I don't know who needs to hear this, but DO NOT EVER expose Jellyfin to the internet
Collection of potential security issues in Jellyfin This is a non exhaustive list of potential security issues found in Jellyfin. Some of these might cause controversy. Some of these are design fla...
like this
walden
in reply to Scary le Poo • • •Mark
in reply to walden • •like this
hornface and TVA like this.
Technology reshared this.
Mora
in reply to walden • • •like this
gonzo-rand19, hornface and TVA like this.
beek
in reply to walden • • •like this
hornface and TVA like this.
Zozano
in reply to walden • • •I'm also an absolute dumbfuck. And I can confidently tell you, as a matter of fact, that I don't know.
I'm running SWAG reverse proxy, my DNS is not tunneled, I share my Jellyfin with others outside my network.
My primary concern is my server gets hacked, or I get charged with distributing 'public domain movies'
like this
TVA and SaltySalamander like this.
Flax
in reply to Zozano • • •Hacking, even on an insecure system, would be illegal. Any copyright troll trying to sue a single user for having a private jellyfin instance which they hacked to find out about would probably have a hard time actually making a case.
"Yeah, this one guy was distributing films to himself and a few friends. I know because I hacked him" doesn't seem like a good case.
https://links.rocks/u/paperemail
in reply to walden • • •Not unless the reverse proxy adds some layer of authentication as well. Something like HTTP basic auth, or mTLS (AKA 2-way TLS AKA client certificates)
For nginx: docs.nginx.com/nginx/admin-gui…
so if I add a user ”john” with password “mypassword” to video.example.com, you can try adding the login as: “https://john:mypassword@video.example.com”
Most HTTP clients (e.g. browsers) support adding login like that. I don’t know what other jellyfin clients do that.
The other option is to set up a VPN (I recommend wireguard)
Restricting Access with HTTP Basic Authentication
docs.nginx.comlike this
TVA likes this.
jagged_circle
in reply to • • •You can't do that with jellyfin.
Basic auth doesn't work with jellyfin. Its a bug. Enable it on your reverse proxy, and jellyfin breaks. Devs closed it as wontfix
spit_evil_olive_tips
in reply to walden • • •short answer: no, not really
long answer, here's an analogy that might help:
you go to
https://yourbank.com
and log in with your username and password. you click the button to go to Online Bill Pay, and tell it to send ACME Plumbing $150 because they just fixed a leak under your sink.when you press "Send", your browser does something like send a POST request to
https://yourbank.com/send-bill-payment
with a JSON blob like{"account_id": 1234567890, "recipient": "ACME Plumbing", "amount": 150.0}
(this is heavily oversimplified, no actual online bank would work like this, but it's close enough for the analogy)and all that happens over TLS. which means it's "secure". but security is not an absolute, things can only be secure with a particular threat model in mind. in the case of TLS, it means that if you were doing this at a coffee shop with an open wifi connection, no one else on the coffeeshop's wifi would be able to eavesdrop and learn your password.
(if your threat model is instead "someone at
... Show more...short answer: no, not really
long answer, here's an analogy that might help:
you go to
https://yourbank.com
and log in with your username and password. you click the button to go to Online Bill Pay, and tell it to send ACME Plumbing $150 because they just fixed a leak under your sink.when you press "Send", your browser does something like send a POST request to
https://yourbank.com/send-bill-payment
with a JSON blob like{"account_id": 1234567890, "recipient": "ACME Plumbing", "amount": 150.0}
(this is heavily oversimplified, no actual online bank would work like this, but it's close enough for the analogy)and all that happens over TLS. which means it's "secure". but security is not an absolute, things can only be secure with a particular threat model in mind. in the case of TLS, it means that if you were doing this at a coffee shop with an open wifi connection, no one else on the coffeeshop's wifi would be able to eavesdrop and learn your password.
