Well, the original question was, how to see weewx from a public ip. I must
confess, that I did not think about security issues and just did it this
way:
I used a IPv6 only DNS from dynv6.com. So I could readily access
http://raspbee.example.dynv6.net:8000/weewx/index.html from outside. So
far,
I have a couple domain names from google domains for the couple websites I
have. The raspberry pi just runs weewx to upload my weather station to
some of the options on there and the pi also has a broadcastify scanner
feed that I have on there.
On Friday, January 6, 2023 at 8:25:18 AM
Are you saying that you have a registered domain name (and that is as far
as you have gone), or that you have a web server that is already
successfully serving other pages to the public internet?
What exactly is that raspberry pi doing? If it is serving web pages, is
it the same machine that
Lots of info. Thanks. I have a website domain already and use a
raspberry pi for this. I apparently just can't seem to get it to show
other than on the local network.
On Thursday, January 5, 2023 at 12:13:20 PM UTC-5 pannetron wrote:
> If you host a public website from a personal Linux
If you host a public website from a personal Linux server, as I do, look
into using fail2ban as a way to detect and block some bad actor bots. My
implementation currently has about 2500 IPs blocked because they were
looking for typical webserver security flaws.
On Wednesday, January 4, 2023
Glad some of you find this useful.
I have been using this method since it came out this summer (July 2022). I
run my infrastructure (Web Server, WeeWX, MQTT, MariaDB) as containers in
one stack in its own network all in Docker. I do this to limit what the
cloudflare tunnel can access on my
On Tuesday, January 3, 2023 at 6:41:01 PM UTC-8 do...@dougjenkins.com wrote:
> If you are willing to roll up your sleeves and get technical, serving your
> website at home can be done safely and securely without changing your
> firewall. There are some steps to do, but at the end it will save
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, 3 Jan 2023 21:40:43 -0500
Doug Jenkins wrote:
> My checklist will use CloudFlare (free). They have a bunch of
> services that we are going to use to make this happen.
I have a "burr under my tail" about CloudFlare. This four-year-old
blog
Thanks for this. I have a use case for the tunnels and had no idea this
existed.
On Wednesday, January 4, 2023 at 7:17:48 AM UTC-5 tke...@gmail.com wrote:
> Pretty cool. I had no idea Cloudflare offered this.
>
> On Tue, Jan 3, 2023 at 6:40 PM Doug Jenkins wrote:
>
>> If you are willing to
Pretty cool. I had no idea Cloudflare offered this.
On Tue, Jan 3, 2023 at 6:40 PM Doug Jenkins wrote:
> If you are willing to roll up your sleeves and get technical, serving your
> website at home can be done safely and securely without changing your
> firewall. There are some steps to do, but
If you are willing to roll up your sleeves and get technical, serving your
website at home can be done safely and securely without changing your
firewall. There are some steps to do, but at the end it will save you money
and it will give you some real-world IT experience.
So to self-host your
If you're asking that question, you really shouldn't do it for security
reasons. There are s many bots and automated scanners out there
looking for victim sites that you'd be massively attacked within literally
a minute or two. Please don't. Really.
But to answer - you'd need to alter
12 matches
Mail list logo