Which route did you go for your homeland, a tunnel to your services or setting up tail scale/wireguard and access them on your trailer?

  • Reannlegge@lemmy.ca
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    9 hours ago

    I actually have Wireguard running on a pi zero 2, all it really does is provide me my pihole DNS.

    Edit:

    I should say I have pihole running on a couple of pi 5’s currently, overkill yes but one of my pi 4’s was sacrificed to the whims of magic smoke another was donated to a friend and another now hosts HAOS, I have a few pi zero 2’s (only one was sacrificial) the one that hosts wireguard has one of my last few working SD cards. The pi 5’s host many other things other than just pihole.

    • frosch@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      20 hours ago

      Taking do one thing, but do it good to the next level, nice!

      I thought about getting a pi zero also just for the pi-hole. But my pi3b holds up pretty good, still

      • Reannlegge@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 hours ago

        In the not to distant future I will be retiring wireguard from that pi zero 2 and turning it into a pots server. I have grand ambitions to make a better home lab with a few more pi’s and to help me get away from big tech more.

        The only thing google I have is an email I do not use but so I can watch YouTube, but I use unwatched to block ads.

        The only thing apple is my iPhone and my iPad, when it becomes time to replace those I will have to figure out graphenOS and some Linux distro for a tablet of some sort.

  • mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    3 days ago

    Wireguard.

    Dunno if Cloudflare does effective auth for the tunnel or if you have to set that up yourself, but I don’t bother trying to expose services to the internet in any way because some of this stuff was just never designed for proper web security (cough Jellyfin).

    It’s still worth setting up a wildcard cert with ACME so you get nice https and a real domain.

    • frosch@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 days ago

      Cloudflare has some opt-in auth. Mail-OTP is a nice balance imo: You can allowlist mail addresses per service/subdomain and set expiry for each. Then for access, you first have to enter the mail address, get the OTP and then access the service.

      So, nobody without access to allowed mail addresses even gets to knock on you door.

      But yeah, that’s why I think about going tail scale: why bother having something exposed when not needed?

      I just think, some services might be nice to provide to friends, too - and having them connect to my tailnet for this is a bit too much friction, I guess

      • prenatal_confusion@feddit.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 days ago

        No, ridiculously easy with docker.

        Then it follows the same principles as cloud flare. Create a site (vpn endpoint), get a docker snippet for a newt (what they call the vpn connector), paste it in the docker compose on your Homeserver and see it come up in the Webinterface.

        Then you create a public resource and point it to said site and give it a url.

        Done.

        Ask me if you have questions

        • frosch@sh.itjust.worksOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 days ago

          Cool, do you get any auth and/or ingress protection?

          With cloudflare, you get some auth options, can block AI crawlers (that get recognized…) etc for free

          • prenatal_confusion@feddit.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 days ago

            Yes there is auth on by default for resources. You can use real accounts that need to be created or passwords or pins. And I think some id providers.

  • Illecors@lemmy.cafe
    link
    fedilink
    English
    arrow-up
    7
    ·
    3 days ago

    I do run wireguard on my router, but the main reason is ad blocking, not hiding services. Most services are publicly exposed.

  • utjebe@reddthat.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 days ago

    Just Wireguard on a router, but I’m thinking Netbird.

    WG can be a bit PITA to set up, but once you do, it just works. What I would to have is more fine grained control over who goes where if I were to expose some of the services to friends.

    • IratePirate@feddit.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 days ago

      wg-easy can greatly simplify your wireguard setup. Allows you to quickly generate access configs for friends and family on the fly (QR-codes, too). You still get access to post-up/-down hooks if you want tp create a more specialised deployment.

  • irmadlad@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 days ago

    How about both? I run the evil Cloudflare Tunnels/Zero Trust with Tailscale as an overlay on the server.

    • frosch@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 days ago

      I’m a bit stumped, what do you gain from this setup?

      Or do you mean just running some services through the tunnel for easy access and “hide” others behind tailscale?