wwed26

Members
  • Posts

    4
  • Joined

  • Last visited

wwed26's Achievements

Noob

Noob (1/14)

0

Reputation

  1. Yes I have installed Wireguard but haven't toyed with it yet. I was not sure if there were pros/cons to having VPN on a separate device or same as the server. Plus wanted to research the timeline of when Wireguard would be 'complete' with audit. As of this rate I am still using PiVPN and accessing externally via openvpn. Re: disk problems, I would not be surprised. One of the two controllers on-board is the infamous Marvell controller that has issues with drives dropping in and out. Pair that with running 4 non-essential VM's on one SSD hooked to the very same Last re share case: Yes, my laziness has been exposed. Thanks trurl and bastl
  2. For clarity as I might be confusing terminology, your recommendation would be to use an additional VPN service (For example NordVPN) with my PIVPN use? Appreciate the help. Anon diagnostics attached. geralt-diagnostics-20200126-1247.zip
  3. Hello all, Periodically I check the IDS feature in the unfi controller (I own a USG). Normally I am dismissive of the threats as they pertain to my wife who uses wechat and will time to time get threats to her phone and I block the incoming IP, perhaps just because. More recently I have received nearly 20 threats directly to the local IP of my Unraid server not from China but globally. The threat appears as "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 748". None of the docker containers share the ports of 'attack'. I have 5 VMs operating on a bridged connection. As another data point, I use PIVPN to access my files externally, it auto updates except for the period the PI RAM usage was to high. My primary concern is, am I compromised. My questions are two fold while I seek external advice to harden my network my broadly. In the meantime: 1. What is the best way to perform diagnostics to see what occurred. 2. Is there a way to harden Unraid generally speaking. Kindest for those willing to assist, John