Then it follows the same principles as cloud flare. Create a site (vpn endpoint), get a docker snippet for a newt (what they call the vpn connector), paste it in the docker compose on your Homeserver and see it come up in the Webinterface.
Then you create a public resource and point it to said site and give it a url.
Temp stuff where I could care less about the free tier domain name or things that I just want to funnel to my existing devices: Tailscale
Widespread, prolonged services that will be more actively maintained for a longer amount of time and can just spin off of its own domain/subdomain: Cloudflare
I nearly hit the cap once when I first testing sunshine/moonlight to see how much bandwidth my set up could do and kinda FOMO for the steam deck hype.
It's like 150 mb/s and works so well (for the kind of games I play) that I forgot the egress cap and just play for like a weeks even in the house, I realized and stop at ~ 9TB. My usual usage don't even hit a TB most of the time lol.
Expose internal services to the public internet with automatic TLS, authentication, access restrictions, and traffic routing through the NetBird mesh network.
No, you cannot. Putting in your emails just redirects to the identity provider you used when signing up. If you try to create an account you'll see that email's not a option.
Dunno if Cloudflare does effective auth for the tunnel or if you have to set that up yourself, but I don't bother trying to expose services to the internet in any way because some of this stuff was just never designed for proper web security (cough Jellyfin).
It's still worth setting up a wildcard cert with ACME so you get nice https and a real domain.
Cloudflare has some opt-in auth. Mail-OTP is a nice balance imo: You can allowlist mail addresses per service/subdomain and set expiry for each. Then for access, you first have to enter the mail address, get the OTP and then access the service.
So, nobody without access to allowed mail addresses even gets to knock on you door.
But yeah, that's why I think about going tail scale: why bother having something exposed when not needed?
I just think, some services might be nice to provide to friends, too - and having them connect to my tailnet for this is a bit too much friction, I guess
Just Wireguard on a router, but I'm thinking Netbird.
WG can be a bit PITA to set up, but once you do, it just works. What I would to have is more fine grained control over who goes where if I were to expose some of the services to friends.
wg-easy can greatly simplify your wireguard setup. Allows you to quickly generate access configs for friends and family on the fly (QR-codes, too). You still get access to post-up/-down hooks if you want tp create a more specialised deployment.
I have a free vps providing me a public IPv4 address, connected to my opnsense router via tailscale, and use a simple port forward from the VPs to the router's tailscale IP.
I have certain port/connections coming in either via the tailscale IP or my external IPv6 address all forwarded to my internal Caddy reverse proxy which itself is only running IPv4.
And I use cloudflare for my dynamic DNS resolution of my domain. A records are my public VPS IPv4 and AAAA are my own public IPv6 addresses respectively.
If/when I change to a service provider that doesn't use CGnat for IPv4, I can stop doing the forwarding from my VPS.
That's so we can stream music/video without needing to use the VPN.
But, I also run tailscale on my phone, so I can do admin stuff remotely from it, albeit painfully, on this small screen when things break. 🤣
I actually have Wireguard running on a pi zero 2, all it really does is provide me my pihole DNS.
Edit:
I should say I have pihole running on a couple of pi 5’s currently, overkill yes but one of my pi 4’s was sacrificed to the whims of magic smoke another was donated to a friend and another now hosts HAOS, I have a few pi zero 2’s (only one was sacrificial) the one that hosts wireguard has one of my last few working SD cards. The pi 5’s host many other things other than just pihole.
In the not to distant future I will be retiring wireguard from that pi zero 2 and turning it into a pots server. I have grand ambitions to make a better home lab with a few more pi’s and to help me get away from big tech more.
The only thing google I have is an email I do not use but so I can watch YouTube, but I use unwatched to block ads.
The only thing apple is my iPhone and my iPad, when it becomes time to replace those I will have to figure out graphenOS and some Linux distro for a tablet of some sort.
tofu
Als Antwort auf frosch • • •androidul
Als Antwort auf tofu • • •frosch
Als Antwort auf tofu • • •Manodor
Als Antwort auf frosch • • •prenatal_confusion
Als Antwort auf frosch • • •fleem
Als Antwort auf prenatal_confusion • • •prenatal_confusion
Als Antwort auf fleem • • •frosch
Als Antwort auf prenatal_confusion • • •When I looked into it first, Pangolin seemed a bit overwhelming.
