Paranoia Level: Virtualization vs Isolated Machines for Self-Hosting?
schizo @ schizo @forum.uncomfortable.business Posts 6Comments 1,240Joined 1 yr. ago
schizo @ schizo @forum.uncomfortable.business
Posts
6
Comments
1,240
Joined
1 yr. ago
What's your concern here?
Like who are you envisioning trying to hack you, and why?
Because frankly, properly configured and permissioned (that is, stop using root for everything you run) container isolation is probably good enough for anything that's not a nation state (barring some sort of issue with your container platform and it having an escape), and if it is a nation state you're fucked anyways.
But more to your direct question: I actually use dns scopes and nginx acls to seperate public from private. I have a *.public and a *.private cname which points to either my external or internal IP, and ACLs in the nginx site configuration to scope where access is allowed.
You can't access a *.private host outside the network, but can access either from inside it, and so (again, barring nginx having an oopsie somewhere) it's reasonably secure and not accessible, and leaves a very clear set of logs (and I'm pulling those logs in and parsing them for anything suspicious and doing automated alerting if I find anything I would not otherwise expect) so I'm happy enough with the level of security that this is, when paired with the services built-in authentication options.