Hi all, I’m running a small website off of a raspberry pi in my house. I have opened ports 80 and 443 and connected my IP to a domain. I’m pretty confident in my security for my raspberry pi (no password ssh, fail2ban, nginx. Shoutout networkchuck.). However, I am wondering if by exposing my ports to the raspberry pi, I am also exposing those same ports to other devices in my home network, for example, my PC. I’m just a bit unsure if port forwarding to an internal IP would also expose other internal IP’s or if it only goes to the pi. If you are able to answer or have any other comments about my setup, I would appreciate your comment. Thanks!

  • Lung@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    1 year ago

    If you run your webserver in a sandbox, that adds an extra layer of security. Something like docker, or a classic setup where you have a special user account with limited access, is good. So if the server gets owned, the damage is still contained

    Random webservers online are still often attacked, so disabling all password based access is helpful. You may have to occasionally look at the connections log and ip ban some attempts

    • ThreeHalflings@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      If you exploit a service running on Docker you can still use that to exploit other services running on the local network that are not directly exposed to the network. Docker offers a layer between the service and rhe host its running on, not the rest of your unsecured internal network where you have samba shares with one letter passwords.