this post was submitted on 07 Sep 2023
236 points (98.8% liked)

Selfhosted

39624 readers
491 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

cross-posted from: https://lemmy.blahaj.zone/post/2728889

From the article:

Since Tailscale was founded in 2019, customers have been forced to choose between either Tailscale or Mullvad without the ability for them to co-exist.
Today we announce a partnership with Tailscale that allows you to use both in conjunction through the Tailscale app. This functionality is not available through the Mullvad VPN app. This partnership allows customers of Tailscale to make use of our WireGuard VPN servers as “exit nodes”. This means that whilst connected to Tailscale, you can access your devices across Tailscale’s mesh network, whilst still connecting outbound through Mullvad VPN WireGuard servers in any location.

Announcement also on Tailscale blog.

top 37 comments
sorted by: hot top controversial new old
[–] Decronym@lemmy.decronym.xyz 26 points 1 year ago* (last edited 1 year ago) (1 children)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
CSAM Child Sexual Abuse Material
DNS Domain Name Service/System
IP Internet Protocol
NAS Network-Attached Storage
Plex Brand of media server package
SSH Secure Shell for remote terminal access
VPN Virtual Private Network
VPS Virtual Private Server (opposed to shared hosting)

8 acronyms in this thread; the most compressed thread commented on today has 11 acronyms.

[Thread #116 for this sub, first seen 7th Sep 2023, 21:05] [FAQ] [Full list] [Contact] [Source code]

[–] skadden@ctrlaltelite.xyz 12 points 1 year ago (1 children)

Wow this is great. I've been having trouble getting exit nodes working properly with these two. Sad that mullvad dropped port forwarding though so I'm not sure if I'll stay with them.

[–] Molecular0079@lemmy.world 0 points 1 year ago (1 children)

Yeah I swapped over to ProtonVPN after they dropped support for port forwarding. Shame really because I did really enjoy Mullvad's VPN service.

[–] natenten@feddit.nl 0 points 1 year ago (1 children)

Does the port forwarding works on Linux CLI? Last time I checked it was only through their GUI app

[–] Molecular0079@lemmy.world 1 points 1 year ago

Yeah the Proton VPN gui app for Linux does not include port forwarding. I believe only their Windows app does at the moment. However, if you use their Wireguard certs and then follow their port forwarding instructions, it works quite well. Make sure you either disable IPv6 on your system or set IPv6 to link-local and add ::/0 to AllowedIPs, otherwise your IPv6 will leak since ProtonVPN does not support IPv6 at the moment.

[–] nix@merv.news 12 points 1 year ago (6 children)

Do people use Tailscale to be able to access local things on their network like Plex media servers when they’re not home? Tailscale looks interesting but I haven’t found a usecase where it would benefit me

[–] LiveLM@lemmy.zip 11 points 1 year ago

Yes, exactly that.
I use it to SSH into my devices all the time.

[–] liara@lemm.ee 5 points 1 year ago

I don't really use it for this, but here are some things I do use it for:

  • metrics scraping on servers without needing to open ports or worry about ssl encryption. Works great for federating Prometheus instances or scraping exporters
  • secure access to machines not directly exposed to the internet. I.e. ssh access to my home box while I'm traveling
  • being an exit node for web traffic while traveling. I.e. maybe you are traveling and have a bank who is giving you grief about logging in -- masquerade that connection from your home IP

I mostly just use it for metrics scraping though

Plex probably isn't the best example, but yes, you can use Tailscale to create a sort of mesh network to access devices within private networks. Essentially any device that's connected to tailscale can be contacted by other clients connected to tailscale. There are extra routing things you can do to use a tailscale device as a sort of "exit node", but that's the basic gist.

[–] kinttach@lemm.ee 2 points 1 year ago

Not Plex, but yes. I use it with Microsoft Remote Desktop if I need to access a work-related computer that I keep at home while traveling.

I also use it for the more typical use case of a cloud server that I can ssh into even though it exposes zero ports publicly.

[–] DigitalPortkey@lemmy.world 2 points 1 year ago (1 children)

It's accessing literally anything you self host from home, with minimal latency and without any port forwarding on your router or exposing your services to the Internet.

It's primary benefit is how fast it is, how much easier it is to set up for even the most novice of users, and how ubiquitous all the clients are.

Plus it's free for 100 endpoints, which is far more than most individuals will need for home labs. And even that you can get around by using subnet routing.

If you've ever wanted to run your own sort of Dropbox or Google docs (Syncthing/Next cloud) but didn't want to deal with the security hassle of exposing it to the Internet, this removes that completely. No more struggling with open ports, fail2ban, or messing with reverse proxies.

[–] nix@merv.news 1 points 1 year ago

That’s super convenient

[–] deleted@lemmy.world 1 points 1 year ago

I use it to reach all of my services when I go out.

I’ve audiobooks, RSS, music, and cloud.

[–] nyakojiru@lemmy.dbzer0.com 6 points 1 year ago* (last edited 1 year ago) (1 children)

The issue with Tailscale is that in phone it uses the VPN and you are not able to a vpn or a Adblock service like Adguard. But now I believe it will be interesting to have a exit node with Mullvad vpn to block all shit on all devices inside the tailscale nerwork . Another good thing of tailscale it makes services like jellyfin, plex and syncthing easier.