(if your threat model is instead "someone at the coffeeshop looking over your shoulder while you type in your password", no amount of TLS will save you from that)
but with the type of vulnerability Jellyfin has, someone else can simply send their own POST request to
https://yourbank.com/send-bill-payment
with{"account_id": 1234567890, "recipient": "Bob's Shady Plumbing", "amount": 10000.0}
. and your bank account will process that as you sending $10k to Bob's Shady Plumbing.that request is also over TLS, but that doesn't matter, because that's security for a different level of the stack. the vulnerability is that you are logged in as account 1234567890, so you should be allowed to send those bill payment requests. random people who aren't logged in as you should not be able to send bill payments on behalf of account 1234567890.
troed
in reply to Scary le Poo • • •It's a list from 2021 and as a cybersec researcher and Jellyfin user I didn't see anything that would make me say "do not expose Jellyfin to the Internet".
That's not to say there might be something not listed, or some exploit chain using parts of this list, but at least it's not something that has been abused over the last four years if so.
like this
SaltySalamander and bizarroland like this.
Scary le Poo
in reply to troed • • •The last set of comments is from 2024. These have not been addressed. The fact that it is possible to stream without auth is just bonkers.
The entirity of jellyfin security is security via obscurity which is zero security at all.
"As a cybersec researcher", the limp wristed, hand wavy approach to security should be sending up alarm bells. The fact that it doesn't, means that likely either, you don't take your research very seriously, or you aren't a "cybersecurity researcher".
"Thank you for this list. We are aware of quite a few, but for reasons of backwards compatibility they've never been fixed. We'd definitely like to but doing so in a non-disruptive way is the hard part."
Is truly one of the statements of all time.
like this
gonzo-rand19, TVA and bizarroland like this.
bizarroland
in reply to Scary le Poo • • •You can't say that a solution is no security at all when it requires time and intelligence to bypass.
It is at least 0.01 security.
whats_all_this_then
in reply to bizarroland • • •like this
bizarroland likes this.
bizarroland
in reply to whats_all_this_then • • •LandedGentry
in reply to bizarroland • • •You’re hiding behind literal definitions to avoid addressing the functional issue/implications.
This is like when somebody says “no one believes that“ and the other person finds a tweet by one person that believes the thing. The claim isn’t that literally not one person does, it’s that it’s so unusual you may as well act as if nobody does.
Surely you understand how people talk and basic vernacular?
Pudutr0n
in reply to LandedGentry • • •like this
bizarroland likes this.
bizarroland
in reply to LandedGentry • • •Surely you understand how a stupid response to a silly statement like it is one of the sayings of all time can be appropriate in humorous situations, right?
I understand that you did not find it funny, but I hope that you can understand that it was my intention to be funny, and therefore a serious response is disproportionate.
LandedGentry
in reply to bizarroland • • •bizarroland
in reply to LandedGentry • • •Kusimulkku
in reply to LandedGentry • • •like this
bizarroland likes this.
LandedGentry
in reply to Kusimulkku • • •Pudutr0n
in reply to LandedGentry • • •bizarroland likes this.
LandedGentry
in reply to Pudutr0n • • •Pudutr0n
in reply to LandedGentry • • •bizarroland likes this.
LandedGentry
in reply to Pudutr0n • • •I’d love to see your homework on that. Must be really interesting data points here. I’d love the ability to prove my opinions and ramblings on the Internet are “objectively true.”
All this BS aside I was clearly wrong because they said so. It was a mistake. You’re going to survive.
Pudutr0n
in reply to LandedGentry • • •I'm sorry if I made you upset. Honestly.
Ofc I have no work regarding that because I was shitposting. I was hoping you'd take things a bit more lightly.
Personally, I'm a bit within the autism spectrum. When I was a kid I had a lot of trouble with some social hints that other people seemed to pick up really fast. With time some of those things I've learnt to pick up better, and others not so much. Also got bullied and that wasn't fun.
My impression of this situation is that you misread a social hint, which is fine, and then got a little bit defensive about it, which is also fine. I can understand that. Has happened to me a billion times and I'm not as graceful as you are.
It's just like.. For me it was better to, at some point, stop resisting the pain of accepting I didn't read these things as well as others did and just admitting "sorry, sometimes i don't get when ppl are joking" because it reminded me of being in the spectrum and therefore different... For me, this was unthinkable... So I kept insisting on points when many others were telling me, with rel
... Show more...I'm sorry if I made you upset. Honestly.
