I’m having trouble staying on top of updates for my self hosted applications and infrastructure. Not everything has auto updates baked in and some things you may not want to auto update. How do y’all handle this? How do you keep track of vulnerabilities? Are there e.g. feeds for specific applications I can subscribe to via RSS or email?

  • bigDottee@geekroom.tech
    link
    fedilink
    English
    arrow-up
    2
    ·
    18 hours ago

    I’ve just started to delve into Wazuh… but I’m super new to vulnerability management on a home lab level. I don’t do it for work so 🤷🏼‍♂️

    Anyways, best suggestion is to keep all your containers, vms, and hosts updated best you can to remediate vulnerabilities that are discovered by others.

    Otherwise, Wazuh is a good place to start, but there’s a learning curve for sure.

  • tuxec@infosec.pub
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    22 hours ago

    There are a couple of things to cover here:

    1. Keep your software/containers up to date. You can subscribe to the GitHub repo and configure it to get notified for new releases and security alerts. Complementary, you can use RSS feeds, newteleases.io and/or WUD (What’s Up Docker) and add labels to your docker compose files. Personally, I check the notification once a week and change the version for all minor tools I’m using. If there is a major release (or new Immich version) I read the changelog and update instructions (if it’s the case).

    2. For container security scans, you can use Trivy, but the problem is that you don’t have a centralized overview of your scan results. For this you can use DefectDojo. Depending on the case/threat model, vulnerability management for self-hosted things might be overkill, but highly recommended of you want to learn more about this. It worth mentioning Trufflehog as secrets scanner and sops as a solution to encrypt sensitive data so you can push it to git/SCM.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    24
    ·
    edit-2
    3 days ago

    Does badly count as a way?

    I kinda keep an eye on that https://selfh.st/ post that does a weekly roundup of stuff to know when I need to do patching.

    No doubt there is a container I could run that would do it for me. I just can’t remember the name of it.

  • lambalicious@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    15
    ·
    3 days ago

    I don’t.

    Yeah, hot take, but basically there’s no point to me having to keep track of all that stuff and excessively worry about the dangers of modernity and sacrifice the spare time I have on watching update counter go brrrr of all things, when there’s entire peoples and agencies in charge of it.

    I just run unattended-upgrades (on Debian), pin container image tags to only the major version number where available, run rebuild of containers twice a week, and go enjoy the data and media I built the containers and installed for software for.

    • 9488fcea02a9@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      3 days ago

      I think the problem is that a lot of people are just running flatpaks, dockers, and third party repos which might not be getting timely updates.

      I try to stick to debian packages for everything as much as possible for this reason.

      • lambalicious@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 days ago

        Regarding things like dockers and flatpaks, I mostly “solve” it by only running official images, or at least images from the same dev as the program, where possible.

        But also IMO there’s little to no reason to fear when using things like flatpaks. Most exploits one hears of nowadays are of the kind “your attacker needs to get a shell into your machine in the first place” or in some cases evn “your attacker needs to connect to an instance of a specific program you are running, with a specific config”, so if you apply any decent opsec that’s already a v high barrier of entry.

        And speaking of Debian, that does bring to mind the one beef I have with their packaging system: that when installing a package it starts the related services by default, without even giving you time to configure them.

  • F04118F@feddit.nl
    link
    fedilink
    English
    arrow-up
    4
    ·
    3 days ago

    GitOps + Renovate.

    Tools that allow you to work GitOps (everything is defined in text files in Git) are:

    • Kubernetes
    • NixOS
    • to a lesser degree, Ansible

    Here’s a nice starter template for running your own Kubernetes cluster via GitOps with Renovate pre-configured: https://github.com/onedr0p/cluster-template

  • Darkassassin07@lemmy.ca
    link
    fedilink
    English
    arrow-up
    11
    ·
    3 days ago

    95% of things I just don’t expose to the net; so I don’t worry about them.

    Most of what I do expose doesn’t really have access to any sensitive info; at most an attacker could delete some replaceable media. Big whoop.

    The only thing I expose that has the potential for massive damage is OpenVPN, and there’s enough of a community and money invested in that protocol/project that I trust issues will be found and fixed promptly.