[–] chili1553@lemmy.world 4 points 1 year ago (1 children)

I use tailscale with next dns, it works great. I don't use magic DNS, however, but it's a trade off I'm okay with for the benefit of blocking at the edge

[–] nyakojiru@lemmy.dbzer0.com 3 points 1 year ago (2 children)

Sound interesting. Can you tell me how do you configure it and if you did it in both android and iOS? Thank you

[–] rizoid@midwest.social 2 points 1 year ago (1 children)

I'm not the guy you asked but I do the same thing. In the tailscale dashboard you can set up a default DNS for every device that is connected to your tailnet. They support nextdns and a couple other things. I have mine pointed to my personal adgaurd home server that is within my tailnet and it works great. I used nextdns for a while but didn't want to pay for it. It also worked great with tailscale.

[–] nyakojiru@lemmy.dbzer0.com 1 points 1 year ago
[–] DigitalPortkey@lemmy.world 1 points 1 year ago (1 children)
[–] nyakojiru@lemmy.dbzer0.com 1 points 1 year ago

Yeah found the guide after looking around . Ty

[–] CumBroth@discuss.tchncs.de 5 points 1 year ago* (last edited 1 year ago) (2 children)

If anyone wants to achieve something similar without using Tailscale or with alternative VPN providers, the setup outlined in this LSIO guide is pretty neat: https://www.linuxserver.io/blog/advanced-wireguard-container-routing

Edit: Don't be intimidated by the word "advanced". I struggled with this a bit at first (was also adapting it to use at home instead of on a VPS that's tunneling to home) but I got it working eventually and learned a lot in the process. Willing to assist folks who want to set it up.

[–] dan@upvote.au 2 points 1 year ago* (last edited 1 year ago)

As an aside, I wish technical documents like this would stop saying "Wireguard client" and "Wireguard server". Wireguard doesn't have clients and servers - everyone is a peer, and whether you can route through the peer or not is just based on the routing table and nftables/iptables rules.

[–] zzzz@lemmy.world 1 points 1 year ago

You can also achieve this with any VPN by using two Docker containers:

  1. Gluetun: https://github.com/qdm12/gluetun
  2. Tailscale: https://tailscale.com/kb/1282/docker/

Set Gluetun up to connect to your VPN (they support a huge number of providers) and then set the Tailscale container to use the Gluetun's network. Then, use that Tailscale container as your exit node.

You can also combine this with a self-hosted Headscale (https://github.com/juanfont/headscale) instance.

[–] LunchEnjoyer@lemmy.world 5 points 1 year ago

I'm glad these two great companies found their way together, love to see it!

[–] imgonnatrythis@lemm.ee 4 points 1 year ago

Yeah, sorry, still turning elsewhere since port forwarding a no go.

[–] zjaume@lemm.ee 4 points 1 year ago (1 children)

I always wanted this mesh feature in mullvad. But how this works with privacy? I mean, does the combination with a user loged service like tailscale diminish the privacy of anonymous mullvad accounts?

[–] warmaster@lemmy.world 3 points 1 year ago

I think it's diminished, yes. Regardless of whatever PR spin they might pull, I don't think there's any way around it.

[–] nyakojiru@lemmy.dbzer0.com 3 points 1 year ago

Only available in a few countries, not in Latin America. It is not mentioned anywhere.

[–] kryllic@programming.dev 2 points 1 year ago

Well hot damn this is pretty awesome

[–] nieceandtows@programming.dev 0 points 1 year ago (1 children)

Could somebody help me out? I setup Tailscale on my media server box, trying to use it alongside Windscribe has basically bricked ssh on the box. With this news, am I to understand that Tailscale will not work with any vpn other than mullvad?

[–] BastingChemina@slrpnk.net 2 points 1 year ago

I just it with protonVPN on Linux with no issue.

I don't know about exit node on Tailscale because I don't use it but the rest is working absolutely fine.

[–] emax_gomax@lemmy.world 0 points 1 year ago (1 children)

I have the utmost respect and appreciation for mullvad but I don't need a vpn without port forwarding so I cancelled my sub. They are still objectively the vest vpn, this is the only sticking point.

[–] MrPoopbutt@lemmy.world 0 points 1 year ago (1 children)

What does port forwarding gain you on a VPN? Sorry if the question is ignorant

[–] dan@upvote.au 0 points 1 year ago* (last edited 1 year ago) (1 children)

You need it for file sharing apps like BitTorrent or Soulseek, if you don't want to be seen as a leech, and/or you want to use private trackers where you need to maintain a good ratio. :)

[–] AlexisFR@jlai.lu 0 points 1 year ago (1 children)

Then you can just use a seed box on top of your downloading

[–] dan@upvote.au 1 points 1 year ago* (last edited 1 year ago)

Why would you use a seedbox if you have a home server? The home server can be the seedbox. A lot of homelabbers would have a good enough connection for it.

Edit: Using a VPN with port forwarding, of course.