Is it hard to set up?
prenatal_confusion
Als Antwort auf frosch • • •No, ridiculously easy with docker.
Then it follows the same principles as cloud flare.
Create a site (vpn endpoint), get a docker snippet for a newt (what they call the vpn connector), paste it in the docker compose on your Homeserver and see it come up in the Webinterface.
Then you create a public resource and point it to said site and give it a url.
Done.
Ask me if you have questions
frosch
Als Antwort auf prenatal_confusion • • •Cool, do you get any auth and/or ingress protection?
With cloudflare, you get some auth options, can block AI crawlers (that get recognized...) etc for free
prenatal_confusion
Als Antwort auf frosch • • •187OnAnUndercoverCop
Als Antwort auf frosch • • •Temp stuff where I could care less about the free tier domain name or things that I just want to funnel to my existing devices: Tailscale
Widespread, prolonged services that will be more actively maintained for a longer amount of time and can just spin off of its own domain/subdomain: Cloudflare
Both are great.
Lucy :3
Als Antwort auf frosch • • •FlexibleToast
Als Antwort auf frosch • • •giacomo
Als Antwort auf FlexibleToast • • •German The Jackal
Als Antwort auf giacomo • • •gajahmada
Als Antwort auf German The Jackal • • •Yes it's 10TB.
I nearly hit the cap once when I first testing sunshine/moonlight to see how much bandwidth my set up could do and kinda FOMO for the steam deck hype.
It's like 150 mb/s and works so well (for the kind of games I play) that I forgot the egress cap and just play for like a weeks even in the house, I realized and stop at ~ 9TB. My usual usage don't even hit a TB most of the time lol.
German The Jackal
Als Antwort auf gajahmada • • •gajahmada
Als Antwort auf German The Jackal • • •It is.
I just go to the cloud.oracle.com/account-manag… page and looks at the current usage every now and then.
cost-analysis
cloud.oracle.comGerman The Jackal
Als Antwort auf gajahmada • • •FlexibleToast
Als Antwort auf giacomo • • •Decronym
Als Antwort auf frosch • • •Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:
[Thread #265 for this comm, first seen 30th Apr 2026, 19:30]
[FAQ] [Full list] [Contact] [Source code]
Decronym: A simple Reddit bot
Gistjlow
Als Antwort auf frosch • • •hendrik
Als Antwort auf frosch • • •French75
Als Antwort auf frosch • • •Evil_Incarnate
Als Antwort auf frosch • • •Illecors
Als Antwort auf frosch • • •frosch
Als Antwort auf Illecors • • •Illecors
Als Antwort auf frosch • • •uuj8za
Als Antwort auf frosch • • •Reverse Proxy - NetBird Docs
docs.netbird.ioirmadlad
Als Antwort auf frosch • • •frosch
Als Antwort auf irmadlad • • •I'm a bit stumped, what do you gain from this setup?
Or do you mean just running some services through the tunnel for easy access and "hide" others behind tailscale?
irmadlad
Als Antwort auf frosch • • •hexagonwin
Als Antwort auf frosch • • •FauxLiving
Als Antwort auf hexagonwin • • •You can use e-mail now.
hexagonwin
Als Antwort auf FauxLiving • • •FauxLiving
Als Antwort auf hexagonwin • • •I haven't looked into it yet, I'm in the same position of using Google to login.
I just noticed that the login page changed.
ScytheDraven47
Als Antwort auf FauxLiving • • •FauxLiving
Als Antwort auf ScytheDraven47 • • •Ah, that makes sense
potustheplant
Als Antwort auf FauxLiving • • •BCsven
Als Antwort auf hexagonwin • • •peskypry
Als Antwort auf hexagonwin • • •potustheplant
Als Antwort auf peskypry • • •zeitverschreib ⁂
Als Antwort auf hexagonwin • •@hexagonwin
I think Headscale gives you the option of using your own provider.
