Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. What are your VPN recommendations for accessing self-hosted applications from the outside?

What are your VPN recommendations for accessing self-hosted applications from the outside?

Scheduled Pinned Locked Moved Selfhosted
selfhosted
89 Posts 60 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J [email protected]

    Apologies for the dumb noob question, but if your iOS device is VPNed to your home server, how does it access the open internet? Does it do this via the VPN?

    eszidiszi@lemmy.worldE This user is from outside of this forum
    eszidiszi@lemmy.worldE This user is from outside of this forum
    [email protected]
    wrote last edited by [email protected]
    #30

    Depends on the client configuration. If you route all the traffic through vpn (so, simplified, 0.0.0.0/0) then all their client device network traffic would go through their vpn server at home and is seen as coming from there; otherwise, if you only route specific addressess (like your home network private addressess only) then only those go to their home network and everything else works like it would without a vpn.

    1 Reply Last reply
    7
    • J [email protected]

      Apologies for the dumb noob question, but if your iOS device is VPNed to your home server, how does it access the open internet? Does it do this via the VPN?

      F This user is from outside of this forum
      F This user is from outside of this forum
      [email protected]
      wrote last edited by [email protected]
      #31

      WireGuard routes certain traffic from the client (your iPhone) through the server (the computer at your house). If you route all traffic, then when your iPhone accesses the internet, it's as if you were at home. Since that WireGuard server is sitting on your home LAN, it is able to route your phones traffic to anything else on that LAN, or out to the internet.

      Wireguard clients have a setting called AllowedIPs that tells the client what IP subnets to route through the server. By default this is 0.0.0.0/0, ::/0, which means "all ipv4 and all ipv6 traffic". But If all you want to access are services on your home LAN, then you change that to 192.168.0.0/24 or whatever your home subnet is, and only traffic heading to that network will be routed through the WireGuard server at your house, but all other traffic goes out of your phone's normal network paths to the internet.

      J 1 Reply Last reply
      6
      • F [email protected]

        It does work for this use case.

        You don't need to, you can use wire guard.

        Mullvad is the only VPN you can pay for with cash and actually remain untraced.

        I This user is from outside of this forum
        I This user is from outside of this forum
        [email protected]
        wrote last edited by
        #32

        Can you explain how to make it work for this use case?

        1 Reply Last reply
        0
        • W [email protected]

          Okay, so that's pretty much the setup I had in mind. Good to know there is not much need for an extra step for security, thanks for the answer !

          Well, I guess that would still be vulnerable to DDOS attacks, but that would just prevent me from accessing my cinnamon apple-pie recipe from my self hosted recipe manager for some time. A bit mean, but not catastrophic.

          I wondered if there would be some other attacks that could compromise my machine with only a wireguard setup, but that's a good sign if there is nothing obvious.

          N This user is from outside of this forum
          N This user is from outside of this forum
          [email protected]
          wrote last edited by
          #33

          You wouldn't be any more vulnerable to ddos attacks than without WG.

          1 Reply Last reply
          0
          • F [email protected]

            WireGuard routes certain traffic from the client (your iPhone) through the server (the computer at your house). If you route all traffic, then when your iPhone accesses the internet, it's as if you were at home. Since that WireGuard server is sitting on your home LAN, it is able to route your phones traffic to anything else on that LAN, or out to the internet.

            Wireguard clients have a setting called AllowedIPs that tells the client what IP subnets to route through the server. By default this is 0.0.0.0/0, ::/0, which means "all ipv4 and all ipv6 traffic". But If all you want to access are services on your home LAN, then you change that to 192.168.0.0/24 or whatever your home subnet is, and only traffic heading to that network will be routed through the WireGuard server at your house, but all other traffic goes out of your phone's normal network paths to the internet.

            J This user is from outside of this forum
            J This user is from outside of this forum
            [email protected]
            wrote last edited by
            #34

            Ahh. But what if you already used a VPN on the client for normal browsing etc - can you have two VPNs configured?

            S F 2 Replies Last reply
            0
            • nfreak@lemmy.mlN [email protected]

              The variant version of number 2, which is more work to set up of course, is Pangolin on a VPS. Basically serves the same purpose but skips Cloudflare entirely.

