• 0 Posts
  • 461 Comments
Joined 3 years ago
cake
Cake day: June 9th, 2023

help-circle

  • As I said, when you know the exact path of a media item on the server then you can check if the item exists.

    If you choose a none standard filepath its not an issue.

    Should that be fixed yes.

    Whats the scenario? A law firm could brute force check all media items on open jellyfin servers? Highly illegal to exploit something like this in a lot of jurisdiction. And would also not proof the existence of the media on the server, just a file named like it.

    Mitigation? Just add another random letter in the docker-compose mount path.







  • When a kernel update requires a change in dependencies, something Proxmox kernels do frequently, apt just quietly “keeps back” the package. It doesn’t fail, it doesn’t break the system, and it doesn’t trigger a rollback. It just waits for me to notice.

    This should save a click for hopefully everyone.

    Yes obviously, if you do not update the packages then they do not get updated.

    If you do not read the output of a command then you will not notuce that.





  • I heard the wisdom once that you should self host everything except for email. I’m sure there are great tools to make it manageable but the effort/gain is just very high.

    I find it irretating that you speak on the matter with hearsay without having even tried it with modern tools or project.

    With projects like Mailcow its a simple setup. Rspamd handles spam better than many professional industry spam filters i have encountered.

    Yes there are some pitfalls someone should be aware of and some know how required, but as of right know, it very easy with very little maintenance.




  • By default this applications allows when adding a server, that the communication is not encrypted between the app and the server. This should be configured by default to enforce TLS encryption. If someone would want to disable dis behavior and allow unencrypted communication, then this should take extra steps.

    As i commented somewhere else, to say that since it is turned off it is secure by default, is like saying: “The SSH server is turned off by default so the configuration that comes with it does not need to be secure when shipped”






  • If the target server is compromised or taken by LEA the data is gone.

    Laying the responsibility into the hands of the user is not ok for such an data aggregating service. Such highly critical, private and intime data should be protected and secure by default.

    Not even transport encryption is enforced in the project. At first glance, http is allowed on local connections?!? Generate a self signed SSL cert on start and pin it in the app. Easy.

    It is no excuse that other services do not follow these state of the art protection measures.