this post was submitted on 01 Apr 2026
227 points (98.7% liked)

Selfhosted

56958 readers
579 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] esc@piefed.social 64 points 4 weeks ago (10 children)

Don't expose jellyfin to the internet is a golden rule.

[–] Damarus@feddit.org 40 points 4 weeks ago (1 children)

Kinda defeats the purpose of a media server built to be used by multiple people

[–] InnerScientist@lemmy.world 27 points 4 weeks ago (3 children)

Use a VPN, it's not ideal but it's secure.

[–] tiz@lemmy.ml 4 points 4 weeks ago (3 children)

Don’t reverse proxies like pangolin just do the job? Does it have to be VPN in this particular concept? VPN isn’t like immune to vulnerabilities.

[–] radar@programming.dev 10 points 4 weeks ago (1 children)

Reverse proxy doesn't really get you much security. If there is an application level issue a reverse proxy will not help

[–] tiz@lemmy.ml 2 points 4 weeks ago

I see thanks. I’ll think about it more.

[–] r00ty@kbin.life 6 points 4 weeks ago

Reverse proxy will let anyone connect to it. VPN, you can create keys/logins for your intended users only. Having said that, from what I could see, nothing in the security fixes were to do with authentication. I think (just from a cursory look), they could only be exploited, if at all from an authenticated user session.

But personally, something like jellyfin where the number of people I want to be able to access it is very limited, stays behind a VPN. Better to limit your potential attack surface as much as you can.

[–] ohshit604@sh.itjust.works 2 points 4 weeks ago* (last edited 4 weeks ago)

Pangolin is based off of Traefik if I’m not mistaken, should be able to use Traefiks IPAllowlist middleware to blacklist all IP addresses and only whitelisting the known few, that way you can expose your application to the internet knowing you have that restriction in place for those who connect to your service.

[–] faercol@lemmy.blahaj.zone 3 points 4 weeks ago (1 children)

Somehow difficult to install on a TV though.

[–] ramble81@lemmy.zip 3 points 4 weeks ago (1 children)

That’s why you do it at your router or gateway and then set a route for the Jellyfin server through the VPN adapter. That way any device on your network will flow through the tunnel to the Jellyfin server including TVs

[–] faercol@lemmy.blahaj.zone 2 points 4 weeks ago

Which again implies that you have a router that allows you to do so. It's not always the case. For tech enthusiast people that's the case. But not for everyone.

I tried to do the same thing at first, but it was a pain, there were tons of issues.

[–] Auli@lemmy.ca 1 points 4 weeks ago

Yahnlets see a roku use a VPN.

[–] LycaKnight@infosec.pub 11 points 4 weeks ago (1 children)

Yeah, i have my 30 docker containers behind Headscale (Tailscale).

[–] pfr@piefed.social 6 points 4 weeks ago (2 children)
[–] LycaKnight@infosec.pub 1 points 4 days ago

yeah. it did. took a bit. i used headscale initramfs with dropbear for my servers. Didnt find anything for netbird so i copied the headscale initram script and changed it for netbird. But all works now. I like it.

[–] antrosapien@lemmy.ml 2 points 4 weeks ago

I have been planning to check out Netbird for couple of days. Is it a good alternative for headscale and pangolin?

[–] CompactFlax@discuss.tchncs.de 11 points 4 weeks ago* (last edited 4 weeks ago) (2 children)

That’s never made sense to me; why build an authn frontend instead of just clicking your user if the security is just an illusion anyways. “Use a VPN” is fine for a mainframe, but an active project in 2026 should aspire to be better.

Edit: or make note of that on their several pages with reverse proxy configuration.

Examples dating back over six years https://github.com/jellyfin/jellyfin/issues/5415

[–] AHemlocksLie@lemmy.zip 6 points 4 weeks ago

I mean I'm sure they'd like to just ship safe code in the first place. But if that's not their expertise and they demonstrate that repeatedly, we gotta take steps ourselves. Secure is obviously best, but I'd rather have insecure Jellyfin behind a VPN than no Jellyfin at all.

