Skip to main content


Opening the door: Making self-hosting friendly for newcomers


in reply to drebora

Sometimes it feels like a portion of the community views complexity as a badge of honour.


Its not this, it's that there are very serious risks to self hosting (dataloss, hacks etc), and if they aren't prepared for them, itll be catastrophic.

The gatekeeping isnt just for fun, there are actual risks and downsides.

As for prepackaging an appliance, we already have a model for how that plays out. There are millions of ISP provided routers and IoT things, and every other day there is a new breach involving them.

in reply to CameronDev

Shoutout to that dude last week posting a fully public fileshare service because he wanted to "practice" selfhosting
in reply to bunkyprewster

It was on the Lemmy.world selfhosted sub but I'd rather not link it as it's likely still open because the OP wasn't listening to anyone and there's probably some awful shit on there now.
in reply to CameronDev

How can security be made accessible? I'm a noob at self-hosting (I can deploy Docker containers and all that). There are loads of guides for beginners. I haven't found any accessible info to learn from in an incremental way. Surely the advice can't be that self-hosting shouldn't be done till you've done a undergraduate qualification worth of learning about cyber security first.
This entry was edited (3 weeks ago)
in reply to cRazi_man

I dont know. I'm in an adjacent industry, and even amongst some of my colleagues who do have degrees, there are some significant knowledge gaps. Companies often have entire teams dedicated to cyber security, and still get this wrong.

There are just so many subtleties that need to be done right. I'm pretty certain that even my setup isnt properly secure, and the only reason things haven't crashed down is pure luck.

The appliance model is probably the best way to enforce security practices for regular users, but that pushes significant control/responsibility back to the supplier (they must stay up to date with patches, force push out updates so no one is left behind, limit flexibility so everyones setup is relatively homogeneous). Done right (for security), that costs a lot of money, so likely a subscription model. And it rapidly becomes a "cloud" service that runs off your own electricity, which loses all the self hosting benefits.

in reply to CameronDev

OK, so I've spent a load of time on this today. Searching for "self-hosting security" mostly brings up mostly home surveillance camera results.

I've found this resource and have implemented his recommendations. Finally a good resource and I'm feeling much better after hardening SSH access, closing open ports in the firewall, installing Fail2Ban, etc.

in reply to cRazi_man

I would encourage you to setup wireguard or tailscale, so that you dont have to expose SSH at all, but SSH hardening is definitely a good start.

Worth monitoring your SSH logs as well, that'll give you an idea of how constant the automated attacks can be. Even when I was using a non-standard port, I was getting heaps of attacks.

in reply to CameronDev

I've got to figure that out still. Each step is a lot of learning and troubleshooting. I've changed the SSH port, deactivated root login, deactivated password login and left the passkey token on only my desktop PC with Fail2Ban. I'm waiting till I have another weekend I'm not at work to figure out VPN access. I'm using Synology reverse proxy system so I hope I'm secure enough for now anyway.
This entry was edited (3 weeks ago)
in reply to cRazi_man

in reply to cRazi_man

A device on your local lan is pretty accessible. Don't open ports from the internet and be sure to back up important data. Something like homeassistant or pi-hole on a raspberry pi is very accessible. Remote access is where thing start getting tricky.

If you want to host something publicly, buy a $5 VPS and install a web server on it. Try hosting static websites. Don't put anything sensitive on it and if something happens to it, you are out your 5 bucks for the month and learned a lesson.

in reply to drebora

This is a cool project, I have quite a few questions! Are you planning an "app store" repo of supported software? Allowing us to add our own repos? Can i set up a reverse proxy/VPN tunneling using my own hardware, or is remote access only available through a Safebox subscription? If I can set it up is that manual, guided, or automatic? Why Docker instead of Podman?
in reply to voracitude

Those are all very good questions that I'm sure many of us would like to know the answers to.
in reply to voracitude

in reply to drebora

in reply to drebora

This entry was edited (3 weeks ago)
in reply to Flatfire

in reply to Cooper8

in reply to drebora

Thinking about implementation, it seems like tooltips would be a great way to handle this. Linking out from the tool tips to some kind of more comprehensive outside IT/cybersecurity resource would be a good bonus. Tool tip text generated by llm could take some of the heavy lifting.
in reply to Flatfire

Thanks your detailed feedback, I’ll try to go through all your points.

When we said Docker, we meant the desktop version, basically so anyone can try Safebox on their own desktop and check out the early product. We also added an auto docker install for server setups a few days ago.

You’re right about the docs, they’re still in the works, and proper documentation will be released soon.

That other post you mentioned got a bit too heated, so the mods took it down. Definitely wasn’t our intention to stir up tension, and it wasn’t about not liking the answer or linking it to the product. Right now we’re mainly looking for early feedback and for people curious enough to help test things out.

Thanks for explaining your point of view and your suggestions. It means a lot for us in this early state, and looking forward of any future feedback of your about the actual product.

in reply to drebora

... documentation... released soon


On a project geared specifically toward helping the ignorant, documentation and admin guides are probably more important than code releases.

Non technical people will want to see and understand the process before they have to do the process, so don't really on simple wizards to be your breakthrough to the masses.

in reply to Flatfire

yup, I even commented on the previous thread.

I'll take a look at this safebox out of curiosity, but as I said in the previous thread, assuming this even meets OP's goal, I expect the project to be another abandoned GitHub repo once the constant security maintenance cycles hit.

