selfhosted

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

om1k, in jellyfin freezes on TV every 2 minutes

you could double check the codec with mediainfo. also check it is mp4.

momsi,

container is mkv, codec says AVC

om1k,

that surely is the issue. you can convert it to mp4 with ffmpeg: ffmpeg -i input.mkv -c copy output.mp4If you want to keep subtitles this will probably work: ffmpeg -i input.mkv -map 0 -c copy -c:s mov_text output.mp4

momsi,

Out of curiosity, why would that be a problem?

om1k,

in my case if I use mkv it starts transcoding and mp4 works fine on every device (desktop, android app, Chromecast, browser)

thelittleblackbird, in jellyfin freezes on TV every 2 minutes

Hi,

Every time it happened to me was either transcoding, either a real poor network speed.

I would double check the transcoding option

momsi,

Checked on transcoding, it happens on direct streaming…

rambos,

There is an option to disable transcoding completely, try that. Also check is it working with subtitles disabled.

I used to have issues sometimes when I had rpi4 as media server

momsi, (edited )

tried with transcoding disabled, no joy, still freezes. Subtitles were also disabled, I rarely watch with subtitles. Edit: I just noticed, when forcing transcoding by limiting the quality (Bitrate) on the client to lower values, it does not freeze

Apollo2323, in Tempo – An open source music client for Subsonic built natively for Android, now with Android Auto support

I was about to pay for simphonium app because was the best looking app for navidrome. Thanks for this amazing app , it looks great , it is super fast and responsive. Really great work where I can donate to it?

StopSpazzing,
@StopSpazzing@lemmy.world avatar

It’s listed near the end of his comment…

Apollo2323,

Yes I got it thank you!

antoniocappiello,

Hi and thank you for your appreciation! There is a buymeacoffee page for donations. Thanks again for the support!

sabreW4K3, in Tempo – An open source music client for Subsonic built natively for Android, now with Android Auto support
@sabreW4K3@lemmy.tf avatar

Tempo is gorgeous, it’s up there with Auxio in terms of aesthetics. That said, I wish it had the feature set of Musicolet. I love being able to switch between queues and never having my randomised playlists reorder the songs because they drop out of memory.

ryan_harg, in Tempo – An open source music client for Subsonic built natively for Android, now with Android Auto support
@ryan_harg@discuss.tchncs.de avatar

Amazing, thanks for your work!

BeatTakeshi, in Tempo – An open source music client for Subsonic built natively for Android, now with Android Auto support
@BeatTakeshi@lemmy.world avatar

I am using it to access my navidrome server, works quite well. I also use subtracks, not decided yet which I prefer

antoniocappiello, in Tempo – An open source music client for Subsonic built natively for Android, now with Android Auto support

Also a special thanks to Google which with its lack of guides for its libraries makes development a real thrill!

antoniocappiello, in Tempo – An open source music client for Subsonic built natively for Android, now with Android Auto support

For the curious who want to see the app without downloading it, here are some screenshots: imgur.com/a/i3zsqlG

LunchEnjoyer,
@LunchEnjoyer@lemmy.world avatar

Appreciate this, thanks 🌻

aadil, in Miro/Figjam alternative?

tldraw.com is great

TCB13,
@TCB13@lemmy.world avatar

Yeah thats a cool thing.

Salix, in Self-hosted media tracker recommendations?

I personally use Media Tracker because it’s fast and have enough features for me.

Ryot is another one that’s good.

Flox hasn’t had a commit since 2020. It’s not being updated anymore.

SchizoDenji,

I wish they built it for windows too.

Salix, (edited )

It is only made for Docker, which you can run on Windows, MacOS, and Linux

ignisda.github.io/ryot/

SchizoDenji,

I meant bare-metal windows.

Salix,

Unfortunately, it looks like they deleted the Windows branch in Sept 2023

github.com/IgnisDa/ryot/pull/371

savedbythezsh,

Ooh, ryot is really nice! And seems to have a similar feature set to Media Tracker, plus exercise. It’s also maintained actively.

Have you used it before? Any warnings?

Salix, (edited )

I have used Ryot for a while. It is nice and has a lot of features. It has documentation, which is really nice.

I am using Media Tracker because it has most of the features I need and it’s very fast. I wish it had genre sections like Ryot though. It looks like someone created an issue for it at least. Might go back to Ryot eventually, but we’ll see. Luckily Ryot has a Media Tracker import option.

savedbythezsh,

I was wondering why everyone kept talking about Media Tracker being fast. I finally installed RYOT, and wow is it slow, and resource intensive. It’s using more than 20% of the CPU on my NAS when it isn’t even open!

Salix,

Yup! Whereas with Media Tracker, everything is pretty much almost instantaneous for me.

Ryot was too slow for me. It’s really bad when you try to mark multiple TV series seasons as “seen” at the same time as well.

callmepk, in Do any of you have that one service that just breaks constantly? I'd love to love Nextcloud, but it sure makes that difficult at times
@callmepk@lemmy.world avatar

I don’t, I just keep running out of memory on my servers….

shertson, in Self-hosted media tracker recommendations?
@shertson@lemmy.world avatar

I use MediaTracker.

I mostly watch stuff on Netflix and Amazon prime, never thought to see if there is a way to auto update my watch history. I’m terrible about remembering to update my watch history.

