• platswanB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Started with exposed domains with NPM, SSL certificates, etc. Tried out CloudFlare tunnels and wasn’t satisfied, so I landed on Tailscale. Dead simple to set up and use. Fast, secure, what more to ask for?

  • NekoLukaB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I wanna host everything myself, but also love tailscale, so I’m using tailscale with headscale… It’s so convenient to not open up ports, especially since I don’t have a static IP

  • dnt_pncB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Wireguard because my consumer router has it built-in.

  • AnejeyB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I use all three.

    • CF tunnels to access generic apps I want public.

    • Tailscale to have remote access to my home network.

    • Wireguard tunnel going to a VPS for apps that I don’t feel comfortable running through CF due to the bandwidth (Jellyfin, AzuraCast).

    I totally could move everything that’s on CF tunnels over to Wireguard, but I see no need to do it. Cloudflare is trustworthy enough and I like the additional protection it offers.

    • AnApexBreadB
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      CF tunnels to access generic apps I want public.

      I totally could move everything that’s on CF tunnels over to Wireguard, but I see no need to do it

      How would you keep the public apps public if you require a wireguard connection to access them?

  • TheRealSeeThruHeadB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I use both. Cloudflare is for public facing services. Like overseerr and wizarr.

    Tailscale is how I access my private services and dashboards.

  • AnApexBreadB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Yes.

    I use all three for different purposes.

    It all depends on what my requirements for self hosting some are.

  • ElevenNotesB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Pretty simple answer: Wireguard.

    Why? It’s the fastest of them all, works on almost all devices you can imagine, does not rely on any 3rd party like Tailscale with OICD or other IdP. Tailscale has its use when you are behind CGNAT and don’t want to VPS a Wireguard server somewhere with a static IP, other than that, it has no use in my opinion. I’m fully aware that I get downvotes from people who praise the zero trust principals of Tailscale and all the rest, but they always forget that you can do zero trust since decades with any network equipment (VXLAN) and add Wireguard to the mix. You can even run Wireguard in your local network to encrypt unencryptable traffic like NFS.

    Check back in a few hours /u/Silencer306, this comment will have a few if not many downvotes.

    • AnApexBreadB
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Tailscale has its use when you are behind CGNAT and don’t want to VPS a Wireguard server somewhere with a static IP, other than that, it has no use in my opinion. I’m fully aware that I get downvotes from people who praise the zero trust principals of Tailscale and all the rest, but they always forget that you can do zero trust since decades with any network equipment (VXLAN) and add Wireguard to the mix.

      People just forget that all Tailscale is is a fancy GUI for managing Wireguard. That’s it.

      Wireguard lacks a lot of user management features so you need a service like Tailscale to handle that, but everything zerotier does is something you can already do in wireguard, just simplified.