I'm generally of the opinion that OP's target could be better met with well designed and well maintained walkthroughs of the most common use cases. There's a ton of documentation and tutorials out there, but they're all either terrible or unmaintained. A system that cross-linked and branched for the various up to date use cases like a choose-your-own-adventure book would be super.

in reply to drebora

I believe self hosting should be made easier. Definitely easier to understand.

If its not going to be that, then the opinion that people should self host is flawed. Not everybody can self host. They don't have the knowledge or time to commit to it. So either it's wrong to not have a better entry to them or it's wrong to say they should self host.

I don't self host much. What I do I keep with local access only. Why? Because while I'm no dummy, I also am very out of touch with modern tech and don't have the time or energy to learn what I need to for it to be done right.

in reply to Broken

I think your project has admirable goals, but things like Cosmos Cloud and Casa OS already aim to address this. I think it would be useful for you to show what value proposition yours brings versus their apps, e.g. which parts of selfhosting you think your app handles better. I also agree with flatpack in that much more documentation is needed so the user can educate themselves how the back end works.
in reply to drebora

I think your project has admirable goals, but things like Cosmos Cloud and Casa OS already aim to address this. I think it would be useful for you to show what value proposition yours brings versus their apps, e.g. which parts of selfhosting you think your app handles better. I also agree with @flatfire@lemmy.ca in that much more documentation is needed so the user can educate themselves how the back end works.
This entry was edited (3 weeks ago)
in reply to mierdabird

Yeah, as I mentioned earlier, proper documentation is already in the works, and I hope that will make it clear how our project differs. Thanks for the suggestion!
in reply to drebora

No thanks, Discord is proprietary.
This entry was edited (3 weeks ago)
in reply to Autonomous User

These platforms are a gateway drug to open source.

I got more folks into Linux using Reddit than I have anywhere else.

in reply to Autonomous User

Safebox is currently in mvp state, heavily under developement, and we looking for early user feedbacks. We created the dc server as a way to recieve these feedbacks and to lay the foundation for the future community.
in reply to hagelslager

What does its software license tell you?
This entry was edited (2 weeks ago)
in reply to drebora

Offline app is best. Tell others to try this first.
This entry was edited (3 weeks ago)
in reply to drebora

I think you are aiming for people that don't want to learn maintenance work. This means you have to take care of that part.

This means protect the OS from crashing when an app fill up the disk. Security. Upgrade the applications and the OS itself. Perform backup and rollback if something goes wrong. Add/removal off harddisks. Handle hardware failure and inform the user what they need to replace. Migrating to a new server.

in reply to Mio

Yes, that is kind of the case. Our goal and plan for the future is to offer an alternative with features you mentioned above. Safebox is currently in mvp state with limited features. If you take a look at the actual dashboard you can notice "monitoring" and "disk management" features alongside "backup"(both on Lan and geo-redundant between fellow users) will be available and updates for the OS and apps are already working it can be found (temporarily) under "notifications".
At the moment we looking for early user feedbacks and testing demand.
in reply to drebora

I'm struggling to understand what this is and why someone should use it
in reply to Evotech

Safebox is basically a framework to help you install and manage self hosted apps. It also includes features like remote access, backup, monitoring, and disk management (the last three are still in development). Safebox handles all the setup for you, DNS configuration, SSL certificates, and so on. If you want remote access, all you need to do is provide a domain (it can be an existing one, or you can register it with us). Of course, you can still use it locally, remote access is just an optional feature.

For people who don’t want to deal with the technical side, or who are still learning but want to try out self-hosting, I think Safebox makes things a lot easier and gives them a solid starting point

in reply to drebora

I direct everyone to yunohost.org/
As you describe it your project looks very similar.
in reply to drebora

I've seen many projects like this over the years, they never seem to take off for some reason. Freedombox seemed pretty interesting to me back in the day, but I already had some old hardware and didn't mind learning how to set things up myself. I think Sandstorm is/was another option. And I think Nextcloud is also a framework of sorts (idk, I don't use it). To an extent TrueNAS is also a kind of an all-in-one solution that has one-click installs of most of these apps.
in reply to drebora

People make it too complicated. When I want to self host something I just install the Nix package and call it a day.

When I get around to upgradingy storage, I'll just do a very simple RAID setup on some reliable HDDs.

I'm super allergic to unnecessary complexity. I don't want a perfect setup, I want a setup that is reliable with almost no maintenance. I'm skipping the 80% of the effort it takes to get the last 20% of the result.

in reply to termaxima

I loathe this approach. But for me its more of a hobby and even then, I too am alergic to overt complexity, but saying no maintenance is asking for a security hole to open, sure it can be automated away, but it still takes at least SOME work.

The main reason I dislike this approach is by doing things as simply as possible you delegate the control to the developer of your solution. Its not a one size fits all thing. Some solutions can for sure be turnkey, but most should require some work, because we do this to regain control, not delegate more of it away.

in reply to termaxima

lol Nix as the beginner friendly choice?

"very simple RAID?"

For someone who hasn't even seen a command line before? Who doesn't know what a RAID is? That's the target audience here.

You're entirely missing OP's point here. You've reduced maintenance complexity, but increased the typical learning curve to get started.

in reply to drebora

I've used Dockstarter in the beginning. It helped me understand the concept of docker compose files and such
in reply to drebora

I a desperate to self host, but do not know how to code. I use Debian, installing what I need for work, music, photo editing. All very low level, but accessible to me and far better than Windows. Keeping fingers crossed for something accessible between the full "black belt" level user and, well, me.