this post was submitted on 01 Aug 2023
160 points (97.1% liked)

Selfhosted

39966 readers
453 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

For example, something that is too complex for your comfort level, a security concern, or maybe your hardware can’t keep up with the service’s needs?

you are viewing a single comment's thread
view the rest of the comments
[–] Karcinogen@discuss.tchncs.de 81 points 1 year ago (4 children)

Password manager like Bitwarden. I'd rather they take care of it for me. The consequences would be too great if I messed it up.

[–] apprehensively_human@lemmy.ca 17 points 1 year ago (2 children)

Smart move, unless you really know what you're doing and have redundancy. When I first made the switch from Lastpass to Bitwarden I had tried to host the vault myself instead of using the cloud version, which worked fine right up until the moment I had a server outage and lost access to all my passwords.

[–] bdonvr@thelemmy.club 13 points 1 year ago (1 children)

Eh, the clients all cache your vault. It shouldn't be a huge issue for it to be down even for a few days.

But I do upload encrypted backups of the server every 6 hours to cloud storage

[–] Engywuck@lemm.ee 2 points 1 year ago* (last edited 1 year ago)

Same.

Plus, my instance is proxies through Clouflare and only IPs from my country are allowed.

[–] ChrislyBear@lemmy.world 8 points 1 year ago (2 children)

Oh man, that's actually really good advice! I recently switched to Vaultwarden, but you're right: If my server goes down, I can't even restart it, because the password for my account is in there! Damn! Close call!

[–] Limit@lemm.ee 17 points 1 year ago

Well with bitwarden/vaultwarden you can have a copy of your entire vault on your phone or computer or both... so even if your server was totally dead, you'd have access to your passwords. Solid backups is a must, I follow the 3-2-1 rule on super critical systems (like vaultwarden) and test that you can actually recover. Something as simple as spinning up a VPS, testing a restore, testing access, see if that could work in a pinch until you get your server back online, then tear it down. Linode is very cheap for this kind of testing, it'd only cost you a few pennies to run a "dr" test of your critical systems. Of course you still want to secure it, I'd recommend wireguard or tailscale instead of opening access to your DR node to the internet, but as a temporary test it's probably fine if your running patched up to date versions of docker, vaultwarden, and I'd always recommend putting a reverse proxy in front like nginx.

[–] newIdentity@sh.itjust.works 11 points 1 year ago

Usually the password are also stored locally.

I can definitely access all my passwords offline with bitwarden

[–] rglullis@communick.news 1 points 1 year ago* (last edited 1 year ago)

I still don't get why people want to have cloud-based password managers. Keepass works in all major platforms, it's just one file, which it is super easy to sync and/or merge. It can integrate with your browser/Os if you want, but otherwise the surface attack is basically zero.

[–] AES@lemmy.ronsmans.eu 0 points 1 year ago* (last edited 1 year ago)

Bwoa, you can easily take json backups. It is pretty safe imo.