Here’s the IP: 46.248.67.114:25565 It’s not going to be always online, so please contact me on Matrix at @Gregortactac:envs.net if you want me to turn it on.

  • ThePJN@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Got too much going on and my own server shenanigans going on at the moment but I just wanted to say that this is all dang wholesome. Kudos all around folks! 🤗

  • xavier666@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Really hope you have some server protection system or backups.

    Posting the server IP like this can invite griefers.

    • JustARegularNerd@aussie.zone
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      I’ve seen this advice generally for open ports and self hosting, let’s say I do have a Minecraft server only open on 25565, what risks do I face if I just only opened that port?

      I do have my own private Minecraft server in a dedicated Linux VM but it’s currently behind a VPN, which makes it an extra step for new players to join.

      • Renegade@infosec.pub
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        You’re basically relying on the security of minecraft, and your ability to quickly patch. The Log4j exploit is one good example of the kind of threats you might face.

        Another is just that revealing your ip can open an opportunity for various forms of harassment. Lots of us skate by on obscurity and luck without to many issues, but that’s not a very robust solution.

        • Sethayy@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          Just cause I’m trying to get into the cybersecurity a bit, would running the server in a container mitigate these risks?

          (or at least put the security fallback to as secure as your container is)

          • Renegade@infosec.pub
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            3 months ago

            Containers are a really cool part of security. The security provided will depend on how the container is configured. For example if you give the container bridged networking permissions (or whatever equivalent term is used by your solution) then you’re giving the container access to communicate with other devices on your local network. This would be the opposite of what you want to do to prevent an attacker from pivoting through your LAN.

            Other threats just aren’t within the set of protections that can be provided by a container. For example if you wish to protect your Minecraft world from being griefed the container won’t have any affect on this. Another example is hiding your IP.

            Basically what I’m saying is that whenever you are looking at a security technology think about what guarantees it provides and realize that no single security measure provides protection against all threats.