@frosch
Selfhosted hat dies geteilt.
cunnililgus
Als Antwort auf hexagonwin • • •frongt
Als Antwort auf frosch • • •skyline2
Als Antwort auf frongt • • •peskypry
Als Antwort auf frongt • • •frosch
Als Antwort auf frongt • • •Atherel
Als Antwort auf frosch • • •julianwgs
Als Antwort auf frosch • • •mlg
Als Antwort auf frosch • • •Wireguard.
Dunno if Cloudflare does effective auth for the tunnel or if you have to set that up yourself, but I don't bother trying to expose services to the internet in any way because some of this stuff was just never designed for proper web security (cough Jellyfin).
It's still worth setting up a wildcard cert with ACME so you get nice https and a real domain.
frosch
Als Antwort auf mlg • • •Cloudflare has some opt-in auth. Mail-OTP is a nice balance imo: You can allowlist mail addresses per service/subdomain and set expiry for each.
Then for access, you first have to enter the mail address, get the OTP and then access the service.
So, nobody without access to allowed mail addresses even gets to knock on you door.
But yeah, that's why I think about going tail scale: why bother having something exposed when not needed?
I just think, some services might be nice to provide to friends, too - and having them connect to my tailnet for this is a bit too much friction, I guess
utjebe
Als Antwort auf frosch • • •Just Wireguard on a router, but I'm thinking Netbird.
WG can be a bit PITA to set up, but once you do, it just works. What I would to have is more fine grained control over who goes where if I were to expose some of the services to friends.
IratePirate
Als Antwort auf utjebe • • •GitHub - wg-easy/wg-easy: The easiest way to run WireGuard VPN + Web-based Admin UI.
GitHubGreen Wizard
Als Antwort auf frosch • • •HiTekRedNek
Als Antwort auf frosch • • •Both.
I have a free vps providing me a public IPv4 address, connected to my opnsense router via tailscale, and use a simple port forward from the VPs to the router's tailscale IP.
I have certain port/connections coming in either via the tailscale IP or my external IPv6 address all forwarded to my internal Caddy reverse proxy which itself is only running IPv4.
And I use cloudflare for my dynamic DNS resolution of my domain. A records are my public VPS IPv4 and AAAA are my own public IPv6 addresses respectively.
If/when I change to a service provider that doesn't use CGnat for IPv4, I can stop doing the forwarding from my VPS.
That's so we can stream music/video without needing to use the VPN.
But, I also run tailscale on my phone, so I can do admin stuff remotely from it, albeit painfully, on this small screen when things break. 🤣
p4rzivalrp2
Als Antwort auf frosch • • •frosch
Als Antwort auf p4rzivalrp2 • • •p4rzivalrp2
Als Antwort auf frosch • • •Reannlegge
Als Antwort auf frosch • • •I actually have Wireguard running on a pi zero 2, all it really does is provide me my pihole DNS.
Edit:
I should say I have pihole running on a couple of pi 5’s currently, overkill yes but one of my pi 4’s was sacrificed to the whims of magic smoke another was donated to a friend and another now hosts HAOS, I have a few pi zero 2’s (only one was sacrificial) the one that hosts wireguard has one of my last few working SD cards. The pi 5’s host many other things other than just pihole.
frosch
Als Antwort auf Reannlegge • • •Taking do one thing, but do it good to the next level, nice!
I thought about getting a pi zero also just for the pi-hole. But my pi3b holds up pretty good, still
Reannlegge
Als Antwort auf frosch • • •In the not to distant future I will be retiring wireguard from that pi zero 2 and turning it into a pots server. I have grand ambitions to make a better home lab with a few more pi’s and to help me get away from big tech more.
The only thing google I have is an email I do not use but so I can watch YouTube, but I use unwatched to block ads.
The only thing apple is my iPhone and my iPad, when it becomes time to replace those I will have to figure out graphenOS and some Linux distro for a tablet of some sort.