Worth noting that there’s an open issue to support Wireguard peers into Headscale, so you could use it with e.g. a wg0.conf file from a commercial VPN
- 1 Post
- 11 Comments
If you can selfhost and can use containers/docker, I wanna shamelessly plugin my solution: https://github.com/stratself/tswg. Basically mount a WireGuard config from Nord or any upstream VPN, and the container will tunnel traffic to said VPN when you choose it as an exit node.
There are other gluetun + tailscale solutions that are worth a look too
Ah right, completely forgot about that (80 for HTTP-01, 443 for TLS-ALPN-01). Is a bummer unfortunately
Thanks for the guide. How did you get the VPN forwarded port? I believe this depends on the VPN provider’s software?
Let’s Encrypt are rolling out IP-based certs, you may wanna follow its development. I’m not sure if it could be used for your forwarded VPN port, but it’d be nice anyhow
Edit: I believe encryption helps prevent tampering the data between the server and user too. It should prevent for example, someone MITM the connection and injecting malicious content that tells the user to download malware
stratself@lemdro.idOPto Selfhosted@lemmy.world•Looking for lightweight homelab dashboard that can run as nonroot container and also supports OIDCEnglish6·12 days agoI’ve poked around Homarr’s setup a bit, and it seems like it can run rootless after a few tweaks!
For anyone interested, I’ve written a POC and feature request here - https://github.com/homarr-labs/homarr/issues/3913
Hope it can be officially supported
stratself@lemdro.idOPto Selfhosted@lemmy.world•Looking for lightweight homelab dashboard that can run as nonroot container and also supports OIDCEnglish3·12 days agoThanks for the advice. I’m already using podman rootless with custom subuid/subgid, which should achieve the same thing
stratself@lemdro.idto Selfhosted@lemmy.world•Started hosting my own Nextcloud and its awesome!English1·13 days agoI agree that the file sync is good. They (and owncloud afaik) are the only ones supporting virtual files on windows where you only download files when needed, saving storage space.
I suppose these fancy file features (bidirectional syncing, advanced conflict resolution etc) are targeted to the enterprise, not home users. So it’s natural they’d include it with a bunch of bells and whistles that are half as good
stratself@lemdro.idto Selfhosted@lemmy.world•Started hosting my own Nextcloud and its awesome!English6·13 days agoOwncloud had a rewrite called oCIS (Owncloud Infinite Scale). Then it was bought by Kiteworks. Then many of the core devs switched to a new product/company called Opencloud. There’s been quite some history over the past few years
stratself@lemdro.idto Selfhosted@lemmy.world•HELP: Wireguard for home network with remote exit nodeEnglish2·15 days agoHey, glad you got it working. I’m late to the party, but I got a similar solution here: https://github.com/stratself/tswg. Basically just mounts your own wg.conf to the container and get Tailscale connected over it
Since Wireguard is peer-to-peer, I suppose the “intended” way is to install Tailscale on every client. But it is possible to use the router as a VPN gateway as per this [OpenWRT guide])https://openwrt.org/docs/guide-user/services/vpn/tailscale/start#force_lan_traffic_to_route_through_exit_node). Hope you get it working anyhow
Should’ve specifically asked the operators/hosters if they need a better answer. But this has more engagement so