[–] IratePirate@feddit.org 4 points 4 weeks ago* (last edited 4 weeks ago)

It's not this or that. Security comes in layers. So while I would assume that the Jellyfin developers do their best to secure their application, I acknowledge the fact that bugs do exist and that Jellyfin is developed in and for hobbyist contexts, and thus not scrutinised and pentested for vulnerabilities in the way software meant for professional environments would be. Therefore I'll add an extra layer of security by putting it behind a VPN that only whitelisted clients can access. If a vulnerability is detected, I can be sure it hasn't already been exploited to compromise my server because we're all "among friends" there.

[–] Lemmchen@feddit.org 4 points 4 weeks ago (2 children)

The thing is, if you have non-technical users, you have to set up the VPN connection on the client site yourself, maybe on multiple machines and more than once, if they decide to upgrade or even just reset their devices.

[–] esc@piefed.social 6 points 4 weeks ago* (last edited 4 weeks ago) (1 children)

The problem here - it's not me who requires access to my library, if someone isn't willing or able to do it, I'm sorry but that's just how it is. People should stop infantilize non-technical people, absolute majority of them is capable of navigating our world without much problems and I'm willing to help them if help is asked.

If my 60 y.o. mother with close to zero technical skills can do it with limited help (due to distance and other constraints) I'm pretty sure that majority of people with sound mind can.

[–] IratePirate@feddit.org 4 points 4 weeks ago* (last edited 4 weeks ago)

This. And for everyone you just can't figure it out on their own, there's RustDesk for remote assistance. It, too, can be self-hosted.

[–] DreamlandLividity@lemmy.world 5 points 4 weeks ago* (last edited 4 weeks ago)

So use a reverse proxy with authentiacation before access to Jellyfin is allowed. I use Caddy forward_auth with Authelia for this. Unless you also want to use the apps without VPN, this works great.

[–] atzanteol@sh.itjust.works 2 points 4 weeks ago* (last edited 4 weeks ago)

Y'all are assuming the security issue is something exploitable without authentication or has something to do with auth.

But it it could be a supply chain issue which a VPN won't protect you from.

load more comments (5 replies)
[–] Burghler@sh.itjust.works 21 points 4 weeks ago (3 children)

Wonder if it's the Axios one. Sounds like it isn't from their description though hmm

[–] doeknius_gloek@discuss.tchncs.de 14 points 4 weeks ago (1 children)

I don't think so, the previous release 10.11.6 is a few months old and the axios supply chain attack happened yesterday.

[–] Strit@lemmy.linuxuserspace.show 10 points 4 weeks ago

So lets hope this 10.11.7 is not subject to the axios one. :)

[–] rollerbang@lemmy.world 5 points 4 weeks ago (1 children)

Diff agrees, not likely. Might be permisson related, elevation of privileges.

[–] r00ty@kbin.life 6 points 4 weeks ago (2 children)

From a cursory look at just the security commits. Looks like the following:

  • GHSA-j2hf-x4q5-47j3: Checks if a media shortcut is empty, and checks if it is remote and stores the remote protocol if so. Also prevent strm files (these are meant to contain links to a stream) from referencing local files. Indeed this might have been used to reference files jellyfin couldn't usually see?
  • GHSA-8fw7-f233-ffr8: Seems to be similar, except for M3U file link validation and limiting allowed protocols. It also changes the default permissions for live TV management to false.
  • GHSA-v2jv-54xj-h76w: When creating a structure there should be a limit of 200 characters for a string which was not enforced.
  • GHSA-jh22-fw8w-2v9x: Not really completely sure here. They change regex to regexstr in a lot of places and it looks like some extra validation around choosing transcoding settings.

I'm not really sure how serious any of these are, or how they could be exploited however. Well aside from the local file in stream files one.

[–] chuso@fedia.io 2 points 4 weeks ago (1 children)

Yeah, the key seems to be in the comments from one of the changes: https://github.com/jellyfin/jellyfin/commit/0581cd661021752e5063e338c718f211c8929310#diff-bcc2125e56d5738b4778802ac650ca47719845aeee582f3b5c9b46af82ea9979R1176-R1180

It seems there was the potential risk that insufficient validation could allow reading arbitrary server files, which indeed poses a security risk.