Ofc I have no work regarding that because I was shitposting. I was hoping you'd take things a bit more lightly.
Personally, I'm a bit within the autism spectrum. When I was a kid I had a lot of trouble with some social hints that other people seemed to pick up really fast. With time some of those things I've learnt to pick up better, and others not so much. Also got bullied and that wasn't fun.
My impression of this situation is that you misread a social hint, which is fine, and then got a little bit defensive about it, which is also fine. I can understand that. Has happened to me a billion times and I'm not as graceful as you are.
It's just like.. For me it was better to, at some point, stop resisting the pain of accepting I didn't read these things as well as others did and just admitting "sorry, sometimes i don't get when ppl are joking" because it reminded me of being in the spectrum and therefore different... For me, this was unthinkable... So I kept insisting on points when many others were telling me, with relative compassion, that I may have made a mistake.
I don't care about the issue we were talking about anymore. Just want you to understand that even if I do believe you made a mistake in reading the situation, It's not what I now consider relevant of this conversation, don't think you were wrong in your perspective regarding security and I'm not laughing at you. I'm not doing anything at your expense. Just sharing a personal difficulty with you for your own possible benefit.
Idk if you can relate, but if you can maybe it could help.
Peace, friend, and have a great week. ❤
bizarroland likes this.
LandedGentry
in reply to Pudutr0n • • •I’m not upset, you’re just being annoying. And for somebody who says you don’t care or otherwise not invested in all of this, this comment is pretty damn long. So I skipped to the end, have a great rest of your week as well I guess. Assuming you’re actually being sincere.
And before you complain that it’s disrespectful of me to not even read what you wrote or whatever, frankly I found it very disrespectful that you opened up by trying to make me sound emotional and unable to process this rationally and tried to diagnose me (which as someone with autism I’m sure you understand how problematic that is to do to a stranger online after like 2 comments).
A lot of this is simply a really rude Internet argument tactic that I don’t appreciate. I’m calm. I’m being rational. You’re just being rude and again, problematic.
Pudutr0n
in reply to LandedGentry • • •No, you misunderstood. I do care, but not about the issue.
About you.
I could be wrong about the issue.
bizarroland likes this.
Pudutr0n
in reply to LandedGentry • • •I'm sorry I upset you, but yes, you were coming off a little emotional.
I didn't mean to be rude.
What I shared was a personal story about my life which is painful for me to remember. I don't go around sharing shit stuff with people who want to harm me. I share it with people who i think could benefit from it.
I really hope you have an awesome day cause to me, regardless of anything that's been said, you seem like an awesome person. ❤
bizarroland likes this.
LandedGentry
in reply to Pudutr0n • • •I’m going to try and take a step back here and really give you a more charitable interpretation.
I am sorry I had such a reaction in some ways. I do not appreciate the implications and accusations you threw my way, but I can believe that they were not meant to be like that and I can get past it. Have a good rest of your week.
Pudutr0n
in reply to LandedGentry • • •bizarroland likes this.
whats_all_this_then
in reply to bizarroland • • •B0rax
in reply to whats_all_this_then • • •like this
bizarroland likes this.
Scary le Poo
in reply to B0rax • • •B0rax
in reply to Scary le Poo • • •Link
in reply to Scary le Poo • • •How is someone meant to guess what seems to be a randomly generated id? If they try to brute force it then you could probably set up something like fail2ban to block them after a few failed attempts.
I’m not saying video ids shouldn’t require authentication, they should but the risk of someone getting the video id seems fairly low.
Scary le Poo
in reply to Link • • •It isn't randomly generated. If you read through you would have known that.
Also, Rainbow tables.
tldr, Rainbow tables are precomputed lists of hashed values used to crack password hashes quickly. Instead of hashing each password guess on the fly, attackers use these tables to reverse hashes and find the original passwords faster, especially for weak or common ones. They're less effective against hashes protected by a unique salt.
i_am_not_a_robot
in reply to Scary le Poo • • •like this
bizarroland likes this.