    Overall I have very little available to attack, and a pretty low public presence. I don’t really host any services for public use, so there’s very little reason to even find my domain/ip, let alone attack it.

  • K3CAN@lemmy.radio
    link
    fedilink
    English
    arrow-up
    4
    ·
    3 days ago

    There are some tools to help, but things are sort of specific to particular aspects. Lynis for general systems, ntopng for networks, and such.

    For 90% of stuff, though, you can just stick to stable repos and upgrade on a schedule and you’ll be alright.

  • LiveLM@lemmy.zip
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    3 days ago
    • VPN only, nothing exposed
    • Host runs openSUSE MicroOS which updates itself daily
    • Watchtower updates the containers daily and if something blows up so be it, except for Nextcloud as everyone says it’s brittle as hell.
  • Lucy :3@feddit.org
    link
    fedilink
    English
    arrow-up
    6
    ·
    3 days ago

    How do I do it? Everything’s installed and updated via pacman/the AUR, including python packages and nextcloud apps. The only thing I don’t install via that way is Firefox addons.

    • N0x0n@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      3 days ago

      The only thing I don’t install via that way is Firefox addons.

      Any specific reason why? Yesterday I installed LibreWolf and saw at the same time a few addons in the AUR.

      Do you know what’s the difference from an AUR addon or the official Firefox addon repo?

      I guess It would be for security reasons because you never know if someone has tempered with the addon.

      • Lucy :3@feddit.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 days ago

        Simply because I haven’t bothered searching for the extensions I have in the AUR. And some extensions aren’t in there (namely 7tv, augmented steam, blacklist autoclose, defund wikipedia, kagi, peertube companion, tampermonkey and unload tabs).

  • bluGill@fedia.io
    link
    fedilink
    arrow-up
    1
    ·
    2 days ago

    I put all my data on a NAS with non-writable snapshots so hackers cannot destroy my data.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 days ago

      What happens if they compromise your device in secret and use it as part of a botnet? Lots of state backed attacks rely on traffic relays provided by compromised devices.

      • bluGill@fedia.io
        link
        fedilink
        arrow-up
        1
        ·
        2 days ago

        My NAS is behind a firewall and doesn’t normally run the types of things you would compromise. (no web browser). They need to break many things at the same time to compromise it. I’m not saying it would be impossible to compromise my NAS, but is is very unlikely just because of how difficult it is. If I’m target of a state level attack I’m sunk anyway.

        though offline backups are always a good idea. However they by definition need several days to restore (if they take less than that they are too easy for an attacker to target)

  • enumerator4829@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 days ago

    Unless you have actual tooling (i.e. RedHat erratas + some service on top of that), just don’t even try.

    Stop downloading random shit from dockerhub and github. Pick a distro that has whatever you need packaged, install from the repositories and turn on automatic updates. If you need stuff outside of repos, use first party packages and turn on auto updates. If there aren’t any decent packages, just don’t do it. There is a reason people pay RedHat a shitton of money, and that’s because they deal with much of this bullshit for you.

    At home, I simply won’t install anything unless I can enable automatic updates. Nixos solves much of it. Two times a year I need to bump the distro version, bump the nextcloud release, and deal with depreciations, and that’s it.

    I also highly recommend turning on automatic periodic reboots, so you actually get new kernels running…

  • sugar_in_your_tea@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    3 days ago

    I just update every month or two, or whenever I remember. I use Docker/podman, and I set the version to whatever minor release I’m using, and manually bump after checking the release notes to look for manual upgrade steps.

    It usually takes 5 min and that’s with doing one at a time.

  • catloaf@lemm.ee
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 days ago

    That’s the neat part. I don’t!

    I have automatic updates on everything, but if I actually spent time managing updates and vulnerabilities I’d have no time to do anything else in my life.

  • N0x0n@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 days ago

    For my docker containers I use what’s up docker which not only alerts me when there is an update but also give a link to the changes, so I can have a look what’s happening !

    For my system itself… Just doing sudo pacman -Syu. Though that’s not great, cause some updates can potentially break my EndeavourOS system… I keep sometimes an eye on the forum when I see some critical changes like the kernel itself or nvidia updates though.