• 2 Posts
  • 72 Comments
Joined 5 months ago
cake
Cake day: June 21st, 2024

help-circle







  • cron@feddit.orgtoSelfhosted@lemmy.worldLoadbalancing between 2 locations
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    7 days ago

    Your challenge is that you need a loadbalancer. By hosting the loadbalancer yourself (e.g. on a VPS), you could also host your websites directly there…

    My approach would be DNS-based. You can have multiple DNS A records, and the client picks one of them. With a little script you could remove one of the A Records of that server goes down. This way, you wouldn’t need a central hardware.



  • For a start, try hosting something in your own home. A raspberry or an older PC or laptop should be enough.

    My first projects were a print server (so I can print via wifi) and a file server. Try to find something that is useful for you.

    Only start hosting on the internet when you’ve learned the basics and have more experience.






  • Just one open source example … freeradius has an option to log passwords:

    log {
        destination = files
        auth = no
        auth_badpass = no
        auth_goodpass = no
    }
    

    Or another example: The apache web server has a module that dumps all POST data, with passwords, in plain text:

    mod_dumpio allows for the logging of all input received by Apache and/or all output sent by Apache to be logged (dumped) to the error.log file. The data logging is done right after SSL decoding (for input) and right before SSL encoding (for output). As can be expected, this can produce extreme volumes of data, and should only be used when debugging problems.

    I don’t agree that this is “absolutely malice”, it could also be stupidity and forgetfulness.







  • cron@feddit.orgtoSelfhosted@lemmy.worldPaid SSL vs Letsencrypt
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    2 months ago

    You’re right, Google released their vision in 2023, here is what it says regarding lifespan:

    a reduction of TLS server authentication subscriber certificate maximum validity from 398 days to 90 days. Reducing certificate lifetime encourages automation and the adoption of practices that will drive the ecosystem away from baroque, time-consuming, and error-prone issuance processes. These changes will allow for faster adoption of emerging security capabilities and best practices, and promote the agility required to transition the ecosystem to quantum-resistant algorithms quickly. Decreasing certificate lifetime will also reduce ecosystem reliance on “broken” revocation checking solutions that cannot fail-closed and, in turn, offer incomplete protection. Additionally, shorter-lived certificates will decrease the impact of unexpected Certificate Transparency Log disqualifications.