469
Jellyfin over the internet (startrek.website)
submitted 2 days ago by [email protected] to c/[email protected]

What’s your go too (secure) method for casting over the internet with a Jellyfin server.

I’m wondering what to use and I’m pretty beginner at this

top 50 comments
sorted by: hot top new old
[-] [email protected] 48 points 1 day ago

I just expose my local machine to the internet, unsecured

[-] [email protected] 7 points 1 day ago

This is absolutely unhinged but god damn it, I respect you.

[-] [email protected] 14 points 1 day ago

Thanks stranger over the internet seems like the best option.

[-] [email protected] 2 points 1 day ago* (last edited 1 day ago)

Yea same I don’t even care.

It’s an old laptop, I have a backup. Go ahead, fuck it up.

[-] [email protected] 2 points 23 hours ago

Do you at least have it on a VLAN?

[-] [email protected] 1 points 14 hours ago* (last edited 14 hours ago)

I dunno. It’s plugged in directly to the modem/router provided by my ISP while my wifi is provided by a separate mesh setup, which is also plugged in to the modem/router 🤷‍♂️

[-] [email protected] 2 points 14 hours ago

Yeah, you’ll definitely want to make sure that computer is isolated. It doesn’t sound like it’s currently on a VLAN. The real danger isn’t just someone messing up that one machine, once they’re in, they’re behind your firewall and can potentially access anything else on your network. Smart home devices are often the next targets, things like light bulbs, security cameras, and especially Windows computers, which are usually easy to compromise if they’re on the same network.

You might be wondering, “How likely is that?” Honestly, very likely. Back when my website was online, it would get hit by hackers, mostly script kiddies, several times an hour.

[-] [email protected] 5 points 1 day ago

For now just Tailscale but I'm working on setting up a reverse proxy and SSO through Authentik

[-] [email protected] 2 points 23 hours ago* (last edited 23 hours ago)

Even more secure is having a VPS and self hosting Heascale, even better is Wireguard

[-] [email protected] 1 points 9 hours ago

I'm trying to move away from needing a VPN to connect to make it simpler for less technically inclined family members

[-] [email protected] 1 points 55 minutes ago

Usually just needs to be set up once. A small price to pay for security.

[-] [email protected] 4 points 1 day ago

Sad that mTLS support is non existent because it solves this problem.

[-] [email protected] 1 points 1 day ago

It would cover all phones, pcs and maybe Android TVs.

The barrier to entry would be having to replace the cert every year since we now made that a thing. Maybe spin up a self-sign shirt server and start issuing people 10 years certs

[-] [email protected] 16 points 1 day ago

Tailscale with self hosted headscale

[-] [email protected] 1 points 1 day ago

Any helpful tips or links to tutorials for this method?

[-] [email protected] 2 points 23 hours ago

Easiest method is Docker, but it heavily depends on your network and tech stacks.

[-] [email protected] 1 points 1 day ago

I use mTLS by adding a reverse proxy between Jellyfin and the Inet. This makes it hard to use the app, but works perfect with a browser. If you still want to use the app. There is a solution by using stunnel (termux) between te app and the Inet or better, a wireguard VPN.

[-] [email protected] 30 points 2 days ago

My go to secure method is just putting it behind Cloudflare so people can’t see my IP, same as every other service. Nobody is gonna bother wasting time hacking into your home server in the hopes that your media library isn’t shit, when they can just pirate any media they want to watch themselves with no effort.

[-] [email protected] 10 points 1 day ago

Nobody is gonna bother wasting time hacking into your home server

They absolutely will lol. It’s happening to you right now in fact. It’s not to consume your media, it’s just a matter of course when you expose something to the internet publicly.

[-] [email protected] 1 points 1 day ago

And this is the start of the longest crypto nerd fight I've seen on Lemmy. Well done, people!

[-] [email protected] 2 points 18 hours ago

Not so much a fight as an exercise in futility lol

[-] [email protected] 1 points 6 hours ago

Well, I might as well put a dog in the fight. I'm considering my final, actually secure deployment of nextcloud.

