This is a decent writeup on applying “Zero Tust” principles to a home lab using mostly open source tools. I’m not the author, but thought it was worth sharing.

  • PlutoniumAcid@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 month ago

    Zero trust, but you have to use Amazon AWS, Cloudflare, and make your own Telegram bot? And have the domain itself managed by Cloudflare.

    Sounds like a lot of trust right there… Would love to be proven wrong.

    • min@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 month ago

      I’ve been researching zero-trust for my homelab recently and I’m considering OpenZiti instead of Cloudflare since I think it can all be self-hosted. The BrowZer from OpenZiti is especially interesting to me. The fact that I’m behind CGNAT is a hurdle though.

    • mosiacmango@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 month ago

      ZeroTrust is a specific type of network security where every network device has its access to other devices validated and controlled, not a statement on the trustworthiness of vendors.

      Instead of every device on a LAN seeing every other device, or even every device on a VLAN seeing other devices on a VLAN, each device can only connect with the other devices it needs to work, and those connections need to be encrypted. These connectioms are all monitored, logged and alerted on to make sure the system is working as intended.

      You do need to trust or validate the tooling that does the above, regardless of what you’re using.

        • mosiacmango@lemm.ee
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          1 month ago

          Yes and no. The auditing is likely the harder part. You can use something like tailscale or nebula vpn to get the always on vpn/ACLs. With a dozen or two devices, it should be doable at a home scale.

          If you want clientless zerotrust then you’re talking heavier duty things like Palo alto gear and the like.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 month ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    CGNAT Carrier-Grade NAT
    DNS Domain Name Service/System
    IP Internet Protocol
    NAS Network-Attached Storage
    NAT Network Address Translation
    SSL Secure Sockets Layer, for transparent encryption
    TLS Transport Layer Security, supersedes SSL
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)

    [Thread #957 for this sub, first seen 8th Sep 2024, 14:05] [FAQ] [Full list] [Contact] [Source code]

  • powerofm@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    The document is filled with so much meaningless fluff that it’s annoying to read and was probably written by chatgpt and the cover image is AI generated: I don’t think there’s anything useful here.

  • ancoraunamoka@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    this is a very bad article. It talks about “zero trust” but then suggests you to use corporate software, the cloud, sketchy russian apps to monitor your traffic at home. Also, I am not spending 2 hours a day going through my logs, nor I want a VM/container with 8GB of ram wasting 40% of my GPU on grafana.

    • krnl386@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 month ago

      The author has a Master’s in informatics. That’s pretty much like an MBA. I wouldn’t expect more than buzzword-bingo from someone like that.

  • Quik@infosec.pub
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    I, too, don’t love the use of AWS/Cloudflare, while I get that you can simply replace AWS S3 with something else for backups, this server setup is innately based on using Cloudflare.

    • fruitycoder@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      What is a good alt for cloudflare here tbh?

      I’ve done wire guard, and tor service to obfuscate the network, and crowdsec for a good external firewall, and linkerd gateway to actual services (and keycloak for sso).

      Besides adding gotelaport for more fine grained access, idk what else you could do, but even then idk if its still competitive as someone else’s network taking your ddos loads lol

      • sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        I’d appreciate it as well.

        I have a somewhat sophisticated setup as well that doesn’t use Cloudflare (aside from domain and DNS hosting) or AWS (I use a simple Hetzner VPS). I’m considering using Backblaze for backups, and everything else is self-hosted.

        One of my main goals is that every responsibility should be modular and have a compatible drop-in replacement. I’m very interested to read what others with a similar perspective have done.

  • adr1an@programming.dev
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    1 month ago

    Nice write-up. I’d take this as a blueprint. Anyone can swap 3rd-party services to their like (e.g. headscale, xmpp bot on that vps, backblaze s3, etc.) and extend upon (e.g. oidc providers, mailboxes, arr suite, etc.)