Clent
in reply to i_am_not_a_robot • • •How unique do you suppose file system paths are?
How many hashes would one need to gather to quickly determine the root path for all files? Paths are not random so guessing the path is just a rainbow table.
The scanning for known releases becomes trivial once the file system pattern is known.
lazynooblet
in reply to Clent • • •like this
bizarroland likes this.
i_am_not_a_robot
in reply to lazynooblet • • •like this
bizarroland likes this.
i_am_not_a_robot
in reply to Clent • • •If the server is using a standard path prefix and a standard file layout and is using standard file names it isn't that difficult to find the location of a media file and then from there it would be easier to find bore files, assuming the paths are consistent.
But even for low entropy strings, long strings are difficult to brute force, and rainbow tables are useless for this use case.
deadcade
in reply to troed • • •Fully agreed. There's some stuff in the list that could leak server info or metadata about available content to the public, but the rest seems to require some knowledge before being able to exploit it, such as user IDs.
That doesn't mean these aren't issues, but they're not "take your jellyfin down now" type issues either.
ToadOfHypnosis
in reply to troed • • •ilega_dh
in reply to troed • • •Agreed, this is a valid list of minor concerns but this is just a fearmongering post. It’s not good that some metadata can leak but if you take normal precautions (i.e. don’t run this next to your classified information storage) it’s fine to open this so your friends can watch media.
Source: me and my Masters degree in cybersecurity (but apparently OP just learned about Kerckhoff’s principle and rainbow tables in a completely incorrect context so I know how to do my job or smth lmao)
Edit: lol don’t look at OPs post history, now I know where the fearmongering came from
like this
troed likes this.
Domi
in reply to ilega_dh • • •https://lemmy.saik0.com/u/Saik0Shinigami
in reply to ilega_dh • • •Source: R1 masters professor. Literally the person you would have needed to take the class from on the topic at my institution.
This is a problem simply because most paths and names will be similar due to *arr suites and docker mounts normalizing them to a standard that jellyfin wants to see. In the context of Sony's top 1000 movies, they can pre-compile the top 100 likely paths for the file (/movies, /mnt/movies, etc) then run the 100000 hash check through scripts against your instance. How long does it take to let a crawler collect http statuses on 100000 page loads? Now put that to a bot that gets jellyfin instances from a tool like shodan and add more hashes. If you flag, now onus is on you to prove you have license for content and they would have a case that you distributing (albeit weak) since your server was open to the public. This is child's play level abuse-able. Risking that something easy like this isn't being abused by Sony and others (you know... willing to install a rootkit on your computer types...) is a very silly stance to take.
The hash that's used t
... Show more...Source: R1 masters professor. Literally the person you would have needed to take the class from on the topic at my institution.
This is a problem simply because most paths and names will be similar due to *arr suites and docker mounts normalizing them to a standard that jellyfin wants to see. In the context of Sony's top 1000 movies, they can pre-compile the top 100 likely paths for the file (/movies, /mnt/movies, etc) then run the 100000 hash check through scripts against your instance. How long does it take to let a crawler collect http statuses on 100000 page loads? Now put that to a bot that gets jellyfin instances from a tool like shodan and add more hashes. If you flag, now onus is on you to prove you have license for content and they would have a case that you distributing (albeit weak) since your server was open to the public. This is child's play level abuse-able. Risking that something easy like this isn't being abused by Sony and others (you know... willing to install a rootkit on your computer types...) is a very silly stance to take.
The hash that's used to represent the path isn't salted or otherwise unique.
Edit: mobile typos.
Dempf
in reply to • • •ReversalHatchery
in reply to ilega_dh • • •oh yeah I'm pretty sure the majority of users bought a dedicated machine for Jellyfin
LandedGentry
in reply to Scary le Poo • • •Pete Hahnloser
in reply to Scary le Poo • • •Who has the technical wherewithal to run Jellyfin but leaves access on the open web? I get that sharing is part of the point, but no one's putting their media collection on an open FTP server.
