• CompactFlax@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      72
      arrow-down
      4
      ·
      edit-2
      20 days ago

      That’s never made sense to me; why build an authn frontend instead of just clicking your user if the security is just an illusion anyways. “Use a VPN” is fine for a mainframe, but an active project in 2026 should aspire to be better.

      Edit: or make note of that on their several pages with reverse proxy configuration.

      Examples dating back over six years https://github.com/jellyfin/jellyfin/issues/5415

      • AHemlocksLie@lemmy.zip
        link
        fedilink
        English
        arrow-up
        37
        arrow-down
        1
        ·
        20 days ago

        I mean I’m sure they’d like to just ship safe code in the first place. But if that’s not their expertise and they demonstrate that repeatedly, we gotta take steps ourselves. Secure is obviously best, but I’d rather have insecure Jellyfin behind a VPN than no Jellyfin at all.

      • teawrecks@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        5
        ·
        20 days ago

        If I say I custom rolled my own crypto and it’s designed to be deployed to the open web, and you inspect it and don’t see anything wrong, should you do it?

        Jellyfin is young and still in heavy development. As time goes on, more eyes have seen it, and it’s been battle hardened, the security naturally gets stronger and the risk lower. I don’t agree that no one should ever host a public jellyfin server for all time, but for right now, it should be clear that you’re assuming obvious risk.

        Technically there’s no real problem here. Just like with any vulnerability in any service that’s exposed in some way, as long as you update right now you’re (probably) fine. I just don’t want staying on top of it to be a full time job, so I limit my attack surface by using a VPN.

        • CompactFlax@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          7
          ·
          20 days ago

          Young.

          The original ticket is 2019. That’s 7 years ago.

          Technically there’s no real problem here.

          It responds to and serves content to unauthenticated requests. That’s sorta table stakes if you’re creating an authenticated web service and providing guides to set it up with a reverse proxy.

          • teawrecks@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            2
            ·
            20 days ago

            Ok, I misread what you were linking to. Yeah, that’s pretty bad to allow actual streaming of content to unauthed users. I agree they should not be encouraging anyone to set this up to be publicly accessible until those are fixed. Or at least add a warning.

        • Auli@lemmy.ca
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          19 days ago

          I don’t care if someone finds my instance and manages to guess a random number to stream some random movie. Good for them I guess it would be easier to just download it themselves.

          • rumba@lemmy.zip
            link
            fedilink
            English
            arrow-up
            2
            ·
            19 days ago

            Biggest worry is someone finding an uncaught RCE.

            Of course plugins also have surface area.

            We know they can anon pull video. You can sandbox it to limit exposure.

            But if they modify the web client with an RCE, then you hit your own server as a trusted site and that delivers a payload…

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        5
        ·
        19 days ago

        there is just too much place in the codebase for vulnerabilities, and also, most projects like this are maintained by volunteers in their free time for free.

        I guess if you set up an IP whitelist in the reverse proxy, or a client TLS certificate requirement, it’s fine to open it to the internet, but otherwise no.

    • atzanteol@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      15
      ·
      edit-2
      20 days ago

      Y’all are assuming the security issue is something exploitable without authentication or has something to do with auth.

      But it it could be a supply chain issue which a VPN won’t protect you from.

        • antrosapien@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          ·
          20 days ago

          I have been planning to check out Netbird for couple of days. Is it a good alternative for headscale and pangolin?

          • pfr@piefed.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            20 days ago

            It depends if you’re using Pangolin for private access or public exposure.

            NetBird is a clean replacement for headscale/tailscale, but if your using pangolin specifically for its public tunnel feature then you’d need to keep pangolin.

            • antrosapien@lemmy.ml
              link
              fedilink
              English
              arrow-up
              1
              ·
              20 days ago

              Mainly use pangolin for public access, I’m looking for something/somehow add authentication for pangolin while trying to access endpoint in apps where it’s not exactly possible to directly authenticate in pangolin

      • yannic@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        13 days ago

        You’ve piqued my interest. Where can I read about it?

        I did a quick search on their github and came up empty. Maybe no one mentioned “htaccess” in the issue.

