Hello,
I used to use SERVER to setup a sharepoint to access files remotely. Unfortunately, something has gone wrong and cannot get the SERVER sharepoint to work again.
As this setup is old (2 years) i'm wondering if there i a simpler way to setup a sharepoint for my internally held files so that I can access them remotely. I do not wish to use services such as DropBox as I already have the storage space locally at home.
Thanks for any useful tips.
First of all two warnings:
Sharing files over the Internet using any protocol introduces a risk if you don't set it up correctly.
Sharing files over an unencrypted protocol means that anyone on the same network potentially can read not only your files as you transfer them, but also your login credentials. This in turn means that you're pretty much handing out control over your computer to anyone even mildly interested any time you log on to such a service.
With that out of the way:
macOS provides an excellent way of sharing files in a relatively secure manner using SSH/SFTP, which is encrypted.
The way I would do this, if I had to, would follow these approximate steps:
- Create a low rights user with a randomly generated, STRONG password (16 or more characters), and store the password in your password manager.
- Create a directory to share, accessible only by you and this low rights user, in the low rights user's home directory.
- In System Preferences -> Sharing, click Remote Login. In the Allow access for-area, select "Only these users", remove the Administrators group, and add your low-rights user.
- Activate Remote Login by checking the box.
- Create a port forwarding rule in your firewall from an arbitrary external port (>1024<65535) to port 22 on the Mac to limit the number of automated attacks on your system.
After this you should be able to reach the folders of this low rights user either by making a remote connection (⌘+K) to sftp://username:*@yourIPaddressOrDNSname:theExternalPort, or from the terminal by running sftp yourIPaddressOrDNSname -P theExternalPort and logging in.
Note, though, that this also opens up CLI access to your computer for your chosen user, so any known or unknown exploits that would let an attacker escalate their privilege level can be used to completely own your computer. Again: Use a GOOD password.
Even better: Read up on key based authentication and configure your SSH server to only allow that, if possible.