-
Hi, I'd like to preface this with a statement that I have some experience in hacking/modifying/injecting code in desktop applications but I don't have enough experience in Internet Security to know if this is a good idea. My manager would like me to expose our Inventree instance to a subdomain of our website, so employees and managers can access the instance at home. I know that the web is inherently unsafe, because it was not built from the core to be safe. However, I still would like to complete this request. We have an up to date Linux server running at work, running nothing but Inventree. It has been available inhouse for a long time, and it uses Nginx as a reverse proxy. On the internet, people tend to say to never expose your own server to the web. Is this solid advice, always? We are not hesitant to hire a server on a server farm, however, in my personal opinion I'd like to keep costs low (and I'm a bit principally against cloud servers, as I'm not sure if they will stay cheap and I don't like vendor lock-in). Please tell me what you think, either hire a server and risk rising costs and vendor lock-in, or keep our server and expose it. Thank you for your valuable feedback! |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 7 replies
-
My recommendation is to not expose it. You can use a subdomain to simplify the URL (instead of IP address), it doesn't make it secure. Then use VPN to connect to your company's network from home and access the instance. |
Beta Was this translation helpful? Give feedback.
-
@Guusggg I would strongly advise putting the thing behind a VPN or a portal. FortiGate VPN appliances for example include an SSL VPN portal that patches all traffic after authentication without users needing to install any software on their device. The thing why ppl advise against exposing your servers is simple: Every software has flaws. Even the Linux kernel, even the webservers and reverse proxies. Some of them are very scary and once they get discovered you need to update immidiatley. Most ppl. do not have the bandwidth to keep up with updates and security advisories for their whole stack (sometimes the vendor can not just fix it and needs you to shut down a service for example till they have a fix. Happened with Microsft spool servers a while back). Small horror detail: |
Beta Was this translation helpful? Give feedback.
@Guusggg I would strongly advise putting the thing behind a VPN or a portal. FortiGate VPN appliances for example include an SSL VPN portal that patches all traffic after authentication without users needing to install any software on their device.
The thing why ppl advise against exposing your servers is simple: Every software has flaws. Even the Linux kernel, even the webservers and reverse proxies. Some of them are very scary and once they get discovered you need to update immidiatley. Most ppl. do not have the bandwidth to keep up with updates and security advisories for their whole stack (sometimes the vendor can not just fix it and needs you to shut down a service for example till t…