

The moment you get a TLS cert, it’ll show up in Certificate Transparency logs and apparently the attack bots scan that for targets.


The moment you get a TLS cert, it’ll show up in Certificate Transparency logs and apparently the attack bots scan that for targets.


You can totally do that yeah!
We have our stuff set up so inbound VPS traffic (for HTTPS) comes in on port 4430, while LAN traffic is on 443. It’s not done for firewall reasons, it’s so we can pass the client’s IP through with Nginx’s proxy_protocol feature, but you could just make your local-only services not listen on 4430. Boom, done.
Fail2Ban on the VPS is probably good. On the home server, it might just lock out the VPS (since everything comes from there).
Anyway yeah, I’ve got a whole guide on this sort of setup! https://frost.brightfur.net/blog/selfhosting-with-a-bounce-vps-part-1/
– Frost


Man, it’s so weird to think about misogynistic/degrading/abusive porn existing. I’m used to furry porn which, generally, is much more positive “yay let’s do [insert rule 34 of literally anything you could possibly think of] and have a great time!” type stuff.
– Frost
There’s also plenty of good GUI editors if vim and emacs aren’t your cup of tea. Personally I think Kate’s fantastic, for instance.
– Frost