Comment on How do I access my services from outside?
wesker@lemmy.sdf.org 21 hours ago
Tailscale’s free offering goes a long way.
Comment on How do I access my services from outside?
wesker@lemmy.sdf.org 21 hours ago
Tailscale’s free offering goes a long way.
leaf_skeleton@lemmy.world 21 hours ago
Well, yes I looked at tailscale too, but that would prevent me from using my normal commercial VPN, which I would still like to use. The way I understand it, if I routed my entire network through tailscale to my server, it would essentially make all my internet traffic exit at my server. So, everything would still appear to be coming from my home IP address. I’m trying to get the best of 2 worlds: using the VPN to hide my IP from services that i visit and my ISP, and a secure connection to my home server.
Krukenberg@lemmy.world 2 minutes ago
Wouldn’t a MullvadVPN exit node from Tailscale suit your need perfectly? I’m a noob though.
TunaLobster@lemmy.world 1 hour ago
I don’t have an exit node in my tailnet. Through the magic of routing, tailnet stays in tailnet and vpn stays in vpn. I got extra fancy and used gluetun to handle docker vpn traffic, but only for some ports of some containers.
StrawberryPigtails@lemmy.sdf.org 18 hours ago
You can split your devices traffic, Tailscale traffic through Tailscale, everything else through your masking VPN.
For that, what I would do is put the masking VPN (like PIA or whatever) on your router (not all routers can do this) and then have Tailscale on the devices or individual services. In theory, everything would still be able to talk to each other (even if your mobile device is not behind the router), but everything that is behind the router would enter and exit their traffic wherever you have the masking VPN set to. Downside of doing this is that EVERYTHING that is behind that router is also behind that VPN which can cause problems with some services, like banking and streaming.
It would also mean that the only way you could host a public service is to have an external VPS acting as a reverse proxy. Cloudflare might also have something that could work around this setup, but I’m not familiar with their offerings.
This setup also doesn’t mask your traffic (origin and destination) from your mobile provider (just your home ISP), but that is a harder nut to crack as they can see, real time, where you are physically, and depending on your device, may have deeper device access anyways. I’m thinking prepaid phones and phones bought from the carrier (at least here in the US) or if your carrier has “asked” you to install an app to manage your account. My assumption is that my mobile provider can see anything I do while I have my phone or tablet with me, and just work around that.
You might want to ask in !privacy@lemmy.ml and !privacy@lemmy.world, as this is more up their alley.
irmadlad@lemmy.world 20 hours ago
How about Cloudflare Tunnels/Zero Trust? The caveat being that you have to own a domain that you can change the nameservers to the ones Cloudflare assigns you. You can purchase a domain from Cloudflare, but I think a lot of people get one from NamesCheap or PorkBun. I purchased on for less than $5 USD. With Cloudflare Tunnels/Zero Trust, you don’t have to open ports, fiddle with NAT, or any of that. You install it on your server and it punches a hole in to allow communication.
Some people like Cloudflare, some people don’t. Personally, I’ve never had any issues except for a very brief downtime a while back.
wesker@lemmy.sdf.org 20 hours ago
I have all my services spun up in docker containers, which makes it easier to pick and choose which services use Tailscale and which use a VPN.