As the title says, I want to know the most paranoid security measures you’ve implemented in your homelab. I can think of SDN solutions with firewalls covering every interface, ACLs, locked-down/hardened OSes etc but not much beyond that. I’m wondering how deep this paranoia can go (and maybe even go down my own route too!).

Thanks!

  • chayleaf@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    8 months ago
    • full disk encryption on everything except the router (no point in encrypting the router)
      • the server doesn’t have a display connected for obvious reasons, so I’m manually unlocking it via ssh on each boot
        • obviously, the SSH keys are different, so the server has a different IP in initrd. That said, I still don’t have any protection against malicious modification of initrd or UEFI
    • the server scans all new SSL certificates in realtime using certspotter and notifies me of any new certificates issued for my domains that it doesn’t know about (I use Cloudflare so it triggers relatively often, but I still do checks on who the issuer is)
    • firewall blocks outgoing 25 so nobody can impersonate my mailserver
    • refreeze@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 months ago

      You might be interested in setting up network bound encryption via Clevis and Tang. I use a hidden pi zero in my house acting as a Tang server. It’s great being able to reboot any of my encrypted servers without having to manually unlock disks.

      • tapdattl@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 months ago

        Do you recommend any resources about this? I’d be interested in learning how to implement this.

        • refreeze@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          8 months ago

          I’m using the recently merged Clevis module for NixOS. There was a recent talk at FOSDEM about it.