• ia42@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    When I cruise around the net I sometimes use Mullvad as an ass-guard.

    When I connect to my own server I have SSH, and if I ever need to access a local port I use port redirect over the SSH tunnel.

    As a backup of a backup, if I am at a site that blocks access to remotes on port 22, I have sslh running on port 443 in front of my nginx, intercepting TLS for nginx, SSH and openVPN (running in docker) all on the one port, so I have options…

  • jkirkcaldy@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    For work, Tailscale between vps and server. It works like cloudflare tunnels but doesn’t have the issues with the TOS excluding media streaming etc.

    Keeps the internal server relatively safe and we can stream media/serve media content.

    Cloudflare is our registrar and dns provider.

  • secopsx@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I just use the UDM-SE App (Teleport). I can connect on demand and get to all of my services, get adblocking while I’m out and about. Teleport on ubiquiti is just wireguard renamed.

    I don’t need to expose any services from my home network, because I’m the only one using them. If It wasn’t just me, I’d just have them download the wifiman app, send them a teleport link and boom…they’re in on the local network. Exposing “services” for a convenience factor is just too much of a security risk for myself.

    I host all of my websites on github (free) and leverage vercel for CI/CD pipelines (again, free). Domains are the only thing public and that I pay for. (local dns reasons for lets encrypt certs) and for my public websites not associated with my home infrastructure.

  • vivekkhera@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I’ve used IPSec to connect to my home (and office when I had my own company) networks. It has never failed me and the client is built right into my iphone and mac.

  • TheRealSeeThruHead@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I use both. Cloudflare is for public facing services. Like overseerr and wizarr.

    Tailscale is how I access my private services and dashboards.

  • Anejey@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I use all three.

    • CF tunnels to access generic apps I want public.

    • Tailscale to have remote access to my home network.

    • Wireguard tunnel going to a VPS for apps that I don’t feel comfortable running through CF due to the bandwidth (Jellyfin, AzuraCast).

    I totally could move everything that’s on CF tunnels over to Wireguard, but I see no need to do it. Cloudflare is trustworthy enough and I like the additional protection it offers.

    • AnApexBread@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      CF tunnels to access generic apps I want public.

      I totally could move everything that’s on CF tunnels over to Wireguard, but I see no need to do it

      How would you keep the public apps public if you require a wireguard connection to access them?

  • platswan@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Started with exposed domains with NPM, SSL certificates, etc. Tried out CloudFlare tunnels and wasn’t satisfied, so I landed on Tailscale. Dead simple to set up and use. Fast, secure, what more to ask for?

  • Encrypt-Keeper@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    For starters the CF tunnel means your service is publicly accessible and Tailscale or Wireguard it won’t be.

  • jazzmonkai@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I started with Tailscale. My main use in the beginning was to have access to my Home Assistant when I was out, and for that it was perfect.

    Then I started to want access to files on my NAS without using Synology’s Quickconnect after they had a security scare. Tailscale was fine for this too.

    But when I began game streaming from my home PC, that’s when Tailscale stopped working for me. Latency spikes, poor bandwidth, it just wasn’t up to the task.

    Now I have wireguard set up on my Opnsense router, and it’s perfect. My upload speeds are max 20Mbps due to my internet service, but I can reliably stream at around 15Mbps with latency of about 25ms max.

    It’s definitely harder to manage and maintain than Tailscale was, and I’ve ended up doing a bunch of other stuff like buying a domain so I can have SSL for my other hosted services (which have grown since I started, naturally!), but for performance it’s ideal.

    I’d probably start with something like Tailscale or Zerotier because they’re easy to set up and deploy. If that meets your needs, no need to look elsewhere. I considered CF tunnels but I have one already set up for Google Home to interact with Home Assistant and I find it hard to understand so the idea of using it more widely didn’t seem smart. I’m already worrying about the day I have to update the domain name from the current DuckDNS one to my paid for domain…

  • numblock699@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    To access my stuff at home and elsewhere from anywhere I use Twingate. I don’t expose anything from my home via Cloudflare. I do use cloudflare WAFs for stuff on my VPSs.

  • terramot@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I have a domain on cloudflare to map internal IPs/services and use wireguard to reach the network. Tried Tailscale and Zerotier, there was a problem on some devices when switching from wifi to internet which was breaking internet access, switched to Wireguard and now i’m happy.

  • Cold-Membership7654@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I have been experimenting with Tailscale and it’s just not fast enough for our needs. It’s insanely simple to setup and get guys going on it, but in the end we couldn’t get more than ~20mbit or so, if even that. Looking forward to giving Netmaker a shot (Still a Wireguard Kernel as Tailscale), but we need to be able to switch allowed access between different groups of external users throughout the day. Ideally in a way that only requires a click or two, or can be somehow automated into a click or two.

  • AnApexBread@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Yes.

    I use all three for different purposes.

    It all depends on what my requirements for self hosting some are.