Goofed Home

Conversation

$$4535
https://feddit.org/u/MaggiWuerze posted on Feb 26, 2026 11:14
In reply to: https://mastodon.cloud/users/bitsandburnouts/statuses/116136572863087586

And I’m sure if your ISP kicked you, that would still work…

https://feddit.org/comment/11729632

Conversation

$$4368
https://piefed.ca/u/iamthetot posted on Feb 26, 2026 00:21
In reply to: https://slrpnk.net/post/13889553

I don’t have any experience with Ghost but just from glancing at it, seems like might be overkill for a simple blog. There are a lot of static site generators out there that would be on the safer side, I think. (I am not an expert at this though!)

https://piefed.ca/comment/3655800

Conversation

$$4366
https://piefed.ca/u/iamthetot posted on Feb 26, 2026 00:19
In reply to: https://jlai.lu/post/14892087

I’ve been using Actual for over a year and I really like it a lot. Full disclosure though, I don’t use any of the linking features and manually input all transactions.

https://piefed.ca/comment/3655784

Conversation

$$98
https://piefed.social/u/SorryImLate posted on Feb 18, 2026 07:36
In reply to: https://piefed.social/c/selfhosted/p/1788417/here-are-your-choices-for-a-self-hosted-ebook-server

In addition to Calibre-Web there is also Calibre Web Automated.

https://piefed.social/comment/10183575

16 posts in conversation

$$4077
https://ani.social/u/mysweat posted on Feb 25, 2026 12:44
In reply to: https://lemmy.blahaj.zone/comment/19249007

Most of my ebooks are large as they are comics. You also have EPUB3 ebooks now, which can contain images and audio in them too (think combined ebook + audiobook). So they can get pretty large.

https://ani.social/comment/15372086
$$4343
https://lemmy.blahaj.zone/u/SCmSTR posted on Feb 25, 2026 22:16
In reply to: https://ani.social/comment/15372086

Oooo, I didn’t know that. That’s fancy

https://lemmy.blahaj.zone/comment/19366596

Conversation

$$4308
https://piefed.social/u/somegregariousdude posted on Feb 25, 2026 21:08
In reply to: https://mastodon.social/users/zblesk/statuses/116133088975433911

I didn’t expose Portainer to the public internet… That’s staying strictly on my tailnet. I’m not going to risk an important piece of infrastructure like that to the public Internet.

https://piefed.social/comment/10293064

Network Security Audit

$$3763
https://lemmy.world/u/irmadlad posted on Feb 24, 2026 18:44

From time to time I like to review my network to see where I can tighten up. Review logs, check out the landscape, and make sure there are no gaps. Today, I have some downtime, so I figured it’d be a good for it. Since I am not a certified IT professional, this is what I have cobbled together reading, and seeing what others have done. I’d like to bounce this off you guys who are more experienced than I and get your impressions. If you have any recommendations, I’m always down to be schooled.

So if you’d like to participate in my audit, I have a home network as follows:

  • Modem receiving IP from ISP. Modem to router. Router to stand alone pfsense firewall. Router has a 54 character complex password for WiFi. There are no guest provisions for WiFi.
  • Pfsense firewall with pfblockerng & suricata running on both lan and wan, both with a full array of rules/feeds updated daily. pfsense has tailscale as an overlay vpn. Server traffic and PC traffic have their own VLAN provided by pfsense. My approach is to deny all until something complains and address that on a case by case basis. Additionally ntopng is utilized for traffic analysis. IPv6 is disabled.
  • Server running Tailscale as an overlay VPN, UFW deny all posture, and fail2ban with an aggressive posture. Server has been hardened against Lynis spec where applicable. Not all recommendations apply to my server. Server is utilizing host deny/host allow and SSH keys.
  • Server is utilizing containers for services.
  • Server is using Cloudflare tunnel/zero trust.
  • Server and pfsense communicate via Tailscale encrypted tunnel. PC/Phone/mobile device can communicate with pfsense via Tailscale.
  • Server services are accessed via https.
  • PC connected to pfsense firewall with same rules as server. PC is using a VPN with Cloudflare 1.1.1.11.0.0.1 for DNS queries. Firefox is using 1.1.1.11.0.0.1. Settings for Firefox are the strictest for Enhanced Tracking Protection, and DOH. HTTPS-Only mode enabled. PC is also running a soft firewall.
  • All other devices such as phones, laptops, and tablets run a VPN with Cloudflare 1.1.1.11.0.0.1 for DNS queries.
  • IoT devices are isolated. Phones are isolated. Smart TVs are isolated.

How secure would you say this network is and give any recommendations to further harden the network besides keeping up with current updates, monitoring and auditing logs.

Thanks

https://lemmy.world/post/43533409

24 posts in conversation

$$4184
https://lemmy.world/u/Archer posted on Feb 25, 2026 17:22
In reply to: https://lemmy.world/comment/22339322

You’re ahead of an alarming number of my colleagues by just trying until you can get it working then documenting things

https://lemmy.world/comment/22342852
$$4298
https://lemmy.world/u/irmadlad posted on Feb 25, 2026 20:34
In reply to: https://lemmy.world/comment/22342852

I have to document. At 71, with a TBI, my brain is not what it used to be. Sometimes I don’t even remember what I had for breakfast. LOL

https://lemmy.world/comment/22346284

Conversation

$$4263
https://lemmy.world/u/Cloudstash posted on Feb 25, 2026 19:29
In reply to: https://lemmy.piracy.social/comment/153

And movies, tv shows, game servers and what not. Kindly stop beliving your source needs to provide at 10001000, thats just a sales gimmic from the operators.

https://lemmy.world/comment/22345160

Conversation

$$314
https://programming.dev/u/d13 posted on Feb 18, 2026 17:14
In reply to: https://lemmy.dbzer0.com/comment/24478517

There’s a docker that essentially sets up a web VNC for Calibre. I do this for file conversion, DRM removal (only books I buy), etc.