        • quick_snail@feddit.nl
          link
          fedilink
          English
          arrow-up
          1
          ·
          13 days ago

          Search for “basic auth”

          Its the only software project I know of that you can’t put behind http basic auth. They mark this bug as “wontfix” every time someone points it out to them

          • yannic@lemmy.ca
            link
            fedilink
            English
            arrow-up
            1
            ·
            12 days ago

            Basic auth? The insecure authentication method?

            Ok, I’ll look it up anyway. Under the jellyfin repository, there were eight results, none of which seemed to describe what you meant, and under the jellyfin-web repository, there were none. Using a web crawler search, I was able to find Issue #123 for jellyfin-android

            Is that it?

            • quick_snail@feddit.nl
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              11 days ago

              Basic auth is very secure.

              Unlike custom implemented logins. So it’s common to use basic auth in front of custom auth implementations. So even when the app has a login vuln, you’re safe.

              Yes that ticket is one of many.

              Try searching the repo. Make sure to backspace out the prefix that ignores closed tickets.

              • yannic@lemmy.ca
                link
                fedilink
                English
                arrow-up
                1
                ·
                10 days ago

                That’s exactly how I searched. If you want security, it’s probably best to follow the Unix philosophy of do one thing and do it well. In other words, don’t trust someone building a media server to handle auth and instead use the OIDC or LDAP plugins.

    • mriormro@lemmy.zip
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      3
      ·
      20 days ago

      Don’t ever shit in your own house, either.

      Just in case they’re watching.

    • ligma_centauri@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      18 days ago

      Just did a cursory read of the commits related to security for this release, and my assumpion based solely on the changes, is that it’s not a remote-access vulnerability, but a supply-chain-esque vulnerability where a video you downloaded from a questionable source might trigger code embedded in the metadata to be run by jellyfin.

    • AllHailTheSheep@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      3
      ·
      20 days ago

      or use the ldap auth plugin with your source of truth, put it behind a reverse proxy, protect it with fail2ban and anubis. there are ways of exposing it safely.

        • AllHailTheSheep@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          1
          ·
          20 days ago

          you totally can use ldap or oidc it just requires more setup. you just ensure jellyfin and your source of truth talk on their own subnet, docker can manage it all for you. ldap can be setup to be ldaps with ssl and never even leave the docker subnet anyways.

          and yes I suppose you could rely on whitelists, but you’d have to manually add to the whitelist for every user, and god forbid if someone is traveling.

  • clif@lemmy.world
    link
    fedilink
    English
    arrow-up
    109
    arrow-down
    2
    ·
    20 days ago

    Thank you for posting this. I tend to get a lot of my opensource project info from Lemmy so people who take the time to post it are awesome.

    Just updated my home instance. Can confirm that 10.11.7 is available in the Debian repos and the update went perfect. I got a new kernel in the same update : D

  • catlover@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    50
    ·
    20 days ago

    I forgot that it’s April first, and was wondering what catasthropic event had happend in order that it had to be stated in the title that its not a joke

  • FackCurs@lemmy.world
    link
    fedilink
    English
    arrow-up
    27
    ·
    20 days ago

    Is it standard practice to release the security updates on GitHub?

    I am a very amateur self hoster and wouldn’t go on the github of projects on my own unless I wanted to read the “read me” for install instructions. I am realizing that I got aware I needed to update my Jellyfin container ASAP only thanks to this post. I would have never checked the GitHub.

    • ShortN0te@lemmy.ml
      link
      fedilink
      English
      arrow-up
      24
      ·
      20 days ago

      Is it standard practice to release the security updates on GitHub?

      Yes.

      And then the maintainers of the package on the package repository you use will release the patch there. Completely standard operation.

      I recommend younto read up on package repositories on Linux and package maintainers etc.

    • SayCyberOnceMore@feddit.uk
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      20 days ago

      Not really.

      Depending on how you install things, the package maintainers usually deal with this, so your next apt update / pacman -Syuv or … whatever Fedora does… would capture it.

      If you’ve installed this as a container… dunno… whatever the container update process is (I don’t use them)

      • FackCurs@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        20 days ago

        I indeed use a container. Wasn’t familiar with the update process for containers but now know how to do it.

