Infrastructure nerd, gamer, and Lemmy.ca maintainer

  • 1 Post
  • 62 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle



  • You’ve made a virtual disk on the zfs. The vm will never see the zfs, that’s managed entirely by the host.

    Yes you’ll want to make a normal partition inside that virtual disk.

    With vms you can’t just access the host zfs, it’s always abstracted. If you use lxc containers on proxmox then you can bind the zfs into the container (google it for steps, it’s not in the Gui)





  • Shadow@lemmy.catoSelfhosted@lemmy.worldQuestion about Immich
    link
    fedilink
    English
    arrow-up
    11
    ·
    edit-2
    1 month ago

    Like you have it running and added but it’s not scanning?

    I can check my config later today if nobody else replies sooner.

    https://docs.immich.app/features/libraries/

    External libraries use import paths to determine which files to scan. Each library can have multiple import paths so that files from different locations can be added to the same library. Import paths are scanned recursively, and if a file is in multiple import paths, it will only be added once.

    Have you double checked your folder permissions?










  • Shadow@lemmy.catoLinux@lemmy.worldSSH backdoor infection
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    4 months ago

    Most don’t create new keys per server machine but that’s not the issue. I don’t bother, I create a key per client machine on my side.

    Server gets compromised once, admin logs in and fixes it, admin logs in next time and the backdoor compromises it again.

    That’s all this is. If you can get in once, it’s a spot you can leave a backdoor that many admins will miss. That’s it.

    Admins don’t generally copy that whole file around, they usually copy and paste the lines they want. Also I generally copy and paste it from my workstation, not another server.


  • Shadow@lemmy.catoLinux@lemmy.worldSSH backdoor infection
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    edit-2
    4 months ago

    If your hosting is a bad actor, you’re screwed no matter what. Why bother with this when they have direct access to your disk and ram

    You could turn off authorized key files, or lock them down. This isn’t really a big security risk though, there’s countless ways to backdoor a system once you have access to do this.

    This just targets a remote account, not your local pc.