kalipike,

Tailscale all the way.

rambos,

Not many people here use openmediavault it seems, but Its wireguard plugin is super nice.

xinaked,

tailscale 100 times over

CriticalMiss,

My MikroTik has built in WireGuard functionality so it was an easy pick 😁

Gutless2615,

PiVPN. single line install script. Couldn’t be easier. Now if you have a shitty ISP like yours truly that can prevent you from being able to.

giddy,
@giddy@aussie.zone avatar

i have pivpn (wireguard+pihole) running on a pi zero and it is rock solid

ISometimesAdmin,
@ISometimesAdmin@the.coolest.zone avatar

@Coldus12 I got wireguard hosted on my openwrt router. Straightforward and no fuss.

housepanther,

Check out Slack Nebula.I personally like it very much and used it to build a software-defined WAN to support my family’s needs. I use a point to point WireGuard tunnel between my VPS and my home network to support self-hosted instances of Mastodon and Lemmy.

ruckblack,

I’ve never had issues with my plain old OpenVPN setup

ggnoredo,
FrostyCaveman,

I use this too. It is excellent

Decronym, (edited )

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters | More Letters ---|--- CF | CloudFlare DNS | Domain Name Service/System VPN | Virtual Private Network VPS | Virtual Private Server (opposed to shared hosting)


4 acronyms in this thread; the most compressed thread commented on today has 14 acronyms.

[Thread #6 for this sub, first seen 19th Jul 2023, 10:30] [FAQ] [Full list] [Contact] [Source code]

lodion,
@lodion@aussie.zone avatar

Good bot.

goodhunter,

People seem to like and recommend Tailscale. I have not gotten to setting it up. My setup involves reverse proxy with treafik and my services in docker. Any suggestions on how what I need to do would be welcome.

ashok36,

I’ve been using it for maybe a year now and it’s been rock solid. Highly recommended.

randombullet,

This is the exact script I use to install tailscale on my VPN server

Installing Tailscale

<pre style="background-color:#ffffff;">
<span style="color:#323232;"> curl -fsSL https://tailscale.com/install.sh | sh 
</span>

Enable IP forwarding

<pre style="background-color:#ffffff;">
<span style="color:#323232;"> echo 'net.ipv4.ip_forward = 1' | sudo tee -a /etc/sysctl.conf 
</span><span style="color:#323232;"> echo 'net.ipv6.conf.all.forwarding = 1' | sudo tee -a /etc/sysctl.conf 
</span><span style="color:#323232;"> sudo sysctl -p /etc/sysctl.conf 
</span>

Advertise subenets and exit node

<pre style="background-color:#ffffff;">
<span style="color:#323232;"> tailscale up --advertise-exit-node --advertise-routes=192.168.0.0/24,192.168.2.0/28,192.168.5.0/24,192.168.10.0/24
</span>
goodhunter,

Thank you for message, i appreciate the effort.

Where I struggle is the part where i need to expose my subnet within Tailscale. I don’t have any machineip:port delegated to the services anymore.

I got a domain name through CF, and have traefik generate unique url links as *service.mydomain.com that routes it to the specific service running in docker on my localmachine. It also takes care of certificates. Calling that service url only works within the local network.

In my docker compose set up, I removed all the ports as I dont access the services via ip:port. I hope this makes sense to you.

So it seems I need to configure Tailscale in such a way I can tunnel to my home network and then make the service.mydomain.com call. And that is where it got too complicated for me right now.

I also fail to understand if I need to run Tailscale native or in (the same) docker env.

MedicareForSome,

While I’ve never used it personally I’ve heard good things about cloudflare tunnel.

rog,

Depends on the use case. Cloudflare tunnels are great for accessing services, but not your network. I have a dockerised vscode instance behind a cloudflare tunnel attached to a personal domain that uses white listed emails as authorisation. Fantastic set up, can access my coding environment from anywhere with an internet connection as long as I can click the verification link in my emails.

To access my network itself though, wireguard is better. I just use pivpn (coupled with pihole for on the go adblock) on a rpi.

Starfighter,

Was running Wireguard and am now in the process of changing over to Tailscale (Headscale).

It uses Wireguard for the actual connections but manages all the wireguard configs for you.

IamPic,

Why have you decided to switch?

Starfighter,

Getting the configs to work with my personal devices was already a little finicky but doing that for not-so-technical family members was starting to be a bit too much work for me.

I’m hoping that Headscale will cut that down to pointing their app at the server and having them enter their username and password.

witten,

One thing that helped a ton with that for Wireguard (for either you or anyone else reading this) is: You can generate QR codes for a peer’s full Wireguard config! So you can create the images on your computer and then a non-technical user can just scan the code to get configured.

spencer,

I came here to say exactly this - WireGuard is great and easy to set up, but it gets harder as you add more people, especially less technical ones, as getting them to make keys and move them around etc becomes a headache. Tailscale also minimizes the role of the central server, so if your box goes down the VPN can still function. Tailscale can also do some neat stuff with DNS that’s pretty nifty.

varaki,

I installed OpenWrt on my home router and set up wireguard on it. If you have dinamic IP address assigned by your ISP, like me, you also have to setup a dynamic dns updater on the router. I use duckdns.org. Then you have to open the port for wireguard on the router. Here’s a video guide on how to do it: www.youtube.com/watch?v=Bo2AsW4BMOo

  • All
  • Subscribed
  • Moderated
  • Favorites
  • selfhosted@lemmy.world
  • kavyap
  • thenastyranch
  • tester
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • tacticalgear
  • Youngstown
  • ethstaker
  • osvaldo12
  • slotface
  • everett
  • rosin
  • khanakhh
  • megavids
  • ngwrru68w68
  • Leos
  • modclub
  • cubers
  • cisconetworking
  • Durango
  • InstantRegret
  • GTA5RPClips
  • provamag3
  • normalnudes
  • anitta
  • JUstTest
  • lostlight
  • All magazines