this post was submitted on 18 Jan 2024
37 points (93.0% liked)

Selfhosted

39980 readers
777 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
37
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

TLDR: VPN-newbie wants to learn how to set up and use VPN.

What I have:

Currently, many of my selfhosted services are publicly available via my domain name. I am aware that it is safer to keep things closed, and use VPN to access -- but I don't know how that works.

  • domain name mapped via Cloudflare > static WAN IP > ISP modem > Ubiquity USG3 gateway > Linux server and Raspberry Pi.
  • 80,443 fowarded to Nginx Proxy Manager; everything else closed.
  • Linux server running Docker and several containers: NPM, Portainer, Paperless, Gitea, Mattermost, Immich, etc.
  • Raspberry Pi running Pi-hole as DNS server for LAN clients.
  • Synology NAS as network storage.

What I want:

  • access services from WAN via Android phone.
  • access services from WAN via laptop.
  • maybe still keep some things public?
  • noob-friendly solution: needs to be easy to "grok" and easy to maintain when services change.
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 9 months ago (3 children)

You can self-host Headscale to cut the third party out of the Tailscale equation.

[–] [email protected] 1 points 9 months ago (2 children)

If you're going to do that you may as well cut out the extra server/service and run regular wireguard.

[–] [email protected] 1 points 9 months ago (1 children)

Not quite, it's still much more useful because you can connect multiple devices, have users, and relay when some devices can't see each other, among other features.

[–] [email protected] 1 points 9 months ago

You can do all of those things with wireguard as well... I'm not seeing any benefit to running Tailscale/headscale.