logoalt Hacker News

bayindirhlast Monday at 12:00 AM1 replyview on HN

I prefer to gatekeep "entry points" with Tailscale. A server can have HTTP/S exposed to the world, but its SSH can stay behind Tailscale to enable defense in depth.

Keeping Tailscale as the only security layer will be foolish of course, but keeping the entry points hidden from general internet is a useful additional layer, if you ask me.

As a matter of principle, I like keep the number of open ports to a minimum. Let it be SSH or VPN, it doesn't matter. I have been burned enough times.


Replies

waynesonfirelast Monday at 12:34 AM

I've applied the same principal to my network. Though, I do have plans to re-open some additional ports beyond just SSH / VPN.

Thinking through how I would achieve this introduced me to the concept of a DMZ-zone. The DMZ places publicly accessible services in a highly locked down environment.

show 1 reply