Hosting securely at home
Hosting securely at home
First you’ve got to determine where threats can come from, then which surfaces are vulnerable and eventually the reach. In short what I mean:
SSH port (default 22) is high on the threat encounter level. Lots of bots try to scan every host they can find for an open SSH port. The risk is high because this is a doorway to your network. There’s honestly no good reason to have port 22 open to your home. Get [tailscale vpn] (tailscale.com). There are alternatives, I use tailscale, it’s great.
When youre hosting apps, they can also be vulnerable. Keep them updated and you’ll mostly be fine. There are levels of security. Super super secure is creating seperate networks for these apps so they can’t access others. Bit much imo. Use non-rooted docker, enough of a sandbox.
In the end you’re a small fish in a big pond, not saying you should be a cowboy but with a few decent measures you should be OK.
Tl;dr
If I am trying to fix problems with my cluster or the baremetal hosts they are running on, I can't rely on the VPN access running on those nodes, which means I need dedicated reliable hardware acting as a bastion. Right now all I have for that is my router. Home routers have awkward limitations for installing and configuring software even if you are running better custom firmware like FreshTomato or OpenWRT, making them the edge case for "just" set up a VPN. Yes I played around with making it work. Yes, I could make it work if I sunk enough effort in to it, but again, I found it acceptably secure to simply enable remote ssh access.
I do suggest talescale all the time for most people though. It's cool tech, their blog is fantastic. I'm looking forward to having a proper network switch one day and I'll revisit the issue.