JustinAngel, in Nextcloud zero day security

Yikes! I’d avoid leaving any services externally exposed unless they’re absolutely necessary…

Tailscale+Headscale are pretty easy to implement these days. Since it’s effectively zero trust, the tunnels become the encrypted channel so there’s an argument that HTTPS isn’t really required unless some endpoints won’t be accessing services over the Tailnet. SmallStep and Caddy can be used to automatically manage certs if it’s needed though.

You can even configure a PiHole (or derivative) to be your DNS server on the VPN, giving you ad blocking on the go.

TechLich,

there’s an argument that HTTPS isn’t really required…

Talescale is awesome but you gotta remember that Talescale itself is one of those services (Yikes). Like all applications it’s potentially susceptible to vulnerabilities and exploits so don’t fall into the trap of thinking that anything in your private network is safe because it’s only available through the VPN. “Defence in depth” is a thing and you have nothing to lose from treating your services as though they were public and having multiple layers of security.

The other thing to keep in mind is that HTTPS is not just about encryption/confidentiality but also about authenticity/integrity/non-repudiation. A cert tells you that you are actually connecting to the service that you think you are and it’s not being impersonated by a man in the middle/DNS hijack/ARP poison, etc.

If you’re going to the effort of hosting your own services anyway, might as well go to the effort of securing them too.

JustinAngel,

Tailscale is one of those services…

Tailscale isn’t an exposed service. Headscale is, and it isn’t connected to the Tailnet. It’s a control server used to communicate public keys and connectivity information between nodes. Sure, a threat actor can join nodes to the Tailnet should it become compromised. But have you looked at Headscale’s codebase? The attack surface is significantly smaller than anything like OpenVPN.

A cert tells you that you are actually…

I’m all for ssl/tls, but it’s more work and may not always be worth the effort depending upon the application, which is exactly why I recommended SmallStep+Caddy. Let’s not pretend that introducing things like a CA don’t introduce complexity and overhead, even if it’s just distributing the root cert to devices.

MITM/DNS Hijack/ARP Poisoning…

Are you suggesting that these attack techniques are effective against zero trust tunnels? Given that the encryption values are sent out of band, via the control channel, how would one intercept and replay the traffic?

TechLich, (edited )

Tailscale isn’t an exposed service. Headscale is

Absolutely! And it’s a great system that I thoroughly recommend. The attack surface is very small but not non-existent. There have been RCE using things like DNS rebinding(CVE-2022-41924) etc. in the past and, although I’m not suggesting that it’s in any way vulnerable to that kind of thing now, or that it even affected most users we don’t know what will happen in future. Trusting a single point of failure with no defence in depth is not ideal.

it’s more work and may not always be worth the effort

I don’t really buy this. Certs have been free and easy to deploy for a long time now. It’s not much more effort than setting up whatever service you want to run as well as head/tailscale, and whatever other fun services you’re running. Especially when stuff like caddy exists.

I recommended SmallStep+Caddy.

Yes! Do this if you don’t want to get your certs signed for some reason. I’m only advocating against not using certs at all.

Are you suggesting that these attack techniques are effective against zero trust tunnels

No I’m talking about defence in depth. If Tailscale is compromised (or totally bypassed by someone war driving your WiFi or something) then all those services are free to be impersonated by a threat actor pivoting into the local network after an initial compromise. Don’t assume that something is perfectly safe just because it’s airgapped, let alone available via tunnel.

I feel like it’s a bit like leaving all your doors unlocked because there’s a big padlock on the fence. If someone has a way to jump the fence or break the lock you don’t want them to have free reign after that point.

JustinAngel,

My claim is that Headscale has a lesser likelihood of compromise than Nextcloud, and that the E2EE provides an encrypted channel between nodes without an immediate need for TLS. Of course TLS over E2EE enhances CIA. There’s no pushback to defense in depth here. But in the beginning, the E2EE will get them moving in the right direction.

OP began the post by stating that the login page to a complex PHP web application is internet facing (again, yikes). Given the current implementation, I can only assume that OP is not prepared to deploy a CA, and that the path of least resistance – and bolstered security – can be via implementation of HS+TS. They get the benefit of E2EE without the added complexity, for which there is plenty, of a CA until if/when they’re ready to take the plunge.

If we’re going to take this nonsense all or nothing stance, don’t forget to mention that they’re doing poorly unless they implement EDR, IDS, TOTP MFA on all services, myriad DNS controls, and full disk encryption. Because those components don’t add to the attack surface as well, right?

TechLich,

Totally agree on all points!

My only issue was with the assertion that OP could comfortably do away with the certs/https. They said they were already using certs in the post and I wanted to dispel the idea that they arguably might not need them anymore in favour of just using headscale as though one is a replacement for the other.

EncryptKeeper, in Linode Alternative Suggestions for Small Projects

I ditched Linode after they sold to Akamai and immediately raised prices, then changed names. I shifted everything over to Vultr which is a roughly comparable service, and is a little bit cheaper. It’s not quite as polished as the company formerly known as Linode, but it does it does the job just the same.

possiblylinux127, in Nextcloud zero day security

I would move it into docker as that will give you a extra layer of security and simplify updates.

From there make sure you have backups that aren’t easily deleted. Additionally make sure your reverse proxy is setup correctly and implements proper security.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • selfhosted@lemmy.world
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #