Obviously if public the material would be important. But private, only over ssh or vpn? Free internet, power, and backup!

  • Onno (VK6FLAB)
    link
    fedilink
    English
    2315 days ago

    What specifically are you attempting to achieve, because right now, what little you have shared sends up red flags and rings the alarm bells … loudly.

    • @ocean@lemmy.selfhostcat.comOP
      link
      fedilink
      English
      -615 days ago

      I have a server in my school office. I currently only use it to backup important files. I am asking if running public or private containers on it would be safe and acceptable.

      • @catloaf@lemm.ee
        link
        fedilink
        English
        1815 days ago

        If authorized by the school IT department and policy, yes. Ask them, not us.

          • Onno (VK6FLAB)
            link
            fedilink
            English
            914 days ago

            If that’s how you want to run your server that’s your choice, but if it were me, I’d think long and hard about the legal implications of doing this.

            So far you’ve not said anything about what you’re trying to achieve and that’s not helping.

            • irotsoma
              link
              fedilink
              English
              514 days ago

              This. Get in writing the specific legally binding policies for personal use of their network resources. Not just the personal opinion of the IT people. They don’t write the legally binding policy that you are responsible for following.

        • @ocean@lemmy.selfhostcat.comOP
          link
          fedilink
          English
          -215 days ago

          Well, I am asking also security wise. I know most schools snoop. Can they somehow see traffic through ssh or VPN? Or just the protocols, logs, dates, etc

          • @cmnybo@discuss.tchncs.de
            link
            fedilink
            English
            614 days ago

            The SSH and VPN traffic is encrypted. Unless your private keys have been compromised, nobody can see what is going over the tunnel. They can log things like the IP addresses that are connecting to it and how much data is being transferred though.