Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. What are your VPN recommendations for accessing self-hosted applications from the outside?

What are your VPN recommendations for accessing self-hosted applications from the outside?

Scheduled Pinned Locked Moved Selfhosted
selfhosted
89 Posts 60 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • W [email protected]

    Hello,

    Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

    For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

    I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

    From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

    However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

    I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

    Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

    Thanks in advance for your answers!

    D This user is from outside of this forum
    D This user is from outside of this forum
    [email protected]
    wrote last edited by
    #3

    Also a beginner here, I use Tailscale, and it's been a very easy setup!

    W 1 Reply Last reply
    15
    • W [email protected]

      Hello,

      Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

      For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

      I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

      From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

      However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

      I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

      Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

      Thanks in advance for your answers!

      D This user is from outside of this forum
      D This user is from outside of this forum
      [email protected]
      wrote last edited by
      #4

      You got two options which I’ve tried -

      1. A solution like tailscale or zerotier. Simple setup, easy to turn on and just go. Tailscale is newer and has a nicer interface and features like using an actual VPN like Mullvad as an “endpoint” (or whatever they call it). Their Mullvad connection also basically gives you a discount as they charge only $5 for the vpn instead of €5. The catch is that Mullvad charges you that price for 5 devices. So if a sixth device connects to the VPN through tailscale, you get charged $10 for that month.
      2. A cloudflare tunnel with zero trust on top. More work to setup. But makes it easy to access your apps without any vpn. They’re basically exposed to the internet at that point, but locked in behind cloudflare’s authentication. You can literally set it up for one or two email IDs. Yours and a family member’s. Much simpler for others to wrap their heads around. But some people dislike cloudflare for some reason or the other.
      nfreak@lemmy.mlN B 2 Replies Last reply
      4
      • F [email protected]
        1. Mullvad

        2. Mullvad

        3. Mullvad.

        J This user is from outside of this forum
        J This user is from outside of this forum
        [email protected]
        wrote last edited by
        #5

        I’m guessing you are talking about port forwarding with Mullvad but they no longer support it https://mullvad.net/en/blog/removing-the-support-for-forwarded-ports

        F 1 Reply Last reply
        7
        • W [email protected]

          Hello,

          Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

          For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

          I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

          From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

          However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

          I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

          Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

          Thanks in advance for your answers!

          F This user is from outside of this forum
          F This user is from outside of this forum
          [email protected]
          wrote last edited by [email protected]
          #6

          Run WireGuard on some home machine. (Does not need to be the machine the app you want to access is hosted on.)

          Run WireGuard on your road warrior system.

          There is no step 3.

          I'm doing this right now from halfway around the world from my house and it's been great. Been using iPhone, iPad, and macOS clients connected to linuxserver/WireGuard docker container. Been doing this on many WiFi networks and 5G, no difference.

          J W J 0 dantheclamman@lemmy.worldD 5 Replies Last reply
          31
          • J [email protected]

            I’m guessing you are talking about port forwarding with Mullvad but they no longer support it https://mullvad.net/en/blog/removing-the-support-for-forwarded-ports

            F This user is from outside of this forum
            F This user is from outside of this forum
            [email protected]
            wrote last edited by
            #7

            No I am talking about creating a secure tunnel.

            R 1 Reply Last reply
            3
            • W [email protected]

              Hello,

              Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

              For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

              I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

              From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

              However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

              I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

              Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

              Thanks in advance for your answers!

              tywele@lemmy.dbzer0.comT This user is from outside of this forum
              tywele@lemmy.dbzer0.comT This user is from outside of this forum
              [email protected]
              wrote last edited by
              #8

              I use the built-in Wireguard feature of my Fritzbox to connect to my home network.

              W 1 Reply Last reply
              2
              • W [email protected]

                Hello,

                Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

                For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

                I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

                From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

                However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

                I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

                Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

                Thanks in advance for your answers!

                B This user is from outside of this forum
                B This user is from outside of this forum
                [email protected]
                wrote last edited by
                #9

                https://github.com/wg-easy/wg-easy

                WG-Easy to run Wireguard

                M 1 Reply Last reply
                2
                • W [email protected]

                  Hello,

                  Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

                  For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

                  I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

                  From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

                  However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

                  I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

                  Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

                  Thanks in advance for your answers!