This discussion has convinced me that a vpn is the only answer.
And almost everyone says wireguard.

K. Thats what I will build.

[-] [email protected] 1 points 2 hours ago

It’s not the only answer, but it’s the one that will get you the most secure with the least amount of effort.

load more comments (19 replies)
[-] [email protected] 25 points 2 days ago

I used to do all the things mentioned here. Now, I just use Wireguard. If a family member wants to use a service, they need Wireguard. If they don't want to install it, they dont get the service.

load more comments (3 replies)
[-] [email protected] 13 points 1 day ago* (last edited 1 day ago)

If you’re a beginner and you’re looking for the most secure way with least amount of effort, just VPN into your home network using something like WireGuard, or use an off the shelf mesh vpn like Tailscale to connect directly to your JF server. You can give access to your VPN to other people to use. Tailscale would be the easiest to do this with, but if you want to go full self-hosted you can do it with WireGuard if you’re willing to put in a little extra leg work.

What I’ve done in the past is run a reverse proxy on a cloud VPS and tunnel that to the JF server. The cloud VPS acts as a reverse proxy and a web application firewall which blocks common exploits, failed connection attempts etc. you can take it one step beyond that if you want people to authenticate BEFORE they reach your server by using an oauth provider and whatever forward Auth your reverse proxy software supports.

[-] [email protected] 43 points 2 days ago* (last edited 2 days ago)

I think my approach is probably the most insane one, reading this thread…

So the only thing I expose to the public internet is a homemade reverse proxy application which supports both form based and basic authentication. The only thing anonymous users have access to is the form login page. I’m on top of security updates with its dependencies and thus far I haven’t had any issues, ever. It runs in a docker container, on a VM, on Proxmox. My Jellyfin instance is in k8s.

My mum wanted to watch some stuff on my Jellyfin instance on her Chromecast With Google TV, plugged into her ancient Dumb TV. There is a Jellyfin Android TV app. I couldn’t think of a nice way to run a VPN on Android TV or on any of her (non-existent) network infra.

So instead I forked the Jellyfin Android TV app codebase. I found all the places where the API calls are made to the backend (there are multiple). I slapped in basic auth credentials. Recompiled the app. Deployed it to her Chromecast via developer mode.

Solid af so far. I haven’t updated Jellyfin since then (6 months), but when I need to, I’ll update the fork and redeploy it on her Chromecast.

load more comments (3 replies)
[-] [email protected] 7 points 1 day ago* (last edited 1 day ago)

“Technically” my jellyfin is exposed to the internet however, I have Fail2Ban setup blocking every public IP and only whitelisting IP’s that I’ve verified.

I use GeoBlock for the services I want exposed to the internet however, I should also setup Authelia or something along those lines for further verification.

Reverse proxy is Traefik.

[-] [email protected] 7 points 1 day ago

Cloudflare. No public exposure to the internet.

[-] [email protected] 9 points 1 day ago

Are we not worried about their terms of service? I've been using pangolin

[-] [email protected] 6 points 1 day ago

I run multiple enterprise companies through it who are transferring significantly more sensitive data than me. I'm not as strict as some people here, so no, I don't really care. I think it's the best service, especially for free, so until things change, that's what I'm using.

load more comments (3 replies)
[-] [email protected] 31 points 2 days ago

I host it publicly accessible behind a proper firewall and reverse proxy setup.

If you are only ever using Jellyfin from your own, wireguard configured phone, then that's great; but there's nothing wrong with hosting Jellyfin publicly.

I think one of these days I need to make a "myth-busting" post about this topic.

[-] [email protected] 10 points 1 day ago

Same for me. But according to everyone I should be destroyed.

load more comments (1 replies)
[-] [email protected] 21 points 2 days ago

for me the easiest option was to set up tailscale on the server or network where jellyfin runs and then on the client/router where you want to watch the stream.

load more comments (5 replies)
load more comments
view more: next ›
this post was submitted on 26 Jun 2025
469 points (98.0% liked)

Selfhosted

46672 readers
990 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS