This page documents the security practices we take.
If something we do is missing from the list, or you want us to add something that improves Project Segfault's security, email contact@projectsegfau.lt (preferably with PGP) or contact a sysadmin over matrix/xmpp.
- System updates every 2 weeks
- Almost all our services run under docker
- All places where public code can be run is completely isolated (example Gitea Actions and Pubnix)
- DNSSEC enabled for all domains
- All nodes are almost completely separate from one another and when node-interop is needed (example Authoritative DNS), it is done through an unprivileged user (Exception is our new ansible-semaphore instance which is on UK Node, and has root access to all servers. However the SSH key is stored encrypted so it should be fine :P)
- All management interfaces and ssh to servers are behind our selfhosted tailscale instance.
- Backups are encrypted with borg (the decryption phrase is only on the server itself so it can send new backups and with arya & midou (the sysadmins))
- On all servers, the VMs are stored in encrypted medium