self-hosting your services.
11419 readers
1 users here now
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules
- No harassment
- crossposts from c/Open Source & c/docker & related may be allowed, depending on context
- Video Promoting is allowed if is within the topic.
- No spamming.
- Stay friendly.
- Follow the lemmy.ml instance rules.
- Tag your post. (Read under)
Important
Beginning of January 1st 2024 this rule WILL be enforced. Posts that are not tagged will be warned and if not fixed within 24h then removed!
- Lemmy doesn't have tags yet, so mark it with [Question], [Help], [Project], [Other], [Promoting] or other you may think is appropriate.
Cross-posting
- !everything_git@lemmy.ml is allowed!
- !docker@lemmy.ml is allowed!
- !portainer@lemmy.ml is allowed!
- !fediverse@lemmy.ml is allowed if topic has to do with selfhosting.
- !selfhosted@lemmy.ml is allowed!
If you see a rule-breaker please DM the mods!
founded 3 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
What is your upload speed? Many ISPs give you 50 download but <5 upload, that would be a huge bottleneck
The biggest issue is security though. Unless you're setting up a VPN that only works when you set up a secured client on each device, I wouldn't trust that server to have access anywhere on the network. I would strongly recommend against opening any ports on your firewall as well. Tailscale and Cloudflare Tunnels are popular for homelabs that might be useful here and free for your use case
AFAIK the most secure way to host stuff on your home network is to set up a locked down, firewalled VLAN for it.
I have 50/50 speed so that's ok.
And having a single open port in my firewall won't do much. I'm trying to think of a scenario that is not secure. If the Minecraft service itself is hacked, then tailscale or Cloudflare tunnels won't help me, because they will probably gain the same access rights as the user that I created for the server. Or am I missing something?
Weird TCP packets ? I probably receive those already, server or not.
You will want to isolate the Minecraft server because it is notoriously easy to hack. If you can isolate it then Cloudflare is better than exposing your IP and opening ports at least. Tailscale would require registering each client using VPN so it isn't accessable by anyone except trusted clients, and you're not exposing ports/IP.
No matter what though, don't let that server be able to talk to anything else on your network or even the admin login on your router/firewall. Treat it like it contains malware already
Easy to hack: I've been Minecraft admin for a while now and never heard about that, do you have a source on that?
I follow various red-team security researchers, like the Security This Week podcast, which has mentioned how easy it makes their jobs when they find a Minecraft server on either the employees network or even a work network.
I'm sure many of the vulnerabilities come from modding like the recent fractureiser virus going around lately. If you kept it 100% vanilla it would be more secure, but at the end of the day you have a platform designed to run modified code, most of which is downloaded from external sources, and you're going to open that up to the world? I certainly don't want that within ping's reach of my home computer or firewall