• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: September 14th, 2023

help-circle
  • Mikelius@lemmy.mltoSelfhosted@lemmy.worldZeroTrust Your Home
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 months ago

    I’d say anyone wanting to go this deep into a home monitoring setup will likely go with what works best for them instead of reading and following the entirety of this guide… I’m one of those people…

    Wrote my own log parsing software to put into a database, display and alert through grafana, which is alerting through a homemade webhook that sends a notification to ntfy based on severity… And I also use uptime Kuma like mentioned, but my notifications channel is ntfy. No cloudflare for my internal services, only wireguard to connect home and use everything. And definitely no telegram.

    Plenty of other stuff setup, but my security alerts and monitoring rely heavily on the syslog/grafana server which helps me monitor everything.


  • I converted my gaming machine into a server as well. I actually took the graphics card out as I couldn’t find a major use for it, but kept the 12 core Ryzen and upped it to 128gb memory. It now self host way too many things, including a few game servers my friends and I play… But even with all this, CPU carries along nicely and not even at half memory consumption (yet).

    But as others have asked, what’s your goal? Don’t overkill it if you’re only hosting one service or something. If you’re doing a lot like I do, then up the RAM. And seriously consider whether the GPU is even useful or needed if you’re not using a desktop environment.



  • My solution to this question a year or so ago was to take my gaming desktop, which was collecting dust after I moved to my gaming laptop, and gut it down to a 4U server rack case. Best decision I’ve ever made. 12 core Ryzen and 128gb memory. Got a 10g adapter in the pci express, 8xHDD for data and then 2 mirrored nvme for the OS itself. Only thing I kept out was the video card since I had no use for it (yet)

    An equivalent “server” on the market would probably cost a fortune and cost you a ridiculous amount of electricity.


  • Lots of comments already mentioning the differences. I have tried these, including the mentioned ipfire, and decided on the end to use opnsense plus openwrt on two different devices.

    I chose opnsense at the time many years ago because it supported wireguard out of the box, where as pfsense required some weird install process I didn’t want to deal with. Plus I liked the UI to opnsense more.

    My moden has been literally replaced by my firewall so I have the ONT connected to it and then use it to do all the heavy lifting for… Well, firewall stuff. It connects to a VPN so my entire network routes through the VPN. Then my openwrt device is connected to that. It also handles firewall stuff, but more at an internal level (keeping network devices only permitted to communicate with devices I say are okay, blocking internet access, etc) and also hosts my nginx setup to route to various servers.

    While I could do everything on one machine with opnsense, I’ve got a particular setup that allows me to have multiple devices at the firewall level, truly isolated from the rest of my internal network (for a couple of internet open port services). And it gives me peace of mind that if someone found a zero day in opnsense, I’m not totally screwed unless they also got one in openwrt.

    To answer “which is better to begin with”, I personally find opnsense way more flexible and robust than the other 2 options. Has a lot more capabilities and upgrading is super easy without requiring jumping through weird hoops and such like openwrt does.


  • Not much for myself, like many others. But my backups are manual. I have an external drive I backup to and unplug as I intentionally want to keep it completely isolated from the network in case of a breach. Because of that, maybe 10 minutes a week? Running gentoo with tons of scripts and docker containers that I have automatically updating. The only time I need to intervene the updates is when my script sends me a push notification of an eselect news item (like a major upcoming update) or kernel update.

    I also use a custom monitoring software I wrote that ties into a MySQL db that’s connected to with grafana for general software, network alerts (new devices connecting to network, suspicious DNS requests, suspicious ports, suspicious countries being reached out to like china, etc) or hardware failures (like a raid drive failing)… So yeah, automate if you know how to script or program, and you’ll be pretty much worry free most of the time.


  • Plus 1 to openvas. UI is indeed horrendous though.

    Be careful running high load tests against sensitive devices. I once ran it against a PoE switch I used for my cameras and it did something so crazy that it required me not to only power cycle the switch, but to disconnect all the cameras first and then power cycle. Was super confusing and felt like it found a way to short the device lol. Scared the hell out of me.

    That being said, I’ve found many many things to improve on my devices thanks to openvas.



  • Okay hopefully attaching images work on this app, never tried on Lemmy lol. I blocked the domain on my network firewall and then unblocked it from the DNS to confirm… and yes, the latest rustdesk appimage still calls out. I guess my memory of trying to disable the relay server was to try and force it to localhost in the settings. Could have swore there was a checkmark setting in there, but maybe that was some other software. The fields are default blank I believe.

    However… I just tried to put 127.0.0.1 in ALL the fields (unlike the screenshot, which was when I checked what I had in there before), and it appears to now to call localhost. Either I goofed before, or it was fixed recently, because I am pretty sure I did try that before. It doesn’t get you around the very first call made when running the software of course… Opt out, not opt in, lol. But hey at least it’s possible now? I just tried on mobile and it worked there to when filling everything in with 127.0.0.1.


  • Noticed it with the android install (via fdroid) and I think I had the appimage on Linux (not at my machine to check, so going by my memory). I connected to a windows machine that had no internet connectivity so can’t speak to the windows installs working and ignoring relays or not, but Linux and android do phone the relay servers at least. I’ll see if I can pull some screenshots or details tomorrow when I get a moment! I’ll update the appimage too just in case (since I only validated the DNS call being made on my phone yesterday)

    Either way, if I had to choose between it and TeamViewer for what I use it for, Rustdesk is still a clear winner lol.


  • If you have a custom DNS, be sure to block all the relay domains they use and block the respective ports from external access. Even if you disable the settings to avoid relays, they don’t acknowledge them and continue to try and phone home somewhere. Just checked the latest version on my phone, which has no relay setting configured, before commenting on this and sure enough, still true. Just logged an entry to rs-ny.rustdesk.com on my DNS, which of course was blocked. Desktop app has an option to disable them if I recall, but it never worked for me.

    That out of the way, it is a very good local network software for remote access. Way faster than the alternatives I’ve tried.



  • Is wireguard hosted on opnsense, or an internal device that the port is being forwarded to?

    If it’s on opnsense, be sure you route outgoing traffic on that port over the correct gateway, possibly even an extra rule to be sure the proper reply-to is set. Opnsense used to do the gateway routing configuration automatically, but once wg got added to the kernel, you’re now required to manually specify the gateway in your rules for it to work properly.

    Also, if you see zero packets, then as others mentioned, try a different mtu. Some service providers (mobile, and even hotels) try to block all VPN traffic altogether and they do this by measuring the mtu of the packets. A little tweaking might get it to work, although I’d expect this to have held true for the VPS too, honestly.