The level of convenience people expect without consequences is astounding. Going to be away for home for a few days? Load stuff onto an external SSD or SD card. Phoning home remotely makes no sense.
LandedGentry
in reply to Pete Hahnloser • • •PolarisFx
in reply to LandedGentry • • •LandedGentry
in reply to PolarisFx • • •PolarisFx
in reply to LandedGentry • • •LandedGentry
in reply to PolarisFx • • •Yeah if I was just serving myself I would’ve probably stuck with Jellyfin, but my wife and kids also use my server. Because of it we pay exactly $0 a month in subscriptions. Plex lifetime pass was a very easy decision to make.
If they do a complete heel turn tomorrow and fuck us all, I could simply shut it down. The money I’ve saved so far has been worth it.
Flax
in reply to LandedGentry • • •LandedGentry
in reply to Flax • • •ReversalHatchery
in reply to LandedGentry • • •LandedGentry
in reply to ReversalHatchery • • •Kusimulkku
in reply to Pete Hahnloser • • •Waryle
in reply to Pete Hahnloser • • •My Jellyfin server is behind Cloudflare with IP outside of my country banned.
I got Crowdsec set up on Cloudflare, Traefik and Debian directly.
I got Jellyfin up in a docker container behind Traefik, my router opens only 80 and 443 ports and direct them to Traefik.
Jellyfin has only access to my media files which are just downloaded movies and shows hardlinked by Sonarr/Radarr from my download folder.
It is publicly exposed to be able to watch it from anywhere, and share it to family and friends.
So what? They might access the movies, even delete them, I don't care, I'll just hardlink them back or re-download them. What harm can they do that would justify locking everything down?
kratoz29
in reply to Scary le Poo • • •P03 Locke
in reply to kratoz29 • • •Chastity2323
in reply to kratoz29 • • •https://lemmy.saik0.com/u/Saik0Shinigami
in reply to Chastity2323 • • •Yes... because you can take the raw request your browser makes... remove your auth cookie and replay the same request and it fails.
Closed source doesn't mean that it can't be tested for problems. Just means that you can't go to the code to understand why it's a problem. You can still see that the problem exists (or doesn't in this case).
Edit: I haven't tested every api endpoint myself... but for video files it doesn't work. It's not vulnerable to the same thing that JF is in that specific case.
kratoz29
in reply to Chastity2323 • • •It is if you have compared them together.
I haven't recently thought and I am a lifetime Plex pass user (we will see what lifetime truly means sooner or later) and I have still been unaffected by most of the changes Plex has done (watch together is the 1st valuable feature that I have lost), so if you can't expose Jellyfin then it is not better than Plex for me.
t3rmit3
in reply to kratoz29 • • •ReversalHatchery
in reply to t3rmit3 • • •aaaand now you smart tv can't connect. none of them. the clients dont even support http basic auth creds put into the URL for some crazy reason.
for advanced HTTP-level authentication you would need to run a reverse proxy on the TV's network that would add the authentication info.
for the VPN idea you would need to tunnel the TV's network's internet connection at the router. or set up a gateway address in the TVs network settings that would do that. or use a reverse proxy here too so that it repeats the request to the real server.
but honestly, this is the real and only secure way anyway. I wouldn't be comfortable to expose jellyfin even if the devs are real experts. I mean vulns get discovered, in dotnet, jellyfin dependencies, linux filesystem, and reverse proxy, and honestly who has time to always tightly keep up to date with all that.
that's not to discount the seriousness of the issue though, it's a real shame that jellyfin is so much against security
kratoz29
in reply to t3rmit3 • • •tensei
in reply to Scary le Poo • • •𝓔𝓶𝓶𝓲𝓮
in reply to Scary le Poo • • •I think you can IP whitelist who can access it no? That should solve any problems
There is zero (0) chance of an attacker to know and then spoof address of your friend unless you have even bigger problems. Good filter should simply not respond to any packets making very existence of exploitable site undetectable.
Scary le Poo
in reply to 𝓔𝓶𝓶𝓲𝓮 • • •Mark doesn't like this.
