• @ia42B
    link
    fedilink
    English
    17 months ago

    When I cruise around the net I sometimes use Mullvad as an ass-guard.

    When I connect to my own server I have SSH, and if I ever need to access a local port I use port redirect over the SSH tunnel.

    As a backup of a backup, if I am at a site that blocks access to remotes on port 22, I have sslh running on port 443 in front of my nginx, intercepting TLS for nginx, SSH and openVPN (running in docker) all on the one port, so I have options…

  • @ElevenNotesB
    link
    fedilink
    English
    17 months ago

    Pretty simple answer: Wireguard.

    Why? It’s the fastest of them all, works on almost all devices you can imagine, does not rely on any 3rd party like Tailscale with OICD or other IdP. Tailscale has its use when you are behind CGNAT and don’t want to VPS a Wireguard server somewhere with a static IP, other than that, it has no use in my opinion. I’m fully aware that I get downvotes from people who praise the zero trust principals of Tailscale and all the rest, but they always forget that you can do zero trust since decades with any network equipment (VXLAN) and add Wireguard to the mix. You can even run Wireguard in your local network to encrypt unencryptable traffic like NFS.

    Check back in a few hours /u/Silencer306, this comment will have a few if not many downvotes.

    • @AnApexBreadB
      link
      fedilink
      English
      17 months ago

      Tailscale has its use when you are behind CGNAT and don’t want to VPS a Wireguard server somewhere with a static IP, other than that, it has no use in my opinion. I’m fully aware that I get downvotes from people who praise the zero trust principals of Tailscale and all the rest, but they always forget that you can do zero trust since decades with any network equipment (VXLAN) and add Wireguard to the mix.

      People just forget that all Tailscale is is a fancy GUI for managing Wireguard. That’s it.

      Wireguard lacks a lot of user management features so you need a service like Tailscale to handle that, but everything zerotier does is something you can already do in wireguard, just simplified.

    • @ArgoPanoptesB
      link
      fedilink
      English
      17 months ago

      If you can use Wireguard that is probably a good solution but I would still prefer to have a cloud proxy in front of it because my network can not handle all the attacks and wouldn’t even notice some of them if you use just Wireguard.

      I use CF Tunnels firstly because of all the protections and traffic analysis it does, and secondly, because even DDNS wouldn’t work on my network.

      • @HoytAvilaB
        link
        fedilink
        English
        17 months ago

        What attacks are you worried about when you open wireguard port?

        It is a UDP port so attacks are limited, and changing the default port gives you even greater protection. So they cant even know you are running wireguard behind that port. (If someone is able to know then most likely it is your ISP lol)

        Wireguard just works, you own everything and control everything.

        Im struggling to find a reason to not use wireguard for security reasons which forces you to use cloudflare or tailscale, if wireguard is not secure enough for you then there are more things to worry about other than what tech to expose services with.

  • @arcadianarcadianB
    link
    fedilink
    English
    17 months ago

    Wireguard.

    Because I would like to self-host everything myself, so why should I use another 3rd party service?

  • @LegitimateCopy7B
    link
    fedilink
    English
    17 months ago

    wireguard as primary, Tailscale as backup.

    if I have something I don’t mind Cloudflare and the government taking a look, then Cloudflare tunnel.

  • @AnejeyB
    link
    fedilink
    English
    17 months ago

    I use all three.

    • CF tunnels to access generic apps I want public.

    • Tailscale to have remote access to my home network.

    • Wireguard tunnel going to a VPS for apps that I don’t feel comfortable running through CF due to the bandwidth (Jellyfin, AzuraCast).

    I totally could move everything that’s on CF tunnels over to Wireguard, but I see no need to do it. Cloudflare is trustworthy enough and I like the additional protection it offers.

    • @AnApexBreadB
      link
      fedilink
      English
      17 months ago

      CF tunnels to access generic apps I want public.

      I totally could move everything that’s on CF tunnels over to Wireguard, but I see no need to do it

      How would you keep the public apps public if you require a wireguard connection to access them?

  • @TheRealSeeThruHeadB
    link
    fedilink
    English
    17 months ago

    I use both. Cloudflare is for public facing services. Like overseerr and wizarr.

    Tailscale is how I access my private services and dashboards.

  • @jkirkcaldyB
    link
    fedilink
    English
    17 months ago

    For work, Tailscale between vps and server. It works like cloudflare tunnels but doesn’t have the issues with the TOS excluding media streaming etc.

    Keeps the internal server relatively safe and we can stream media/serve media content.

    Cloudflare is our registrar and dns provider.

  • @AnApexBreadB
    link
    fedilink
    English
    17 months ago

    Yes.

    I use all three for different purposes.

    It all depends on what my requirements for self hosting some are.

  • @omnitermB
    link
    fedilink
    English
    17 months ago

    I use Twingate, saw it in a network chuck video and setup was easy. At one point I had a VPN server running on a raspberry pi but never really used it just like I don’t really use twingate that much. I may eventually setup wireguard on my cloud server so I’m the one hosting everything but for now it’s not something I use so it’s one of those when I get around to it.

  • @numblock699B
    link
    fedilink
    English
    17 months ago

    To access my stuff at home and elsewhere from anywhere I use Twingate. I don’t expose anything from my home via Cloudflare. I do use cloudflare WAFs for stuff on my VPSs.

  • @terramotB
    link
    fedilink
    English
    17 months ago

    I have a domain on cloudflare to map internal IPs/services and use wireguard to reach the network. Tried Tailscale and Zerotier, there was a problem on some devices when switching from wifi to internet which was breaking internet access, switched to Wireguard and now i’m happy.

  • @secopsxB
    link
    fedilink
    English
    17 months ago

    I just use the UDM-SE App (Teleport). I can connect on demand and get to all of my services, get adblocking while I’m out and about. Teleport on ubiquiti is just wireguard renamed.

    I don’t need to expose any services from my home network, because I’m the only one using them. If It wasn’t just me, I’d just have them download the wifiman app, send them a teleport link and boom…they’re in on the local network. Exposing “services” for a convenience factor is just too much of a security risk for myself.

    I host all of my websites on github (free) and leverage vercel for CI/CD pipelines (again, free). Domains are the only thing public and that I pay for. (local dns reasons for lets encrypt certs) and for my public websites not associated with my home infrastructure.

  • @platswanB
    link
    fedilink
    English
    17 months ago

    Started with exposed domains with NPM, SSL certificates, etc. Tried out CloudFlare tunnels and wasn’t satisfied, so I landed on Tailscale. Dead simple to set up and use. Fast, secure, what more to ask for?

  • @Encrypt-KeeperB
    link
    fedilink
    English
    17 months ago

    For starters the CF tunnel means your service is publicly accessible and Tailscale or Wireguard it won’t be.

  • @Cold-Membership7654B
    link
    fedilink
    English
    17 months ago

    I have been experimenting with Tailscale and it’s just not fast enough for our needs. It’s insanely simple to setup and get guys going on it, but in the end we couldn’t get more than ~20mbit or so, if even that. Looking forward to giving Netmaker a shot (Still a Wireguard Kernel as Tailscale), but we need to be able to switch allowed access between different groups of external users throughout the day. Ideally in a way that only requires a click or two, or can be somehow automated into a click or two.