• 4 Posts
  • 53 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle
    1. For all the mentioned cases, if your firewall blocks incoming packets by default, no one can access it, no matter what is the source of the port being open.

    2. You don’t configure it on the docker level, at least if you care about outside connections. If you mean from your local computer to a docker container, by default you cannot connect, unless you expose the port to the system. If you mean from other docker containers, just create your own separate network to run the container in and even docker containers cannot access the ports.

    3. I usually use netstat -tulpn, it lists all ports, not only docker, but docker is included. docker ps should also show all exposed ports and their mappings.

    In general, all docker containers run on some internal docker network. Either the default or a custom one. The network’s ports don’t interfere with your own, that’s why you can have 20 nginx servers running in a docker container on the same port. When you bind a port in docker, you basically create a bridge from the docker network to your PC’s local network. So now anything that can connect to your PC can also connect to the service. And if you allow connection to the port from outside the network, it will work as well. Note that port forwarding on your router must be set up.

    So in conclusion, to actually make a service running in docker visible to the public internet, you need to do quite a few steps!

    • bind a port to your local host
    • have your local firewall allow connection to the port
    • have your router set up to forward connections on the port to your machine

    On Linux, local firewall is usually disabled by default, but the other two steps require you to actively change the default config. And you mention that all incoming traffic is dropped using UFW, so all three parts should be covered.





  • I use Proton Mail for my primary domain and then addy.io for redirects to it. It costs $10 a year or something like that and it’s all I actually need.

    Replying to emails is as easy as just hitting reply, the only thing that’s slightly harder is sending entirely new email (as in not replying) but even that can either be remembered, or the special email address copied from the addy.io app.





  • You need to host your domain somewhere, meaning some DNS provider needs to be the authority on what gets routed where when someone accesses your domain.

    The provider will give you a list of nameservers when you make the domain part of their DNS.

    I don’t know if there are any that are free (if you don’t also buy a domain from them), so you’ll have to check on your own. You can also self-host a bind9 server and do your DNS there.













  • In theory, though in this particular case you’re giving them to an open source app which you can check the source code of. Of course there is the possibility that I’ve modified the code that I’m hosting, you’re gonna have to trust me that I didn’t.

    I’m an author of many open source libraries and apps and I have no need to steal your credentials. Though that of course doesn’t have to mean anything to you.

    But if you’re giving your credentials to a mobile app or any other frontend, you’re doing pretty much the same thing. And technically speaking, even trusting your instance admins is the same thing - they might have modified the code to log your credentials.

    In general, yes, you should be worried where you put your credentials. In ideal scenario Lemmy would support OAuth or something like that, but that’s not the case currently.