Mark
in reply to Scary le Poo • •Technology reshared this.
BCsven
in reply to Scary le Poo • • •You can pay for true static, but I have probably had the same IP for 5 years, and same with the modem/routerbeforre this one.
like this
Mark likes this.
jherazob
in reply to 𝓔𝓶𝓶𝓲𝓮 • • •𝓔𝓶𝓶𝓲𝓮
in reply to jherazob • • •unbuckled
in reply to jherazob • • •ReversalHatchery
in reply to unbuckled • • •Flax
in reply to Scary le Poo • • •unbuckled
in reply to Flax • • •Flax
in reply to unbuckled • • •natch
in reply to Flax • • •You can always funnel all your VPN traffic through a more typical port, like 80, and there's very little anyone can do to distinguish between your traffic and typical web traffic.
If your ISP causes issues with inbound traffic to your home network, just add another link to the chain to include a cloud-hosted server, or host it all entirely in the cloud (if you find a trustworthy one with a reasonable cost).
ReversalHatchery
in reply to Flax • • •anarchiddy
in reply to Scary le Poo • • •I'm not sure who needs to hear this, but unless you work as a security engineer or in another security-focused tech field, you really shouldn't be exposing your homelab to the open internet anyway
Most people access their homelabs via VPN - i don't see anything here that's a problem for that use-case.
ocean
in reply to anarchiddy • • •anarchiddy
in reply to ocean • • •jagged_circle
in reply to anarchiddy • • •GiuseppeAndTheYeti
in reply to Scary le Poo • • •https://lemmy.saik0.com/u/Saik0Shinigami
in reply to GiuseppeAndTheYeti • • •If you use normalized paths/file names (through *Arr stacks or docker mounts or otherwise common tools), then the hash that jellyfin sets up when it imports that media can be guessable. If someone was to go and precompile a list of hashes for content that they're looking for at common paths that people store their files at, they can ask your server for those hashes, and if their list is sufficiently large enough to include the path that you used, your jellyfin instance WILL RESPOND WITHOUT AUTHENTICATION.
I've been using this example because it shows how silly this is.
In the context of Sony’s top 1000 movies, they can pre-compile the top 100 likely paths for the file (/movies, /mnt/movies, etc) then run the 100000 hash check through scripts against your instance. How long does it take to let a crawler collect http statuses on 100000 page loads? Now put that to a bot that gets jellyfin instances from a tool like shodan and add more hashes. If you flag, now onus is on you to prove you have license for content and they would have a case that you distributing (albei
... Show more...If you use normalized paths/file names (through *Arr stacks or docker mounts or otherwise common tools), then the hash that jellyfin sets up when it imports that media can be guessable. If someone was to go and precompile a list of hashes for content that they're looking for at common paths that people store their files at, they can ask your server for those hashes, and if their list is sufficiently large enough to include the path that you used, your jellyfin instance WILL RESPOND WITHOUT AUTHENTICATION.
I've been using this example because it shows how silly this is.
In the context of Sony’s top 1000 movies, they can pre-compile the top 100 likely paths for the file (/movies, /mnt/movies, etc) then run the 100000 hash check through scripts against your instance. How long does it take to let a crawler collect http statuses on 100000 page loads? Now put that to a bot that gets jellyfin instances from a tool like shodan and add more hashes. If you flag, now onus is on you to prove you have license for content and they would have a case that you distributing (albeit weak) since your server was open to the public. This is child’s play level abuse-able. Risking that something easy like this isn’t being abused by Sony and others (you know… willing to install a rootkit on your computer types…) is a very silly stance to take.
The answer to some of this is that you can just hide the content on a more complicated and less likely to guess path. That will sufficiently change the MD5 hashes enough that you should be more or less unguessable... Instead of using
/mnt/media/movies
(or /media/movies, or /movies/, etc...) make the path/mnt/k9RKiQvUwLVCjSqhb2gWTwstgKuDJx59S3J35eFzW2dgSSp84EG7PPAhf2MwCySt/media/movies
. (obviously don't use this one... use a random generator. Make your own.)The real answer should be that Jellyfin requires that all those endpoint need authorization/login. But their answer is "We don't want to break backwards compatibility. So we won't." Which is a bit silly of an answer. Those who use the default installation and organize their content with *arr suites (or with default docker settings/guide settings), are most likely to have guessable MD5 hashes and are most at risk.
