It’s mighty unlikely to brick a PC with Linux, but there has been at least this case: https://lwn.net/Articles/674940/
dihutenosa
- 0 Posts
- 14 Comments
dihutenosa@piefed.socialto Showerthoughts@lemmy.world•There are no laws! We made the whole thing up!English81·5 days agoThere’s no law of gravity, it’s just curved spacetime! *jumps off a cliff
dihutenosa@piefed.socialto Selfhosted@lemmy.world•how to start with self-hosting?English31·24 days agoEh, OP says:
I am familiar with Linux and comfortable in terminal
… and is constrained by little RAM. My stance stands.
dihutenosa@piefed.socialto Selfhosted@lemmy.world•how to start with self-hosting?English212·25 days agoStep 1: be psychologically prepared to break it all. Don’t depend on your services, at first, and don’t host stuff for others, for the same reason.
Yunohost? Good for trying out stuff, I suppose. I haven’t tried it myself. You could also try Debian, Alpine, or any other. They’re approximately equivalent. Any differences between distros will be minuscule compared to differences between software packages (Debian is much more similar to Alpine than Nextcloud to Syncthing).
4GB of RAM? Don’t set up a graphical interface. You don’t need a desktop environment to run a server. Connect to it via SSh from your regular PC or phone. Set up pubkey auth and then disable password auth.
I recommend setting up SSH login first, then a webserver serving up HTTP, only, accessible via IP address.
Next comes DNS - get a name at https://freedns.afraid.org/
Then add HTTPS, get the certs from LetsEncrypt.
Finally, Nextcloud. It runs kind of “inside” your webserver. Now you can back up your phone, and share photos with family, etc.
dihutenosa@piefed.socialto Showerthoughts@lemmy.world•Can we all agree kids shouldn't be watching Porn?English82·26 days agoI sure did, and looked up some of the more intriguing references. There’s a reason they call it “The good book”!
dihutenosa@piefed.socialto Selfhosted@lemmy.world•Second set of eyes - DNS NameserversEnglish1·27 days agoI’m not sure if I agree.
You can’t easy man in the middle authenticated protocols like SSH or HTTPS.
Unless you own a CA, or are a powerful country able to coerce a CA, or mandate installing one into users’ PCs.
As for SSH - you missed the “TOFU” bit, Trust On First Use. Do you verify your SSH host keys every time before connecting to a new server? The docs for GitHub doesn’t even mention it.
unencrypted/unauthenticated protocols are on their death bed.
I partially agree - encryption appears to be a solved problem today. Key distribution, however is not, it’s layers upon layers of half-solutions of wishful thinking, glued together with hope.
The layers should be independent to allow for maximum flexibility.
Depends on your threat model and priorities, right :) HPKP is helpful and does not require DNSSEC. DANE and CAA are helpful but require DNSSEC.
dihutenosa@piefed.socialto Selfhosted@lemmy.world•Second set of eyes - DNS NameserversEnglish1·28 days agoHow could a hijacked DNS entry harm you?
- redirect to ads/spam
- downgrade to HTTP (no HSTS), then steal creds
- MitM the TOFU of SSH
- probably something more…
You can leverage the trust in DNSSEC to distribute TLS and SSH fingerprints too, look up DANE.
dihutenosa@piefed.socialto Selfhosted@lemmy.world•Second set of eyes - DNS NameserversEnglish1·28 days agoOh, now I see. I guess then the DNS64 server needs to do the dnssec verification on behalf of the user, then drop the RRSIG records for the v4->v6 translated names.
Oh, and now I realize I confused the direction. DNS64 makes v4 into v6.
dihutenosa@piefed.socialto Selfhosted@lemmy.world•Second set of eyes - DNS NameserversEnglish1·28 days agoI’m fortunate to get native IPv6, so I’m not very familiar, tho I think I have basic understanding.
Did you mean you need to pick just one of {authoritative DNS server, DNS64} to listen on port 53? No, because the authoritative DNS only needs to be accessible from the outside. Run it on another machine or nonstandard port, then expose via port forwarding. Machines in LAN don’t need direct access to the authoritative DNS server, they can just as well resolve via the regular system.
dihutenosa@piefed.socialto Selfhosted@lemmy.world•Advice for an EU (and in any case non-spying) Dynamic DNS provider?English8·29 days agoAre you sure you need DYNDNS? My ‘dynamic’ IP address changes so rarely that I just update my DNS entries manually when it does.
Could you elaborate on the “non-spying” bit? There’s not much they can infer from people looking up your IP. Unless you run their daemon that updates the IP, as opposed to curl in cron.
dihutenosa@piefed.socialto Selfhosted@lemmy.world•Second set of eyes - DNS NameserversEnglish2·29 days agoI just self-host my own DNS server. Works like a charm. Setting up DNSSEC was a tad fiddly tho.
Long story short:
- Set up Knot, teach it to serve your zone
- Test via resolving names in your server (
dig
can use a specific server) - Disable DNSSEC
- Tell your registrar to “use my own DNS server”
- Generate the DNSSEC keys, upload only the pubkey to registrar, reenable
dihutenosa@piefed.socialto Comic Strips@lemmy.world•If There Were Robots That Made the Perfect Amount of Food for EverybodyEnglish7·1 month agoThis implies that waiters are the root of all evil.
dihutenosa@piefed.socialto Programming@programming.dev•Best C# IDE/Compiler for Linux?English9·1 month agoVS Code runs flawlessly on Linux, as does
dotnet
the compiler/runtime.
C# is a fine language, and you can easily upgrade to F#, if adventurous.
I use nvim with omnisharp-roslyn myself, which doesn’t work as reliably, but I’m used to Vim, so meh.
Reads like it was written by a LLM.