• 0 Posts
  • 87 Comments
Joined 3 years ago
cake
Cake day: June 12th, 2023

help-circle


  • Docker is fine for turnkey applications. Mounting external storage that persists across containers is a feature that enables that pattern.

    Running Docker in a VM is also fine and has potential advantages. However I agree that it’s probably overly complex for many people.

    I’m confused what you’re trying to accomplish here. Are you trying to make it look like the traffic is coming from your VPS for some reason? Nginx (amongst others) can reverse proxy tcp traffic.







  • Isn’t this just CRL in reverse? And CRL sucks or we wouldn’t be having this discussion. Part of the point of cryptographically signing a cert is so you don’t have to do this if you trust the issuer.

    Cryptography already makes it infeasible for a malicious actor to create a fake cert. The much more common attack vector is having a legitimate cert’s private key compromised.











  • The term to look for is out of band management. Typically this will provide serial/console access to a device, and can often perform actions like power cycling. A lot of server hardware has this built in (eg idrac for Dell, IPMI generically). Some users will have a separate oobm network for remotely accessing/managing everything else.