• CompactFlax@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    1
    ·
    edit-2
    5 hours ago

    That’s never made sense to me; why build an authn frontend instead of just clicking your user if the security is just an illusion anyways. “Use a VPN” is fine for a mainframe, but an active project in 2026 should aspire to be better.

    Edit: or make note of that on their several pages with reverse proxy configuration.

    Examples dating back over six years https://github.com/jellyfin/jellyfin/issues/5415

        • sanzky@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          14 minutes ago

          and then you are giving access to your lan to people whose computer you don’t control and might be full of malware.

        • Hammersamatom@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          52 minutes ago

          Oh absolutely, difference being that you only need to expose the service once, versus helping however many people set up VPNs to access the service on your LAN

          I know way too many people who won’t remember to toggle it on, or just won’t deal with it

          It’s just not convenient enough

    • AHemlocksLie@lemmy.zip
      link
      fedilink
      English
      arrow-up
      24
      ·
      5 hours ago

      I mean I’m sure they’d like to just ship safe code in the first place. But if that’s not their expertise and they demonstrate that repeatedly, we gotta take steps ourselves. Secure is obviously best, but I’d rather have insecure Jellyfin behind a VPN than no Jellyfin at all.

    • IratePirate@feddit.org
      link
      fedilink
      English
      arrow-up
      15
      ·
      edit-2
      5 hours ago

      It’s not this or that. Security comes in layers. So while I would assume that the Jellyfin developers do their best to secure their application, I acknowledge the fact that bugs do exist and that Jellyfin is developed in and for hobbyist contexts, and thus not scrutinised and pentested for vulnerabilities in the way software meant for professional environments would be. Therefore I’ll add an extra layer of security by putting it behind a VPN that only whitelisted clients can access. If a vulnerability is detected, I can be sure it hasn’t already been exploited to compromise my server because we’re all “among friends” there.