Dust0741
@Dust0741@lemmy.world
- Comment on Domain instead of ip in Wireguard 3 days ago:
Yup! This is what I do! Love it so much
- Comment on Domain instead of ip in Wireguard 4 days ago:
Thank you. It really was that simple
- Submitted 4 days ago to selfhosted@lemmy.world | 8 comments
- Comment on I benchmarked 6 different metal USB sticks 2 weeks ago:
Wikipedia is only 110GB… library.kiwix.org
- Comment on Minecraft server and reverse proxy 2 weeks ago:
Thanks for the help. This is enough to get me started
- Comment on Minecraft server and reverse proxy 2 weeks ago:
With Crafty you can bind a specific port.
I use tailscale for public access, and have set it up so tailscale users can access the domain.
I guess what I’m asking for is NPM but for tcp.
- Comment on Minecraft server and reverse proxy 2 weeks ago:
No I’m not. I have tailscale setup for external access. (I have dns records already in my domain provider pointing to a tailscale ip, so a device on my tailnet can access my domain. ie an authorized tailscale device can access nginx.example.com) I want to know what I have to do to get minecraft.example.com to resolve interenally.
- Submitted 2 weeks ago to selfhosted@lemmy.world | 19 comments
- Comment on How annoying is it to connect to VPN/use Tailscale instead of being able to access the service directly? 3 weeks ago:
Oh fascinating. I’ll have to look into that
- Comment on Set up Tailscale with NGINX Proxy Manager 3 weeks ago:
Cool okay.
What about the CNAME one?
- Comment on Set up Tailscale with NGINX Proxy Manager 3 weeks ago:
For 4 II, its CNAME Name: @ Target: ???
What is the target supposed to be?
- Comment on Set up Tailscale with NGINX Proxy Manager 3 weeks ago:
A good dashboard helps with not remembering port numbers also. And can look slick
- Comment on Set up Tailscale with NGINX Proxy Manager 3 weeks ago:
Holy crap thank you so much. I was literally thinking of figuring out how to do exactly this EARLIER TODAY!
Thank you again for this write up. I have almost all of what you wrote already done (cloudflare, NPM and tailscale setup) but haven’t hooked Tailscale and NPM together yet.
- Comment on How annoying is it to connect to VPN/use Tailscale instead of being able to access the service directly? 3 weeks ago:
I have gluetun+socks5 containea running, then in an app, I put in
localip:port
into a proxy field. Then that app will use that connection for internet. Browsers on desktop also support proxies. So if you want a specific browser to always use the VPN, this is a very simple way to do that. - Comment on How annoying is it to connect to VPN/use Tailscale instead of being able to access the service directly? 3 weeks ago:
Its not bad using the official wireguard app. Its definitely noticable. On the android battery screen it’ll show around 5% after a full day of use and it on always
- Comment on How annoying is it to connect to VPN/use Tailscale instead of being able to access the service directly? 3 weeks ago:
For an external VPN like mullvad, I run my own proxy. Again it’s only available from my VPN or inside my network.
It uses socks5 and gluetun docket containers and in apps that support proxies, I can add my proxy to it and it’ll route that traffic through the paid VPN.
Or, a work profile (see shelter) or androids new private spaces. If you have private spaces, it uses a seperate network. So if you have a VPN installed outside the private space, it won’t work on apps inside the space. So, what you could do is have a paid VPN inside private spaces, and use it and a web browser or whatever there, and use your server’s VPN outside the private space.
Lmk if you want any of my docker composes
- Comment on How annoying is it to connect to VPN/use Tailscale instead of being able to access the service directly? 3 weeks ago:
I keep it running always. Partly to access stuff at home, and party to get the ad-blocking from pihole.
Do not expose stuff unless you fully understand the security risks
- Comment on Authentication for external sevices 1 month ago:
True. I would like to add another authentication.
I guess my question is how trustworthy is built-in authentication? I’m not really talking about vulnerabilities, but that’s a part of this, but how much trust can I put into a small projects login page being secure?
- Submitted 1 month ago to selfhosted@lemmy.world | 13 comments
- Comment on Programmatic access to discord 2 months ago:
Oh yea I forgot about matrix. Maybe setting up a bridge would work. Thanks for the reminder I’ll look into this
- Comment on Programmatic access to discord 2 months ago:
good question. friends use discord.
- Submitted 2 months ago to selfhosted@lemmy.world | 14 comments
- Comment on TV with infared sensor (mac mini) 2 months ago:
Huh I’ll have to give Kodi a shot. I’ve already got a bunch of Debian experiance and have jelkyfin so leaning kodi shouldn’t be too bad.
- Submitted 2 months ago to selfhosted@lemmy.world | 5 comments
- Comment on NAS OS with a web UI 3 months ago:
Checkout my super recent post history. I’m doing something very very similar.
Basically I’ve decided on Debian for OS, docker plus Portainer and dashy for interface, and mdadm for raid 1.
I’ve tested a raid 1 failure and rebuild on two thumb drives I have, and have everything well documented. Feel free to ask any questions.
- Comment on OS recommendations 3 months ago:
Yea I have a fully seperate backup solution
- Comment on OS recommendations 3 months ago:
Oh cool!
- Comment on OS recommendations 3 months ago:
Any recomended monitoring solutions? Or just proxmox and grafana?
- Comment on OS recommendations 3 months ago:
Do you mean mdadm? raid.wiki.kernel.org/index.php/A_guide_to_mdadm If not can I have a link?
- Submitted 3 months ago to selfhosted@lemmy.world | 38 comments