                  C This user is from outside of this forum
                  C This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #10

                  Simple and fast solution is tailscale. tailscale is a business, but it works well

                  Personally i use opnsense and wireguard

                  1 Reply Last reply
                  8
                  • D [email protected]

                    You got two options which I’ve tried -

                    1. A solution like tailscale or zerotier. Simple setup, easy to turn on and just go. Tailscale is newer and has a nicer interface and features like using an actual VPN like Mullvad as an “endpoint” (or whatever they call it). Their Mullvad connection also basically gives you a discount as they charge only $5 for the vpn instead of €5. The catch is that Mullvad charges you that price for 5 devices. So if a sixth device connects to the VPN through tailscale, you get charged $10 for that month.
                    2. A cloudflare tunnel with zero trust on top. More work to setup. But makes it easy to access your apps without any vpn. They’re basically exposed to the internet at that point, but locked in behind cloudflare’s authentication. You can literally set it up for one or two email IDs. Yours and a family member’s. Much simpler for others to wrap their heads around. But some people dislike cloudflare for some reason or the other.
                    nfreak@lemmy.mlN This user is from outside of this forum
                    nfreak@lemmy.mlN This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #11

                    The variant version of number 2, which is more work to set up of course, is Pangolin on a VPS. Basically serves the same purpose but skips Cloudflare entirely.

                    I'm in the process of setting up Pangolin and Headscale on a VPS to expose a small handful of services and to replace my wg-easy setup. Currently chaining wg-easy through a gluetun container, so with a single VPN connection I get LAN access and protect my outbound traffic, but I can't for the life of me get the same setup working on wg-easy v15, so I'm going to give tailscale/headscale a try with a gluetun exit node.

                    S D 2 Replies Last reply
                    4
                    • F [email protected]
                      1. Mullvad

                      2. Mullvad

                      3. Mullvad.

                      I This user is from outside of this forum
                      I This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #12

                      There is no need to pay for an external service for this and I don't think Mullvad would work for this use case.

                      F 1 Reply Last reply
                      7
                      • B [email protected]

                        https://github.com/wg-easy/wg-easy

                        WG-Easy to run Wireguard

                        M This user is from outside of this forum
                        M This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #13

                        I would recommend this too. This was the easiest to setup. I only had an issue with docker compose which made the pihole not being accessible while on wireguard. Once I put the pihole and wg-easy on the same docker network it started working.

                        1 Reply Last reply
                        1
                        • D [email protected]

                          You got two options which I’ve tried -

                          1. A solution like tailscale or zerotier. Simple setup, easy to turn on and just go. Tailscale is newer and has a nicer interface and features like using an actual VPN like Mullvad as an “endpoint” (or whatever they call it). Their Mullvad connection also basically gives you a discount as they charge only $5 for the vpn instead of €5. The catch is that Mullvad charges you that price for 5 devices. So if a sixth device connects to the VPN through tailscale, you get charged $10 for that month.
                          2. A cloudflare tunnel with zero trust on top. More work to setup. But makes it easy to access your apps without any vpn. They’re basically exposed to the internet at that point, but locked in behind cloudflare’s authentication. You can literally set it up for one or two email IDs. Yours and a family member’s. Much simpler for others to wrap their heads around. But some people dislike cloudflare for some reason or the other.
                          B This user is from outside of this forum
                          B This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #14

                          I'm in camp #2. Only my Gmail address can access my apps from outside my home. It's a little bit of a pain to configure the rules, but once it's done it's done. I've been happy with it.

                          You do need to have a domain name though.

                          D 1 Reply Last reply
                          1
                          • F [email protected]

                            Run WireGuard on some home machine. (Does not need to be the machine the app you want to access is hosted on.)

                            Run WireGuard on your road warrior system.

                            There is no step 3.

                            I'm doing this right now from halfway around the world from my house and it's been great. Been using iPhone, iPad, and macOS clients connected to linuxserver/WireGuard docker container. Been doing this on many WiFi networks and 5G, no difference.

