

I’ve read a lot about using a VPS with reverse proxy but I’m kind of a noob in that area. How exactly does that protect my machine?
So you’re not letting people directly connect to your server via ports. Instead, you’re sending the data through your reverse proxy. So let’s say you have a server and you want to server something off port :9000
. Normally you would connect from domain.com:9000
. With a reverse proxy you would setup to use a subdomain, like service.domain.com
. If you choose caddy as your reverse proxy (which I highly recommend that you do) everything is served from port :443
on your proxy, which as you might know is the default SSL port.
And do I understand correctly that since we’re using the reverse proxy the possible attack surface just from finding the domain would be limited to the web interface of e.g. Jellyfin?
I wouldn’t say that it decreases your attack surface, but it does put an additional server between end-users and your server, which is nice. It acts like a firewall. If you wanted to take security to the n^th degree, you could run a connection whitelist from your home server to only allow local and connections from your rproxy (assuming it’s a dedicated IP). Doing that significantly increases your security and drastically lowers your attack vector–because even if an attack is able to determine the port, and even your home IP, they can’t connect because the connection isn’t originating from your rproxy.
Sorry for the chaotic & potentially stupid questions, I’m just really a confused beginner in this area.
You’re good. Most of this shit is honestly hard.
Very true! You can also take it a step farther and setup SSHFP records for your domain.