        • ButtDrugs@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          ·
          20 days ago

          There’s a lot of good container management solutions out there that are worth investigating. They do things like monitor availability, resource management, as well as altering on versioning.

        • communism@lemmy.ml
          link
          fedilink
          English
          arrow-up
          2
          ·
          19 days ago

          If you haven’t already, I recommend Watchtower (nickfedor fork—the original is unmaintained) which automatically pulls updates to Docker containers and restarts them. Make sure to track latest, although for security updates, these should be backported to any supported versions so it’s fine to track an older supported version too.

        • SayCyberOnceMore@feddit.uk
          link
          fedilink
          English
          arrow-up
          6
          ·
          19 days ago

          It’s difficult to do security-only updates when the fix is contained within a package update.

          Even Microsoft’s security updates are a mix with secuirity updates containing feature changes and vice versa.

          I usually do an update on 1 random device / VM and if that was ok (inc. watching for any .pacnew files) and then kick Ansible into action for the rest.

    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      20 days ago

      I am realizing that I got aware

      I don’t run the arr stack, but this is key. You really should do your due diligence before you update anything. Personally, I wait unless it’s a security issue, and use all the early adopters as beta testers.

    • sudoMakeUser@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      20 days ago

      Also interested how this works for mobile apps. I self host a number of services through caddy as my reverse proxy but each application is just dependent on it’s own authentication. If I exposed all my services to the internet, that’s a huge attack vector. If anyone else has some ideas I’d be happy to listen.

    • Scrollone@feddit.it
      link
      fedilink
      English
      arrow-up
      1
      ·
      19 days ago

      Yeah, I think what went wrong and now everything is installed through Docker.

      Docker feels like a huge security problem to me.

        • Scrollone@feddit.it
          link
          fedilink
          English
          arrow-up
          1
          ·
          18 days ago

          I know, but your security then depends on the package maintainer to keep the image up to date

          • phobiac@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            16 days ago

            Am officially maintained Docker image is no less a security concern than an officially maintained apt repo. Depending on how you set up a container stack it can even be more secure. An attacker gaining root access to a container that you’ve given extremely selective access to the host machine is far better than them gaining root access to your actual system.

  • Seefra 1@lemmy.zip
    link
    fedilink
    English
    arrow-up
    8
    ·
    19 days ago

    Good thing my Jellyfin is behind Wireguard.

    Consider doing the same if your usecase permits.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    4
    ·
    edit-2
    11 days ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    Git Popular version control system, primarily for code
    HTTP Hypertext Transfer Protocol, the Web
    IP Internet Protocol
    NFS Network File System, a Unix-based file-sharing protocol known for performance and efficiency
    Plex Brand of media server package
    RPi Raspberry Pi brand of SBC
    SBC Single-Board Computer
    SMB Server Message Block protocol for file and printer sharing; Windows-native
    SSH Secure Shell for remote terminal access
    SSL Secure Sockets Layer, for transparent encryption
    TLS Transport Layer Security, supersedes SSL
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)
    nginx Popular HTTP server

    12 acronyms in this thread; the most compressed thread commented on today has 17 acronyms.

    [Thread #203 for this comm, first seen 1st Apr 2026, 09:50] [FAQ] [Full list] [Contact] [Source code]

  • rose56@lemmy.zip
    link
    fedilink
    English
    arrow-up
    5
    ·
    20 days ago

    Im on fedora and I have installed through dnf, no updates with the dnf update… should I wait?

    • gigachad@piefed.social
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      20 days ago

      I depends a bit on your threat model. If you have Jellyfin exposed to the internet I would shut it down immediately. If you are running locally and rely on it, let it run maybe? If behind a tailnet or some other VPN, I would deactivate it as well. If it is an Axios like vulnerability it may be possible your secrets are in danger, dependent on how well they are secured. Not a security expert, but I would handle this a little more conservative…

      • somehacker@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        ·
        20 days ago

        No need to shut it down if it’s not exposed to the internet. Tailnet/VPN is fine.

        If it’s a supply chain compromise shutting it down wouldn’t matter. The damage is already done.

  • lmr0x61@lemmy.ml
    link
    fedilink
    English
    arrow-up
    5
    ·
    20 days ago

    The update rolled out perfectly for my Kubernetes setup (using the Docker image). 👍