However, my understanding is that this could be exploited only by authenticated users with permission to add new media. Not like that's a risk to ignore, but it's not like it could be exploited by anyone on the Internet.

[–] r00ty@kbin.life 2 points 4 weeks ago

However, my understanding is that this could be exploited only by authenticated users with permission to add new media. Not like that's a risk to ignore, but it's not like it could be exploited by anyone on the Internet.

I wonder if that's the reason for setting the default live TV management permission to false. Since that permission might well the the route to adding your own malicious m3u link for that second change.

load more comments (1 replies)
[–] sudoMakeUser@sh.itjust.works 1 points 4 weeks ago

Axios is a Javascript library and Jellyfin is written in C#.

[–] webkitten@piefed.social 14 points 4 weeks ago

Pretty flawless update from the apt repo on my end.

Server version 10.11.7  
[–] varnia@lemmy.blahaj.zone 12 points 4 weeks ago (2 children)

There is a good reason I only have Jellyfin and other services accessible via valid Client Certificate.

[–] daniskarma@lemmy.dbzer0.com 4 points 4 weeks ago (1 children)

Does it work with android and TV apps?

I tried long ago and failed.

[–] varnia@lemmy.blahaj.zone 4 points 4 weeks ago* (last edited 4 weeks ago)

No, we only use Jellyfin via browser. Unfortunately even with imported Client Cert, Android apps won't work.

Edit: Client Certs need to be implemented per App. There is a feature request from 2022 https://features.jellyfin.org/posts/1461/capability-to-specify-client-certificate-for-android-client

load more comments (1 replies)
[–] cholesterol@lemmy.world 10 points 4 weeks ago (1 children)

In the raspian repos, just updated, thanks.

[–] Strit@lemmy.linuxuserspace.show 8 points 4 weeks ago

also in the docker repository.

[–] Decronym@lemmy.decronym.xyz 4 points 4 weeks ago* (last edited 4 days ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
Git Popular version control system, primarily for code
HTTP Hypertext Transfer Protocol, the Web
IP Internet Protocol
NFS Network File System, a Unix-based file-sharing protocol known for performance and efficiency
Plex Brand of media server package
RPi Raspberry Pi brand of SBC
SBC Single-Board Computer
SMB Server Message Block protocol for file and printer sharing; Windows-native
SSH Secure Shell for remote terminal access
SSL Secure Sockets Layer, for transparent encryption
TLS Transport Layer Security, supersedes SSL
VPN Virtual Private Network
VPS Virtual Private Server (opposed to shared hosting)
nginx Popular HTTP server

12 acronyms in this thread; the most compressed thread commented on today has 13 acronyms.

[Thread #203 for this comm, first seen 1st Apr 2026, 09:50] [FAQ] [Full list] [Contact] [Source code]

[–] roserose56@lemmy.zip 3 points 4 weeks ago (1 children)

Im on fedora and I have installed through dnf, no updates with the dnf update..... should I wait?

[–] gigachad@piefed.social 4 points 4 weeks ago (2 children)

I depends a bit on your threat model. If you have Jellyfin exposed to the internet I would shut it down immediately. If you are running locally and rely on it, let it run maybe? If behind a tailnet or some other VPN, I would deactivate it as well. If it is an Axios like vulnerability it may be possible your secrets are in danger, dependent on how well they are secured. Not a security expert, but I would handle this a little more conservative...

[–] somehacker@lemmy.world 5 points 4 weeks ago

No need to shut it down if it’s not exposed to the internet. Tailnet/VPN is fine.

If it’s a supply chain compromise shutting it down wouldn’t matter. The damage is already done.

[–] roserose56@lemmy.zip 1 points 4 weeks ago

It's on my home, which is not 24/7 open. Will see check later.

[–] lmr0x61@lemmy.ml 2 points 4 weeks ago

The update rolled out perfectly for my Kubernetes setup (using the Docker image). 👍

load more comments
view more: next ›