this post was submitted on 26 Jun 2025
303 points (99.0% liked)

Selfhosted

46671 readers
1376 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

What’s your go too (secure) method for casting over the internet with a Jellyfin server.

I’m wondering what to use and I’m pretty beginner at this

(page 2) 50 comments
sorted by: hot top controversial new old
[–] circledot@feddit.org 6 points 6 hours ago

I use a wire guard tunnel into my Fritz box and from there I just log in because I'm in my local network.

[–] WhatThaFudge@lemmy.sdf.org 5 points 6 hours ago
[–] cupcakezealot@piefed.blahaj.zone 5 points 18 hours ago* (last edited 18 hours ago) (5 children)

for me i just needed a basic system so my family could share so I have it on my pc, then I registered a subdomain and pointed it to my existing ec2 server with apache using a proxy which points to my local ip and port then I opened the jellyfin port on my router

and I have certbot for my domain on ec2 :)

load more comments (5 replies)
[–] Decipher0771@lemmy.ca 5 points 13 hours ago

Jellyfin through a traefik proxy, with a WAF as middleware and brute force login protected by fail2ban

[–] This2ShallPass@lemmy.world 5 points 11 hours ago (1 children)

I don't host my media outside my local network but, if I did, I would use my go to method of SWAG with Authentik. This is what I have done for my other self-hosted items.

load more comments (1 replies)
[–] NuXCOM_90Percent@lemmy.zip 5 points 17 hours ago (2 children)

I don't use jellyfin but my general approach is either:

  1. Expose it over a VPN only. I usually use Tailscale for this so that I can expose individual machines but you do you
  2. Cloudflare tunnel that exposes a single port on a single internal machine to a subdomain I own

There are obviously ways to do this all on your own but... if you are asking this question you probably want to use one of those to roll it. Because you can leave yourself ridiculously vulnerable if you do it yourself.

load more comments (2 replies)
[–] Andrew@mnstdn.monster 4 points 17 hours ago (3 children)

Nobody here with a tailscale funnel?? It's such a simple way to get https access from anywhere without being on the tailnet.

load more comments (3 replies)
[–] borax7385@lemmy.world 4 points 16 hours ago (2 children)

I have had Jellyfin directly open to the Internet with a reverse proxy for years. No problems.

load more comments (2 replies)
[–] nutbutter@discuss.tchncs.de 4 points 10 hours ago (1 children)
load more comments (1 replies)
[–] Alk@sh.itjust.works 4 points 17 hours ago (8 children)

SWAG reverse proxy with a custom domain+subdomain, protected by authentik and fail2ban. Easy access from anywhere once it's set up. No vpn required, just type in the short subdomain.domain.com and sign in (or the app keeps me signed in)

load more comments (8 replies)
[–] Mordikan@kbin.earth 4 points 17 hours ago

For my travel devices, I use Tailscale to talk to the server. For raw internet, I use their funnel feature to expose the service over HTTPS. Then just have fail2ban watching the port to make sure no shenanigans or have the entire service offlined until I can check it.

[–] dataprolet@lemmy.dbzer0.com 3 points 18 hours ago

I'm using a cheap VPS that connects over Tailscale to my home server. The VPS runs Nginx Proxy Manager, has a firewall and the provider offers DDOS protection and that's it.

[–] JiveTurkey@lemmy.world 3 points 15 hours ago

I'm using jf on unraid. I'm allowing remote https only access with Nginx Proxy Manager in a docker container.

[–] Sgt_choke_n_stroke@lemmy.world 3 points 10 hours ago (1 children)

Synology worked for me. They have built in reverse proxy. As well as good documentation to install it on their machine. Just gotta configure your wifi router to port forward your device and bam you're ready to rock and roll

load more comments (1 replies)
[–] somewa@suppo.fi 3 points 10 hours ago

Tailscale + Caddy (automatic certificates FTW).

[–] bitwolf@sh.itjust.works 3 points 9 hours ago

Is putting it behind an Oauth2 proxy and running the server in a rootless container enough?

[–] potentiallynotfelix@lemmy.fish 3 points 6 hours ago

VPN or Tailscale

[–] snowflocke@feddit.org 3 points 1 hour ago

We have it open to the public, behind a load balancer URL filtering incomming connection, https proxied through cloudflare with a country filter in place

[–] cloudless@piefed.social 3 points 18 hours ago (2 children)

Unifi teleport. A zero configuration VPN to my home network.

load more comments (2 replies)
[–] HeyJoe@lemmy.world 3 points 17 hours ago (2 children)

Synology with Emby (do not use the connect service they offer) running behind my fortinet firewall. DDNS with my own domain name and ssl cert. Open 1 custom port (not 443) for it, and that's it. Geoblock every country but my own, which basically eliminated all random traffic that was hitting hit. I've been running it this way for 5 years now and have no issues to report.

load more comments (2 replies)
[–] _cryptagion@lemmy.dbzer0.com 3 points 44 minutes ago

My go to secure method is just putting it behind Cloudflare so people can’t see my IP, same as every other service. Nobody is gonna bother wasting time hacking into your home server in the hopes that your media library isn’t shit, when they can just pirate any media they want to watch themselves with no effort.

load more comments
view more: ‹ prev next ›