- Restructure security playbook with modular nftables loader - Base rules loaded first, service rules second, drop rule last - Add Gitea self-contained firewall management (port 2222) - Add fail2ban protection for Gitea SSH brute force attacks - Update documentation with new firewall architecture - Create comprehensive Gitea deployment and testing guide This enables self-contained service roles to manage their own firewall rules without modifying the central security playbook. Each service deploys rules to /etc/nftables.d/ which are loaded before the final drop rule, maintaining the defense-in-depth security model.
486 B
486 B
Now what?
-
Redeploy on clean VPS to test playbook
- Must set up mini-vps for sigvild and devigo
-
What gets served on jnss.me?
-
Backups
-
Configure and set up Nextcloud
- OAuth
- Settings
- Contacts and calendars
- Storage bucket integration?
-
Gitea
- SSH setup
-
Authentik Invitations for users?
-
Sail the high seas
- Set up Jellyfin
- Set up *arr applications
-
"Blog post"