• 3 Posts
  • 23 Comments
Joined 14 days ago
cake
Cake day: March 5th, 2026

help-circle

  • as far as I know, there is no way to put a valid certificate like let’s encrypt for a service that is not accessible from the net

    There definitely is. All of my local services run on a wildcard cert that I got from a DNS challenge with Let’s Encrypt. As long as the reverse proxy can access whatever source is issuing the certificate, and as long as the client browser can access public certificate ledgers and has DNS info about your services, things will work just fine locally.

    I recommend Netbird to give access to services to your family members, for access control and for the DNS server it provides. It also gives you the bonus of accessing your services remotely.

    Feel free to ask if you have any questions.




  • I like the idea of using git, and there are people using it with their KeePass database (here’s an example), but I don’t think it’s optimal. If you want to use git, pass is probably the better option, but that brings in a whole lot of other problems.

    I’ve started using Nextcloud to sync my database and it’s worked out fine so far. Though it would be nice to use something like git that I use all the time regardless, right now the whole bloated Nextcloud stack I have hosted only syncs my small password database haha.



  • Yeah, that’s a good point. There are still a few cons though:

    1. If the server goes down (or your internet connection goes down), you can’t add entries to your database. Local changes aren’t allowed.
    2. Bitwarden doesn’t support supplementing your passphrase with a key file.
    3. The Bitwarden clients aren’t enitrely FOSS as far as I understand, the SDK used has a non-free license.

    There are pros and cons in both alternatives, and there is unfortunately not a perfect solution. I like the idea and philosophy behind the KeePass format, so the increase in syncing complexity is worth it (for now at least).









  • I actually used pass many years ago and I quite enjoyed it, except for the fact that the entry names are presented in clear text. You’d also have to manage your GPG secret which I’m not a fan of (in fact, my password manager is how I usually manage GPG and SSH keys in the first place). On the other hand, I guess you should keep a key file on each device on top of a passphrase even if you use a KeePass database, so I guess that point is moot. There are also no good way to include attachments. At that point Vaultwarden feels more convenient, but the more I’m thinking about it, the more I’m warming up to the idea. We’ll see, maybe I’ll give it a shot again.

    Thanks for sharing your thoughts!

    Edit: I did some quick research and I found this video:

    https://www.youtube.com/watch?v=j-qBChKG15Y

    It brings up some pretty important security concern that still seem to be relevant.







  • This is only supposed to be temporary while you set up the FDE, your IP is unlikely to change in the 30 minutes or so it takes to go through these steps.

    In any other scenario I’d close port 22 and use a mesh VPN with SSH capabilities, like Netbird or Tailscale. I’d only open it up again to access Dropbear during reboots, and I’d use IP filtering for that as well.

    As for DHCP, I guess it depends on the ISP. I don’t have a static IP but mine doesn’t change as far as I can tell unless my router is disconnected for a longer while.