Server Internet Exposure Risks

Comments debate the dangers of directly exposing servers and services like SSH to the public internet, recommending alternatives such as VPNs, firewalls, localhost binding, and SSH tunneling for better security.

➡️ Stable 0.6x Security
3,496
Comments
20
Years Active
5
Top Authors
#4816
Topic ID

Activity Over Time

2007
4
2008
24
2009
42
2010
72
2011
89
2012
124
2013
207
2014
165
2015
220
2016
191
2017
233
2018
180
2019
223
2020
285
2021
276
2022
330
2023
258
2024
232
2025
307
2026
34

Keywords

TL PermitRootLogin HTTPS AllowUsers FUD DR IPS BeyondCorp SSH VM server internet ssh vpn expose exposing network ips firewall whitelist

Sample Comments

riffic Feb 18, 2022 View on HN

this kind of stuff shouldn't be exposed to the open internet. use an internal network with vpn or at the very least look at something like Cloudflare Access.

jakubp Aug 6, 2016 View on HN

Meant as a parabole. If server access is that strong, could it be better protected by equivalent of 2 factor auth?

parminya Feb 6, 2023 View on HN

Instead of directly exposing the server to the internet, you could keep it behind a VPN. That way you only need to keep the VPN secure, the VPN serves as a whitelist.

sjg007 Aug 2, 2019 View on HN

I mean.. why aren't they using a vpn and restricting external access at the firewall?

yourabi Apr 7, 2010 View on HN

A) since you have a relationship with Rackspace, why not rackspace cloud?B) Unless this is a multi user system with the most likely vector of attack is your application itself not system level.Having said that here are some common tips: run ssh on a nonstandard port, Restrict who can log in via ssh (PermitRootLogin no) and only allow a few people remote access (AllowUsers foo bar) install a firewall (iptables) that blocks all ports except the ones you need publicly available (probably 80,

josephcsible Nov 1, 2023 View on HN

Instead of exposing them directly to the Internet, have them bind only to localhost. Then run an SSH server so that people can tunnel through it to the ports, and prevent brute force logins by configuring the SSH server to only use public-key authentication.

znpy Jul 23, 2023 View on HN

You might not want to expose stuff on the public internet, you know

attentive Aug 30, 2022 View on HN

This is correct answer.No reason to expose ssh to the internet.

euroderf Nov 25, 2025 View on HN

Would this involve "the usual" dangers of someone hacking the in-your-house server ?

alimoeeny Dec 24, 2014 View on HN

Great news, and very good work, thanks for sharing. One thing that I am concerned about (or have questions about), is how would you make sure you are not exposing the service to outside, so that when the laptop is on a coffee shop network others can query the credentials? I mean, it often happens that a developer needs to expose a webserver they are running to outside to showcase something or demo or .... It is not very hard to make a mistake and expose everything right?