logoalt Hacker News

k310yesterday at 4:51 PM3 repliesview on HN

This looks like a "send-only" server.

> sudo ufw default deny incoming

Seriously, what does one do when accepting connections, given the onslaught of data-hungry bots out there?

I wouldn't want to deal with that in any upcoming planned servers and services.


Replies

zamubafooyesterday at 8:55 PM

You put your reverse proxy on a publicly available machine then through strict firewalls only accept communication to your back end from the reverse proxy; effective leverage VPCs to make your backend not be on the public Internet. That should allow you to filter out malicious users without affecting your actual application and it's trivial to scale your reverse proxy horizontally or reach for a WAF if you have the need/desire.

jakubgarfieldyesterday at 5:43 PM

I'm using external "send-only" SMTP server (Sendgrid) and Google Workspace as receiving/sending. Email itself is something that I'm not keen on DIYing (though I looked into it and other SMTP alternatives).

graemepyesterday at 8:20 PM

its a typical web server setup. Only incoming allowed is http, https and ssh.

Note 2 says it uses Sendgrid for email. The server is for the web app.