              I'm in the process of setting up Pangolin and Headscale on a VPS to expose a small handful of services and to replace my wg-easy setup. Currently chaining wg-easy through a gluetun container, so with a single VPN connection I get LAN access and protect my outbound traffic, but I can't for the life of me get the same setup working on wg-easy v15, so I'm going to give tailscale/headscale a try with a gluetun exit node.

              S This user is from outside of this forum
              S This user is from outside of this forum
              [email protected]
              wrote last edited by
              #35

              For the vps, will you go with a provider like digital ocean?

              nfreak@lemmy.mlN 1 Reply Last reply
              1
              • J [email protected]

                Ahh. But what if you already used a VPN on the client for normal browsing etc - can you have two VPNs configured?

                S This user is from outside of this forum
                S This user is from outside of this forum
                [email protected]
                wrote last edited by
                #36

                No, think of a VPN as a network cable. You can only send out of one or the other.

                Now, if you are connected to a device that has another VPN to somewhere you want to go, then technically yes you would be using 2 VPN connections.

                1 Reply Last reply
                3
                • W [email protected]

                  Hello,

                  Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

                  For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

                  I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

                  From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

                  However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

                  I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

                  Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

                  Thanks in advance for your answers!

                  ? Offline
                  ? Offline
                  Guest
                  wrote last edited by
                  #37

                  1 pangolin
                  2 whatever is already on your router
                  3 wireguard

                  Pangolin also does RP with traefik so it's a win win

                  1 Reply Last reply
                  1
                  • W [email protected]

                    Tailscale is very tempting, on one hand it should provide a pretty good layer of security without too much thinking and it is "free", and on another hand, it's a business solution, so it is probably not really free...

                    Thanks for the answer anyway confirming that Tailscale is pretty easy to setup !

                    J This user is from outside of this forum
                    J This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #38

                    Headscale is an open source implementation of the Tailscale control server.

                    https://github.com/juanfont/headscale

                    Not an endorsement as I haven't used it (I do use Tailscale), but just thought I'd point it out.

                    J 1 Reply Last reply
                    1
                    • W [email protected]

                      Hello,

                      Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

                      For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

                      I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

                      From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

                      However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

                      I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

                      Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

                      Thanks in advance for your answers!

                      ikidd@lemmy.worldI This user is from outside of this forum
                      ikidd@lemmy.worldI This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #39

                      Tailscale is easier than Wireguard but if you're running OPNsense or OpenWRT it's not hard to do a wireguard infra of your own and avoid having to use an outside service. I ended up having to revert to wireguard anyway because Tailscale's android app wasn't reliable on my new phone, it would drop out every few hours which messed up my monitor/alert system.

                      But Tailscale is still the easier of the two solutions.

                      1 Reply Last reply
                      4
                      • J [email protected]

                        Ahh. But what if you already used a VPN on the client for normal browsing etc - can you have two VPNs configured?

                        F This user is from outside of this forum
                        F This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #40

                        I don't think iOS allows multiple VPNs to be enabled simultaneously. There appears to be only one VPN on/off toggle switch. From what I've seen you can have different vpn profiles but only enable one at a time. I could be wrong though.

                        Desktop operating systems like macOS, Linux (did I mention yet that I use arch Linux?), BSD, and um.. that other one... oh yeah, Windows do allow this. I'm sure there are a variety of compatibility problems, but in general, multiple VPNs with the same or even different technologies can work together.

                        1 Reply Last reply
                        0
                        • W [email protected]

                          Hello,

                          Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

                          For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

                          I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

                          From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

                          However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

                          I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

                          Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

                          Thanks in advance for your answers!

                          P This user is from outside of this forum
                          P This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #41

                          Zero tier. I went tailscale originally, and they're good, but their mdns support doesn't exist and several services rely on it. (For me, the showstopper was time machine backups)

                          D maxwellfire@lemmy.worldM 2 Replies Last reply
                          3
                          • T [email protected]

                            Wireguard is the way to go. I like using wg-easy to use wireguard because its easy to set up in a docker container.

                            K This user is from outside of this forum
                            K This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #42

                            wg-easy

                            Agree, highly recommend this and/or Tailscale.

                            vanilla_puddinfudge@infosec.pubV 1 Reply Last reply
                            2
                            • W [email protected]

                              Hello,

                              Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

                              For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

                              I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

                              From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

                              However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

                              I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

                              Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

                              Thanks in advance for your answers!

