Selfhost wiki (personal) (wiki.gardiol.org)
from Shimitar@feddit.it to selfhosted@lemmy.world on 29 Feb 2024 07:15
https://feddit.it/post/5980173

I have finally got my selfhost wiki up to a satisfying shape. Its here: wiki.gardiol.org

Take a look i hope it can help somebody.

I am open to any suggestions about it.

Note: the most original part is the one about multi-homed routing and failbacks and advanced routing.

#selfhosted

threaded - newest

N0x0n@lemmy.ml on 29 Feb 2024 08:10 next collapse

Thanks for sharing, very cool stuff in there and great job ! Bookmarked !

While reading through your reverse proxy concept post, I think this statement is wrong:

As a sub-domain:
- Cons: require additional certificates for HTTPS/SSL for each sub-domain

There are actually wildcard SAN certificates where you can access all your subdomains with a single certificate: https://*.mydomain.com

Or you can add all your subdomains in a single certificate.

Great work and thanks for sharing !

TheHobbyist@lemmy.zip on 29 Feb 2024 10:34 next collapse

You are right and I would add that this is even a privacy and security measure, to make use of wildcard certificates. The reason is, those subdomains will be public because of websites like crt.sh which show all subdomains which have their dedicated certificate. Obfuscation can be helpful in not disclosing which are some services or naming schemes you use for yourself even if it is only meant to be for internal use.

vegetaaaaaaa@lemmy.world on 02 Mar 2024 09:11 collapse

Obfuscation can be helpful in not disclosing which are some services or naming schemes

The “obfuscation” benefits of wildcard certificates are very limited (public DNS records can still easily be found with tools such as sublist3r), and they’re definitely a security liability (get the private key of the cert stolen from a single server -> TLS potentially compromised on all your servers using the wildcard cert)

TheHolm@aussie.zone on 29 Feb 2024 11:06 next collapse

using wildcards is really bad security practice. and at age of ACME absolutely unnecessary.

Shimitar@feddit.it on 29 Feb 2024 11:43 next collapse

Fully agree

TheHobbyist@lemmy.zip on 29 Feb 2024 12:41 next collapse

Can you elaborate on why it is a bad security practice? It’s the first time I’m reading about it and I’d like to read more about it. Thanks!

Shimitar@feddit.it on 29 Feb 2024 14:34 collapse

One of the risks associated with wildcard SSL certificates is the increased attack surface they introduce. If one subdomain becomes compromised, it opens the door for potential attackers to gain unauthorized access to all subdomains secured under the wildcard certificate. (first google link)

cron@feddit.de on 29 Feb 2024 15:30 collapse

While this argument is valid for a larger domain, it doesn’t really matter for the small selfhoster.

Shimitar@feddit.it on 29 Feb 2024 16:54 collapse

Using let’s encrypt certbot is so easy and automated that I never bothered for wildcards anyway, so.

lorentz@feddit.it on 01 Mar 2024 13:58 collapse

The advantage of wildcard certificates is that you don’t have to expose each single subdomain over internet. Which is great if you want to have https on local only subdomains.

TheHolm@aussie.zone on 10 Mar 2024 01:56 collapse

If you still use HTTP for cert verification on ACME, you are doing it wrong. Use DNS-01 only, there is no need to allow any inbound traffic to your servers. and HTTP will not give you wildcard anyway.

lorentz@feddit.it on 11 Mar 2024 23:03 collapse

Yes, you are right, I already use DNS validation. But it is just it is easier to request a single wildcard certificate for my domain and have all the subdomains that I use for the local services defined only in my local DNS. I cannot fully automate the certificate renewal because namecheap requires to allowlist the IP that can call its API, and my ip is dynamic. So renewing a single certificate saves me time. Also, the wildcard certificate is installed on a single machine, so it is not the I increase a lot the attack surface by not having different certificates for each virtual host.

N0x0n@lemmy.ml on 29 Feb 2024 19:18 collapse

That’s true. But it doesn’t take away the possibility to use them in a selfhosted environnement.

Large enteprises like facebook and google still use them, but they have the backing to secure them safely.

Also, there is always the possibilty to add all subdomains in one certificate which takes away the wildcard subdomains.

Shimitar@feddit.it on 29 Feb 2024 11:43 collapse

Yes, you are right, I have updated the information.

schmorpel@slrpnk.net on 29 Feb 2024 08:26 next collapse

Thanks a lot for sharing this. I’ll keep it bookmarked for later reference, looks very cool!

Brunette6256@sh.itjust.works on 29 Feb 2024 08:27 next collapse

Is there a section about the wiki on the wiki? I was wondering what the wiki tool is.

wolre@lemmy.world on 29 Feb 2024 08:46 next collapse

It’s dokuwiki.

Shimitar@feddit.it on 29 Feb 2024 14:36 collapse

As already stated, it’s Dokuwiki. I tried a few and this was the best compromise between features and complexity for my needs.

Decronym@lemmy.decronym.xyz on 29 Feb 2024 10:35 next collapse

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

Fewer Letters More Letters
DNS Domain Name Service/System
HTTP Hypertext Transfer Protocol, the Web
HTTPS HTTP over SSL
IP Internet Protocol
SAN Storage Area Network
SSL Secure Sockets Layer, for transparent encryption
TLS Transport Layer Security, supersedes SSL
nginx Popular HTTP server

8 acronyms in this thread; the most compressed thread commented on today has 15 acronyms.

[Thread #556 for this sub, first seen 29th Feb 2024, 10:35] [FAQ] [Full list] [Contact] [Source code]

superbirra@lemmy.world on 29 Feb 2024 15:47 collapse

nginx isn’t an acronym lol bad bot

Fisch@lemmy.ml on 29 Feb 2024 11:08 next collapse

Might be worth adding a section for web UIs that make managing certain things easier. For example, Cockpit or Nginx Proxy Manager.

Shimitar@feddit.it on 29 Feb 2024 11:44 collapse

I think NPM is useless (in my use-case…) and can get things more messy, but I plan to check on cockpit later on indeed.

NPM isn’t bad in itself, but NGINX configuration is basically static and IMHO don’t require a dedicated GUI.

AFLYINTOASTER@lemmy.world on 29 Feb 2024 14:37 collapse

What lead you to believe NPM is useless/messy?

Shimitar@feddit.it on 29 Feb 2024 14:42 collapse

Yeah, i kind of wrote badly. I mean NGINX configuration is simple enough and static enough not to need a dedicated service for my use case. I don’t feel the need to mess with NPM. I have a neat folder structure under nginx config so that adding one service is pretty clean and simple and editing one too.

owen@lemmy.ca on 29 Feb 2024 11:12 next collapse

Quite useful… Thanks for sharing

crony@lemmy.cronyakatsuki.xyz on 29 Feb 2024 11:32 next collapse

I recently started something similar using bookstack as the software behind.

Still severely lacking in content but am willing for anyone who has time and something interesting to write in it as long it’s connected to tech, preferably linuc and open source software.

Here is the link and if anyone want’s to contribhte I’m more than willing to accept a couple editor to grow the content on it.

wiki.cronyakatsuki.xyz

Shimitar@feddit.it on 29 Feb 2024 14:43 collapse

Now the big question is: are you an Arch or a Gentoo lover? Just joking.

Good job! Keep it up

crony@lemmy.cronyakatsuki.xyz on 29 Feb 2024 14:47 collapse

At one point was arch lover, then I became a gentoo lover.

Now I’m on nixos because gentoo didn’t have a good retroarch package.

psy32nd@lemmy.world on 29 Feb 2024 12:04 collapse

Good work. Added to favorites.