this post was submitted on 06 Mar 2025
26 points (96.4% liked)

Selfhosted

43537 readers
655 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I self-host a couple of services, but I haven’t exposed anything outside my home network. I want to self-host my calendar, but not sure if I can do it without exposing it. Any recommendations on the best way to go about this? For those who do self-host a calendar service, how do you keep it secure?

you are viewing a single comment's thread
view the rest of the comments
[–] ClownsInSpace2@lemm.ee 2 points 2 days ago (1 children)

This is the first time I’ve heard of mTLS. Sounds interesting, any tutorial recs?

[–] Selfhoster1728@infosec.pub 1 points 2 days ago (1 children)

Not any in particular but mTLS is essentially just a reverse proxy (like nginx) asking a client for a certificate to be able to access the service behind it.

There are quite a few guides out there, so choose one for your reverse proxy of choice!

[–] suzune@ani.social 2 points 1 day ago (1 children)

So it's the good old client certificate authentication?

[–] Selfhoster1728@infosec.pub 2 points 1 day ago

yep

In my opinion it's the best solution because there's a really low attack surface plus it makes it easy to control which device has access to which services.