ive anabled a port forward on port 80 (TCP/UDP) to my server, but i still cant acess it. i know its unsafe to just open a port like that, this is temporary, just wanna see if it works. ill put a reverse proxt and https on it later

  • thecrotch@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    7
    ·
    8 months ago

    Absolutely do not expose your server on port 80. Http is unencrypted, you’d be sending your login credentials in plaintext across the open internet. That is Very Bad™. If you own a domain name, you can set up a letsencypt cert fairly easily for free. Then you could expose 443 and at least your traffic will be encrypted in transit. It won’t solve the other potential issues of exposing your instance like brute force or ddos attacks, but I’d consider it a bare minimum.

    If you use a VPN like many others are suggesting it won’t matter as much because the unencrypted traffic never leaves your local network.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    8 months ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    CGNAT Carrier-Grade NAT
    IP Internet Protocol
    NAT Network Address Translation
    TCP Transmission Control Protocol, most often over IP
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)

    6 acronyms in this thread; the most compressed thread commented on today has 14 acronyms.

    [Thread #441 for this sub, first seen 19th Jan 2024, 23:25] [FAQ] [Full list] [Contact] [Source code]

  • BearOfaTime@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    8 months ago

    Tailscale.

    You can run clients on all your devices. Or if you want easier access, use the Funnel feature.

    Tailscale Funnel lets you expose a local service, file, or directory to the entire internet, using what is effectively a VPN, except they don’t have to use a VPN (TS hosts an endpoint they connect to, then encrypt that traffic into your Tailscale network).

    https://tailscale.dev/blog/funnel-serve-demo

  • uzay@infosec.pub
    link
    fedilink
    English
    arrow-up
    4
    ·
    8 months ago

    To be honest, I would advise against opening your home network like that at all. A VPN would be much safer. If you use something like Tailscale it would be much easier as well and doesn’t need opening any ports at all.

  • h3ndrik@feddit.de
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    8 months ago

    How have you tested this? You need to use the external IP address of your router (public ip) to open it. And you need to test that from another internet connection. Also make sure the browser is actually trying to open an http connection to port 80. Some modern browsers / addons try to prefer https on port 443 instead and that wouldn’t be reachable. Does a ping work? What’s the exact error message? The port forward could be wrong. Needs to be port 80 (TCP) towards the internal device where nextcloud runs, to the port where it runs on that machine (could be 80, too). It could also be blocked by your provider, or your specific provider doesn’t allow port forwards. Or you ran into issues with the shift to IPv6 addresses. Maybe your provider has some strange setup. Try if you can ping your router from external first. And try the canyouseeme.org mentioned in the other comment. That’s good advice.

      • h3ndrik@feddit.de
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        8 months ago

        Sorry, 10.x.x.x is a private IP address range. That can’t be reached from the internet.

        Maybe try one of the services that display your IP like https://www.showmyip.com/ or the one mentioned earlier: canyouseeme.org , that one also shows your IP.

        I have little info to work on. There are many different providers around the world with very different setups. Some are suitable for port forwarding, some arent. (You could sit behind a Carrier Grade NAT, which makes port forward difficult to impossible.) But you need to figure out your IP first.

        All I can say, I run something like you describe… Nextcloud, a reverse proxy and a few other services. I did some port forwards, got a domain that points to my IP and it works fine.

        Edit: I use YunoHost on my computer. Its a Linux distribution for selfhosting. I think its a good choice to get your feet warm or if you want a low maintenance setup. It includes Nextcloud and many other services.

        But you have to figure out how to access your computer from outside. Either you get your IP and the port forward running, or you have to use a service like pagekite.net or you get a VPN running like almost everyone else here wants to convince you to use. I don’t think a VPN is a good idea except if you only want to use it by yourself and not use all the collaborative features of nextcloud.

  • rambos@lemm.ee
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 months ago

    Afik nextcloud runs only on https, so 443 would be more suitable. I use wiregurd tho

  • Rentlar@lemmy.ca
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 months ago

    I’ve not set up Nextcloud myself, so a basic question first: have you already tried canyouseeme.org to check for the running service on that port?

    If the service is not available, then either your server or the router isn’t configured correctly. If it is, then the problem is in the software.

  • Starbuck@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 months ago

    Please set up Tailscale or a Wireguard VPN before you start forwarding ports on your router.

    Your configuration as you have described it so far is setting yourself up for a world of hurt, in that you are going to be a target for hackers from literally the entire world.

    • thecrotch@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      8 months ago

      before you start forwarding ports on your router

      Don’t you mean instead of? If all the OP wants to do is access next cloud, they can do it over the VPN without forwarding ports. What you’re suggesting doesn’t solve the problem of port 80 being an attack vector, and adds yet another attack vector (the VPN itself)

      • Starbuck@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 months ago

        Realistically, yes. But it’s a phrase and it’s important that they start doing that first. Maybe it’s their intention to do it publicly.

        Also, sure, but a Wireguard installation is going to be much more secure than a Nextcloud that you aren’t sure if it’s configured correctly. And Tailscale doubly so.

        • thecrotch@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          8 months ago

          Wireguard installation is going to be much more secure than a Nextcloud

          I understand that, and it’s a good suggestion and a better solution if it fits the OPs use case. I don’t understand suggesting they do both. Either VPN or port forwarding solve the problem, doing both seems unnecessary.