                              D This user is from outside of this forum
                              D This user is from outside of this forum
                              [email protected]
                              wrote last edited by [email protected]
                              #43

                              I rarely if ever see ZeroTier mentioned as a solution, but it's a self-hostable encrypted virtual mesh network (with a small free tier for corp-hosted), super secure, and really easy to setup. I use ZTnet instead of the free-tier corp-hosted controller

                              wreckedcarzz@lemmy.worldW 1 Reply Last reply
                              3
                              • F [email protected]

                                I didn't say you need it. I strongly recommend the as a provider.

                                sunny@slrpnk.netS This user is from outside of this forum
                                sunny@slrpnk.netS This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #44

                                Please do enlighten me how you use Mullvad to access you self-hosted services in your home? Like OP asked for.

                                1 Reply Last reply
                                1
                                • W [email protected]

                                  Hello,

                                  Some time ago, I started self-hosting applications, but only on my local network. So far, it's working fine, but I can't access them as soon as I go outside (which is completely normal).

                                  For the past few days I've been looking for a relatively secure way of accessing my applications from outside.

                                  I don't need anyone but myself to have access to my applications, so from what I've understood, it's not necessarily useful to set up a reverse-proxy in that case and it would be simpler to set up a VPN.

                                  From what I've seen, Wireguard seems to be a good option. At first glance, I'd have to install it on the machine containing my applications, port-forward the Wireguard listening port and configure my other devices to access this machine through Wireguard

                                  However, I don't have enough hindsight to know whether this is a sufficient layer of security to at least prevent bots from accessing my data or compromising my machine.

                                  I've also seen Wireguard-based solutions like Tailscale or Netbird that seem to make configuration easier, but I have a hard time knowing if it would really be useful in my case (and I don't really get what else they are doing despite simplifying the setup).

                                  Do you have any opinions on this? Are there any obvious security holes in what I've said? Is setting up a VPN really the solution in my case?

                                  Thanks in advance for your answers!

                                  U This user is from outside of this forum
                                  U This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #45

                                  My Asus router has a a few nice ones

                                  S U 2 Replies Last reply
                                  0
                                  • U [email protected]

                                    My Asus router has a a few nice ones

                                    S This user is from outside of this forum
                                    S This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #46

                                    This is a pointless comment. You don't even tell us what model router you're running...

                                    1 Reply Last reply
                                    4
                                    • P [email protected]

                                      Zero tier. I went tailscale originally, and they're good, but their mdns support doesn't exist and several services rely on it. (For me, the showstopper was time machine backups)

                                      D This user is from outside of this forum
                                      D This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #47

                                      huh. I knew there was a reason for me to go back to ZT. mdns, you say? Nice to know!

                                      1 Reply Last reply
                                      0
                                      • B [email protected]

                                        I'm in camp #2. Only my Gmail address can access my apps from outside my home. It's a little bit of a pain to configure the rules, but once it's done it's done. I've been happy with it.

                                        You do need to have a domain name though.

                                        D This user is from outside of this forum
                                        D This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by
                                        #48

                                        pretty cheap to get a domain name through Cloudflare too - nine bucks a year for a .com , I think? Just get something completely personal or completely random! 😄
                                        They even have a way to get emails routed to your general inbox. It's fugly, but it works!

                                        1 Reply Last reply
                                        0
                                        • nfreak@lemmy.mlN [email protected]

                                          The variant version of number 2, which is more work to set up of course, is Pangolin on a VPS. Basically serves the same purpose but skips Cloudflare entirely.

                                          I'm in the process of setting up Pangolin and Headscale on a VPS to expose a small handful of services and to replace my wg-easy setup. Currently chaining wg-easy through a gluetun container, so with a single VPN connection I get LAN access and protect my outbound traffic, but I can't for the life of me get the same setup working on wg-easy v15, so I'm going to give tailscale/headscale a try with a gluetun exit node.

                                          D This user is from outside of this forum
                                          D This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by
                                          #49

                                          haven't looked at Pangolin, but thanks for the info! I might explore it in the future if my current setup gives me any issues.

                                          nfreak@lemmy.mlN 1 Reply Last reply
                                          1
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups