this post was submitted on 28 Nov 2023
3 points (100.0% liked)

Self-Hosted Main

504 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

For Example

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

founded 1 year ago
MODERATORS
 

i want to remotely ssh to my home server, and I was wondering if I could just forward port 22 with disabling password login and use pubkey authentication will be safe enough?

you are viewing a single comment's thread
view the rest of the comments
[–] mcr1974@alien.top 1 points 11 months ago (2 children)

but you still have to expose something to connect to wireguard?

[–] davis-andrew@alien.top 1 points 11 months ago (1 children)

The benefit of wireguard^ is it runs over udp and won't respond unless a peer with the right key hits it. ie a port scan won't reveal anything because there's no tcp port open to handshake, and wireguard won't respond to junk data coming in.

^ Most VPNs run over udp. But i'm not sure say OpenVPN will respond to random crap, it probably won't but i don't want to state categorically that it won't.

[–] mcr1974@alien.top 1 points 11 months ago

thank you for the explanation.

[–] mshorey81@alien.top 1 points 11 months ago (1 children)

Of course. But it's just another layer to the onion. Pfblockerng, Crowdsec, Fail2Ban, wireguard....layers.

[–] mcr1974@alien.top 1 points 11 months ago

but wouldn't you have to pay a performance penalty running ssh on top of wireguard.