• 1 Post
  • 181 Comments
Joined 3 years ago
cake
Cake day: June 22nd, 2023

help-circle





  • The problem is that there isn’t really anywhere to Exodus to. I already know people here on Lemmy are going to say Matrix but that’s just not an option. It’s trash, the protocol was designed by idiot neck beards that have never heard the term UX. Pretty much everything was done in a way that while technically speaking is efficient makes it unbelievably tedious to actually use and in some cases just outright annoying ensuring that users will never want to use it. Most recent example is forcing device verification, it is technically correct, it is better from a security standpoint it is better from a verifiability standpoint. But for the average user who could not give less of a shit about that it is nothing more than something that pisses them off and annoys them every single time they open the application because despite the fact that they should be remembering at least in my testing it almost never does and I have to put in my stupid key every single God damn time especially if I’m using it in the browser.

    Teamspeakers trying to rebuild itself to be more Discord like but it’s still in early beta and not at all ready for it so that’s not an option, and everything else is pretty much either just as shit or just as likely to implement this tomorrow as Discord





  • I mean it WOULD work you would just need a von on every device you wanted to use.

    The REAL answer is never host them DIRECTLY, always use a reverse proxy like nginx. Many projects (i believe jellyfin is one of them) explicitly recommend this for better security. Which it looks like you did so congrats

    For extra bonus points you can setup nginx to run as a non privileged user and use iptables to forward the lower ports (80/443). A pain but closes out a large chunk of nginx as a risk.





  • I feel like im missing something here. This is pretty trivial and the comments i see are over complicating the hell outta everything. All you need is your VPN tunnel working. Personally i use wireguard for this. Then you just use nginx as the reverse proxy it talks to services on the other side of the VPN.

    The nginx server config looks like

    server { listen 443 quic; listen [::]:443 quic; listen 443 ssl; listen [::]:443 ssl; server_name my.domain.tld; http2 on; http3 on; quic_gso on; tcp_nodelay on; error_log /var/log/nginx/jellyfin.access.log; ssl_certificate /path/to/ssl/fullchain.pem; ssl_certificate_key /path/to/ssl/privkey.pem; ssl_protocols TLSv1.2 TLSv1.3; add_header Alt-Svc ‘h3=“:$server_port”; ma=86400’; add_header x-quic ‘h3’; add_header Alt-Svc ‘h3-29=“:$server_port”’;

    location / {
        proxy_pass http://10.159.4.12:8096/;
        proxy_set_header Upgrade $http_upgrade;
        proxy_set_header Connection "upgrade";
        proxy_set_header Host $http_host;
        proxy_set_header X-Real-IP $remote_addr;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        proxy_set_header X-Forward-Proto http;
        proxy_set_header X-Nginx-Proxy true;
    }
    

    }

    I have no idea how to do the proper code block i guess so have a paste from my reverse proxy hosted pastebin lol https://paste.kitsuna.net/upload/snail-seal-pig