                            J This user is from outside of this forum
                            J This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #15

                            Is wire guard a service you pay for? Otherwise how does wire guard in your home machine not need your router to forward ports to it? And then the remote client need to be pointed at your home’s external IP?

                            F 1 Reply Last reply
                            3
                            • W [email protected]

                              Hello,

                              Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

                              For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

                              I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

                              From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

                              However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

                              I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

                              Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

                              Thanks in advance for your answers!

                              T This user is from outside of this forum
                              T This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #16

                              Wireguard is the way to go. I like using wg-easy to use wireguard because its easy to set up in a docker container.

                              K 1 Reply Last reply
                              11
                              • J [email protected]

                                Is wire guard a service you pay for? Otherwise how does wire guard in your home machine not need your router to forward ports to it? And then the remote client need to be pointed at your home’s external IP?

                                F This user is from outside of this forum
                                F This user is from outside of this forum
                                [email protected]
                                wrote last edited by [email protected]
                                #17

                                WireGuard is free. Obviously my instructions didn't go into detail about specifically how to set everything up. Port forwarding is required. Knowing your servers external IP address is required. You also need electricity, an ISP subscription, a home server (preferably running Linux), so on and so forth. This is /c/selfhosted after all.

                                J 1 Reply Last reply
                                19
                                • F [email protected]

                                  No I am talking about creating a secure tunnel.

                                  R This user is from outside of this forum
                                  R This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #18

                                  And why, pray tell, do you need Mullvad to do it? I want to know why you think that.

                                  F 1 Reply Last reply
                                  7
                                  • F [email protected]

                                    WireGuard is free. Obviously my instructions didn't go into detail about specifically how to set everything up. Port forwarding is required. Knowing your servers external IP address is required. You also need electricity, an ISP subscription, a home server (preferably running Linux), so on and so forth. This is /c/selfhosted after all.

                                    J This user is from outside of this forum
                                    J This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by [email protected]
                                    #19

                                    Yeah that’s fine. The steps were so simple I figured they could work without router config changes if they made some kind of connection handshake in a third party service’s server.

                                    But given all that, I wonder if it makes sense to look into if your router has its own vpn server (or flash the firmware with one that does.)

                                    F 1 Reply Last reply
                                    1
                                    • F [email protected]

                                      Run WireGuard on some home machine. (Does not need to be the machine the app you want to access is hosted on.)

                                      Run WireGuard on your road warrior system.

                                      There is no step 3.

                                      I'm doing this right now from halfway around the world from my house and it's been great. Been using iPhone, iPad, and macOS clients connected to linuxserver/WireGuard docker container. Been doing this on many WiFi networks and 5G, no difference.

                                      W This user is from outside of this forum
                                      W This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #20

                                      Okay, so that's pretty much the setup I had in mind. Good to know there is not much need for an extra step for security, thanks for the answer !

                                      Well, I guess that would still be vulnerable to DDOS attacks, but that would just prevent me from accessing my cinnamon apple-pie recipe from my self hosted recipe manager for some time. A bit mean, but not catastrophic.

                                      I wondered if there would be some other attacks that could compromise my machine with only a wireguard setup, but that's a good sign if there is nothing obvious.

                                      N 1 Reply Last reply
                                      0
                                      • D [email protected]

                                        Also a beginner here, I use Tailscale, and it's been a very easy setup!

                                        W This user is from outside of this forum
                                        W This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by
                                        #21

                                        Tailscale is very tempting, on one hand it should provide a pretty good layer of security without too much thinking and it is "free", and on another hand, it's a business solution, so it is probably not really free...

                                        Thanks for the answer anyway confirming that Tailscale is pretty easy to setup !

                                        P J 2 Replies Last reply
                                        1
                                        • tywele@lemmy.dbzer0.comT [email protected]

                                          I use the built-in Wireguard feature of my Fritzbox to connect to my home network.

                                          W This user is from outside of this forum
                                          W This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by
                                          #22

                                          Good point, I did not check if my router has already some built-in system that could let me connect to my home network with trusted devices from outside

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups