Incessant tinkerer since the 70’s. Staunch privacy advocate. SelfHoster. Musician of mediocre talent. https://soundcloud.com/hood-poet-608190196

  • 10 Posts
  • 127 Comments
Joined 2 months ago
cake
Cake day: March 24th, 2025

help-circle




  • I have a question about xcaddy, if anyone would be so kind as to school me. I too would like to geoblock with Caddy. I have investigated the process and of course it uses xcaddy. Having no knowledge of xcaddy, how does that work? Is xcaddy for building modules for Caddy? Does it run separately or in conjunction with Caddy? Does it interfere with Caddy in any way. My hesitation stems from the embarrassingly long time it took for me to wrap my noodle around how Caddy works. IKR? Now it seems so simple, but I’d like very much not to mess up my Caddy installation fat fingering my way through xcaddy. Yes, I know screw ups build knowledge bases, but I’m really trying to be careful and not go in like a bull in a china closet.

    'presh






  • As you probably know the crowdsec bouncer doesn’t directly parse logs or do checks like F2B filters. It queries the crowdsec LAPI for decisions and applies them. The “allowed” or “whitelisted” IP logic is handled at the Security Engine or LAPI level, not by the bouncer itself.

    You can whitelist an ip in /etc/crowdsec/whitelists.yaml or even whitelist decisions in the whitelist.yaml as such:

    name: private-ips
    description: Whitelist local and private IPs
    whitelist:
      reason: "Allow local and private IPs"
      ip:
        - "127.0.0.1"
        - "192.168.1.0/24"
      cidr:
        - "10.0.0.0/8"
    

    Then issue sudo systemctl reload crowdsec. Kind of the same concept as F2B’s ignoreip option. If you are using Tailscale to administer the server, then it’s easier to whitelist. IIRC, you can use cscli decisions add --type whitelist --ip 192.168.1.100 --duration 1y but it doesn’t add them to the whitelist.yaml. Instead it keeps them in crowdsec’s database managed by LAPI. To undo: cscli decisions delete --ip 192.168.1.100 --type whitelist

    https://docs.crowdsec.net/u/getting_started/post_installation/whitelists/


  • You dared to ask a question and the tools to explore answers are readily available.

    Right, however, before I go ‘test’ and screw things up, why not dare to consult with more knowledgeable sources? Maybe I have not taken into account other things that could be negatively affected by said testing? I mean, if you came to me and said ‘Hey bro, I’m thinking about learning how to play the guitar (something I’ve been doing for 65 years). What guidance could you offer a guy just starting out? What about equipment, type strings, etc’? Sure, you could easily go out and buy a cheap, sub $100 guitar only to have it wear your wrists and fingers out and then quit because it’s too painful to practice. Or, you could ask the guy who has been playing the guitar and other stringed instruments for virtually all his life, what guidance he could give. 😀

    I appreciate your input greatly, and as I said, 25 years of experience does speak for itself.

    Thank you



  • but that’s been my experience after ~25 years of using Linux daily.

    Certainly, 25 years of experience speaks for itself. If I may ask a follow up question.

    I run Portainer, and in Portainer you can adjust Runtime & Resources per container. I am apparently too incompetent to grasp Dockge. Currently everything in Runtime & Resources is unchanged. Is there any benefit to tweaking those settings, or just let 'em eat when hungry?



  • To me, it’s always nice meeting the face behind the software. I have never used copyparty, but if I had a use case, it would be high on the list just based of the volume of detailed instructions. I think that is probably the most detailed selfhosted piece of software I’ve seen at GitHub…gotta be something good going on with that. And…and replete with pictures of the UI in a variety of scenarios. That’s just top drawer in my book. If a need ever arises, I have bookmarked it, because that’s where I’ll start. Awesome job my man, and thank you for your dedication to the craft.



  • I have used the free Bitwarden now for untold years. It not only houses passwords for personal applications, I use it to keep track of my business account passwords as well. The only problem I’ve had with Bitwarden is their recent UI retool which ended up causing a huge ruckus among the user base to the point where they gave an option to switch back.

    There is a certain level of trust for whatever option you choose. If you use Bitwarden free, then you have to trust that Bitwarden will keep your data is safe on their servers. If you self host, the onus of trust lies in you’re ability to secure your server, and to the extent that you trust your host as well. The latter option leaves me a bit queasy, so I do not selfhost my passwords in a selfhosted vault.

    Others may have more trust in their security skills than I do. LOL There’s just a lot of sensitive data I have housed within Bitwarden free. Selfhosting it would keep me up at nights.