Hi guys I was wondering if there is a streamlined way to disable remote acess to a selfhosted service (say at a reverse proxy level) if a published security vunerability is present.

I know, ideally you want to keep all your selfhosted services up to date. However on certain selfhosted service auto updates may not be viable (due to major changes between updates) and you being unavailable 24/7 to respond to vunerabilities.

Curious on your thoughts and suggestions. So far the only middle ground I can find is realying on a vpn wireguard, tailscale, etc.

Page regarding homeassistant remote ui autodisable: https://www.nabucasa.com/config/remote/

  • DeemoOP
    link
    fedilink
    English
    arrow-up
    4
    ·
    7 months ago

    data source for these vulnerabilities

    Are you refering locations for vulnerability disclosure or are you more referring to bug bounty?

    Personally, I’d just put everything behind a VPN. The attack surface is much smaller.

    Fair enough

    • computergeek125@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      7 months ago

      I’m not the commenter but I can take a guess - I would assume “data source” refers to a machine readable database or aggregator.

      Making the system capable of turning off a generic external service in an automated way isn’t necessarily trivial, but it’s doable given appropriate systems.

      Knowing when to turn a service off is going to be the million dollar question. It not only has to determine what the backend application version is during its periodic health check, it also needs to then make an autonomous decision that a vulnerability exists and is severe enough to take action.

      Home Assistant probably provides a “safe list” of versions that instances regularly pull down and automatically disconnect if they determine themselves to be affected, or, of the remote UI connection passes through the Home Assistant Central servers, the Central servers could maintain that safety database and off switch. (Note - I don’t have a home assistant so I can’t check myself)

      • DeemoOP
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 months ago

        remote UI connection passes through the Home Assistant Central servers, the Central servers could maintain that safety database and off switch

        I think this is how home assistant handles it. When they put out a cve they can update the insecure version list which makes nabucasa refuse remote forwarding (until you update).

        Initially I was just thinking if a open-source project is on github and uses the security disclosure feature if it would be possible to pull data from it and disable remote acess (either by auto shutting down the service or simply disabling routing on a reverse proxy).

        Having a system that does without a security disclosure list from a project maintainer would be far mor difficult like having the proxy disable one of your services if it detects a vulnerability in a dependency.