Edit: Oh and the other point... if the "response" against this is "well that would take too long, or be too hard. You'd need a lot of money to find all these instances and test them...". We're talking about the likes of Sony... The ones that installed rootkits on peoples computers for daring to put a CD into a CD-ROM drive. They're litigious folk, and will bury you in paper and sue you to oblivion. It's not a lot of machine time to test a single server. Setting up a couple dozen scanners and just letting it go to find content on it's own isn't that bad from a computational standpoint.
And another argument I've seen here...
"Well if they hack your server then that's illegal too, can't make a lawsuit out of that"... Except this is normal web operations. Bots and site scanners aren't illegal. Nor do they break any authentication mechanism (which is illegal) to do this. Specifically putting this behind authentication would make you correct. But Jellyfin didn't do that (yet). So guess what. It's perfectly possible for them to setup a few scanners across a few servers and do this 100% legally.
Security through obscurity isn't security.
Edit2: Clarification on not using the path I just gave... make up your own random gibberish.
GiuseppeAndTheYeti
in reply to • • •I think I understand now. Thank you! I will be changing my paths then. It's kind of a moot point since I'll change my paths anyway, but for the sake of my own curiosity, i have a follow up question. Feel free to disregard it if you don't feel like taking the time to answer.
Hypothetically, my docker setup only allows jellyfin to see /mnt/user as /storage. So jellyfin would report the path to Morbius as being:
/storage/hdd1/media/movies/Morbius_all_morbed_up.mkv
when in all actuality it would be:
/mnt/user/hdd1/media/movies/Morbius_all_morbed_up.mkv
My intuition tells me that the file path that jellyfin "sees" would be the security risk. So "/storage/hdd1/...." Is that correct?
jagged_circle
in reply to GiuseppeAndTheYeti • • •Or you become part of a bonnet and attack your own government's military. Then you get some very angry knocks on your door and a black back over your face.
And, if you're brown, probably some electrodes on your genitals until you sign a written confession.
kingthrillgore
in reply to Scary le Poo • • •HappyTimeHarry
in reply to Scary le Poo • • •If my server is already open to everyone, what kind of potential attacks do i need to be worried a about? I dont keep personal files on my streaming server, its just videos, music and isos/roms. I dont restrict sign ups, so the idea of an unauthorized user doing something like download a video is a non issue for me really.
I do see where there could be problems for folks running jfin on the same server they keep private photos or for people who charge users for acess, but thats not me.
Am i missing something or is the main result of most of these that a "malicious" actor could dowload files jellyfin has access to without authentication?
https://lemmy.saik0.com/u/Saik0Shinigami
in reply to HappyTimeHarry • • •With unrestricted signups, they can obtain their own account easily. With their own account they can enumerate all your other users.
If they have their own account they can just find your instance, make a login, collect all the proof they need that you're hosting content you don't own (illegally own) then serve you a court summons and ruin your life.
I wouldn't worry about the vulnerability in the link since your already wide open. But I wouldn't leave Jellyfin wide open either. Movie and TV studios are quite litigious.
I hope you're at least gatekeeping behind a vpn or something.
Edit: typo
jagged_circle
in reply to HappyTimeHarry • • •I guess the worst thing is that your server starts attacking the US military servers because you've become part of a botnet.
That happened to my friend one time when I installed Linux on his computer. He made the username and password the same 4-character word. Got a letter from the DoD.
I dont think they would be so forgiving these days. Especially if you're brown.
easily3667
in reply to Scary le Poo • • •jagged_circle
in reply to easily3667 • • •I dont know what that means.
Can I use that in addition to another VPN on mobile?
ReversalHatchery
in reply to Scary le Poo • • •jagged_circle
in reply to ReversalHatchery • • •jagged_circle
in reply to Scary le Poo • • •Outch