Security: What I Actually Do

No theoretical checklist—this is what’s in place and why.


SSH: keys only, no passwords

On every box that has SSH (both Windows hosts, TrueNAS, and all Ubuntu VMs):

So even if something on the LAN is compromised, an attacker still needs the key. And nothing is listening for SSH from the internet.

OpenSSH


Router (MikroTik hEX)

MikroTik security


TLS and nginx

Mozilla SSL Config


Fail2ban on Ubuntu VMs

On all five Ubuntu VMs (Docker host, both nginx nodes, both Pi-hole VMs):

fail2ban


Keepalived

VRRP is authenticated with a shared secret (PASS type) so a random device on the LAN can’t claim the VIP. The secret is in my local values file, not in the repo. Both nodes use the same auth pass and same VRRP ID.

keepalived


Secrets and repo


What I don’t do (yet)

← Services | Back to index | Next: Documentation →