Then I use Calibre-web for the OPDS server and nice web UI.

https://programming.dev/comment/22259456

6 posts in conversation

$$1732
https://programming.dev/u/d13 posted on Feb 20, 2026 17:12
In reply to: https://feddit.nl/comment/23378023

You can have calibre auto import from a folder. Though be careful because it deletes them from that folder (you might want to do single direction sync into that folder).

And if you share the db with calibre-web or have some other sync method that works, you should be good to go.

https://programming.dev/comment/22300215
$$4075
https://ani.social/u/mysweat posted on Feb 25, 2026 12:40
In reply to: https://lemmy.dbzer0.com/comment/24478517

… comics and manga, which is another aspect I’ve been noticing calibre does not do such a great job

Absolutely. Calibre is horrible with anything that is fixed format. I recently backed up my entire Kindle library with about 1k manga volumes, expecting to be able to convert from KFX to EPUB format as I have been doing for my regular books for 15+ years. Calibre failed awfully at this. The only thing it’s reasonably good at with comics, is converting to ZIP format. So I had to write a Python script to take the KFX -> ZIP outputs from Calibre and convert them into working EPUB files.

https://ani.social/comment/15372033

How to reach different services via name instead of ip?

$$3413
https://lemmy.world/u/Auth posted on Feb 24, 2026 00:57

On my Lan I have 192.168.1.111 hosting a bunch of various services not containerized. All connections are done either from my internal lan or from wireguard going through 192.168.1.111 so no external traffic bar wireguard.

I’ve set the host name of 111 in the hosts file inside the router and 111 and it works for all devices expect the ones connecting via wireguard.

But I dont want to have to use hostname+port for every service, I’d like each service to have its own name. I’d also like certs.

Can someone point me in the right direction for what I need to do? I’m thinking maybe this requires a local DNS server which im hesitant to run because im happy using 8.8.8.8.

For certs do I create a single cert on the 192.168.1.111 and then point all the applications to it?

https://lemmy.world/post/43506147

38 posts in conversation

$$4054
https://lemmy.world/u/BeatTakeshi posted on Feb 25, 2026 10:15
In reply to: https://lemmy.world/comment/22331609

See the section “Personal dashboards” of this great resource page I often refer to: https://github.com/awesome-selfhosted/awesome-selfhosted

https://lemmy.world/comment/22336742
$$4056
https://lemmy.blahaj.zone/u/KyuubiNoKitsune posted on Feb 25, 2026 10:35
In reply to: https://lemmy.world/post/43506147

I don’t see anyone else recommending it here but you can also use Traefik, that’s what I use. I’ve sein it up so that I can automatically add any docker hosted apps based on the container tags, it makes it convenient to use.

https://lemmy.blahaj.zone/comment/19357766

Docker Hub's trust signals are a lie — and Huntarr is just the latest proof

$$3411
https://lemmy.ml/u/dendrite_soup posted on Feb 24, 2026 00:53

The Huntarr situation (score 200+ and climbing today) is getting discussed as a Huntarr problem. It’s not. It’s a structural problem with how we evaluate trust in self-hosted software.

Here’s the actual issue:

Docker Hub tells you almost nothing useful about security.

The ‘Verified Publisher’ badge verifies that the namespace belongs to the organization. That’s it. It says nothing about what’s in the image, how it was built, or whether the code was reviewed by anyone who knows what a 403 response is.

Tags are mutable pointers. huntarr:latest today is not guaranteed to be huntarr:latest tomorrow. There’s no notification when a tag gets repointed. If you’re pulling by tag in production (or in your homelab), you’re trusting a promise that can be silently broken.

The only actually trustworthy reference is a digest: sha256:.... Immutable, verifiable, auditable. Almost nobody uses them.

The Huntarr case specifically:

Someone did a basic code review — bandit, pip-audit, standard tools — and found 21 vulnerabilities including unauthenticated endpoints that return your entire arr stack’s API keys in cleartext. The container runs as root. There’s a Zip Slip. The maintainer’s response was to ban the reporter.

None of this would have been caught by Docker Hub’s trust signals, because Docker Hub’s trust signals don’t evaluate code. They evaluate namespace ownership.

What would actually help:

  • Pull by digest, not tag. Pin your compose files.
  • Check whether the image is built from a public, auditable Dockerfile. If the build process is opaque, that’s a signal.
  • Sigstore/Cosign signature verification is the emerging standard — adoption is slow but it’s the right direction.
  • Reproducible builds are the gold standard. Trust nothing, verify everything.

The uncomfortable truth: most of us are running images we’ve never audited, pulled from a registry whose trust signals we’ve never interrogated, as root, on our home networks. Huntarr made the news because someone did the work. Most of the time, nobody does.

https://lemmy.ml/post/43612224

35 posts in conversation

$$3806
https://lemmy.ca/u/pulverizedcoccyx posted on Feb 24, 2026 20:30
In reply to: https://lemmy.world/comment/22320303

One thing that sucks about that is you might miss an upgrade that needed to happen before a large version jump later. It’s pretty rare but I believe I’ve seen a container break like that and the upgrade was misery.

https://lemmy.ca/comment/21882993
$$3936
https://lemmy.world/u/porkloin posted on Feb 25, 2026 04:36
In reply to: https://piefed.social/comment/10270841

Fair! I’m not giving enough credit to the fact that some applications don’t really have another option than to run root for some dependencies

https://lemmy.world/comment/22333696
Create New Post