TLDR: VPN-newbie wants to learn how to set up and use VPN.
What I have:
Currently, many of my selfhosted services are publicly available via my domain name. I am aware that it is safer to keep things closed, and use VPN to access – but I don’t know how that works.
- domain name mapped via Cloudflare > static WAN IP > ISP modem > Ubiquity USG3 gateway > Linux server and Raspberry Pi.
- 80,443 fowarded to Nginx Proxy Manager; everything else closed.
- Linux server running Docker and several containers: NPM, Portainer, Paperless, Gitea, Mattermost, Immich, etc.
- Raspberry Pi running Pi-hole as DNS server for LAN clients.
- Synology NAS as network storage.
What I want:
- access services from WAN via Android phone.
- access services from WAN via laptop.
- maybe still keep some things public?
- noob-friendly solution: needs to be easy to “grok” and easy to maintain when services change.
Tailscale can meet each of your bullet points.
Don’t bother with VPN just use Tailscale, and install the client on your other devices (they have clients for every OS).
This creates an encrypted virtual network between your devices. It can even enable access to hardware, like printers (or anything with an IP address) by enabling Subnet Routing.
To provide access to specific resources for other people, you can use the Funnel feature, which provides an entrance into your Tailscale Network for the specified resources, fully encrypted, from anywhere. No Tailscale client required.
And if you have friends who use Tailscale, using the Serve option, you can invite them to connect to your Tailscale network (again, for specified resources) from their Tailscale network.
I second this. Wireguard, openvpn, various docker containers offering these, I’ve been through with them.
The regular openvpn or wireguard tools are good if you only need a dumb von, but if you want some kind of special routing or overlay network, tailscale has just been so easy.
I selfhost it completely too, using a headscale control server.
I chose wireguard implemented by pivpn (i like pi’s)
Wireguard app on phone and a quick duckduck will find you a script or app for your laptop. Connected to your home in seconds.
PiVPN is elegant. Easy install, and I am impressed with the ascii QR code it generates.
But I could not make it work. I am guessing that my Android setup is faulty, orrrr maybe something with the Pi? This is incredibly difficult to troubleshoot.
What didn’t work?
As a side note i had to portforward in my router to make this work.
Obviously :) and make sure to forward to the correct LAN IP address, and make sure that machine has a static IP (or DHCP reservation).
Here is a script to easily install WireGuard and generate client config files for any server: https://github.com/Nyr/wireguard-install
deleted by creator
I used Zerotier before and I still use it now. It is also the solution I am now going to continue with.
I wanted to try Wireguard to get away from a centrally managed solution, but if I can’t get it working after several hours, and Zerotier took five minutes - the winner is clear.
I use WireGuard to access my home services and for net-forwarding when I’m outside.
To set it up, I followed this simple guide.I’ve heard very good things about wireguard-easy to simplify the config and management, too
Wireguard was really easy to setup on my ubuntu server. It took less than 15 minutes to get it up and running.
deleted by creator
Personally I would have gone for OpenVPN access server on Debian. Fairly simple and well documented for those starting out.
I have used and worked with OpenVPN connect on android, PC and Mac.
PiVPN offers both services, Wireguard and OpenVPN.
What app do you use on Android? And on Windows?
OpenVPN connect on both. I load the .ovpn-file that is exported from the server and that’s it.
Not expert, but basically you should port forward wireguard port 51820 to your server, install wireguard server, create client(s) and load QR code (or config) on android/laptop and you are set. Pi hole DNS and everything else should work just like when you are on home wifi.
You can leave your CF for public access, but do you really need PF 80 and 443 if you are using CF tunnels? (I thought you dont, but I never used CF. Feels like its more safe to hve CF tunnels if you dont need to PF, but you have a middle man you have to trust)
Thank you for providing specific steps that I can take! I will look into this.
No I do not use cloudflare tunnels, just regular cloudflare to publish my services to the whole world - which is a concern of course.
Going with a connection from my device via wireguard sounds like just the right thing to do.
I wanted to do something similar for a long time but somehow all my atempts failed. I tried the build in into a Fritzbox but my laptop never could connect. Later I tried the wireguard addon in homeassistant but same there.
But does port forwarding work for you, can you access your servers from outside your network?
If not, it’s probably carrier-grade NAT. There are several ways to fix this:
- Call your ISP and ask them to give you your own dynamic IPv4 address.
- Use a service like tailscale (also available in Home Assistant)
Yes port forwarding with everything else works well, I have no problem with port forwarding, running a lot of services from home.
Then I don’t know, I’ve set up several Wireguard VPNs on several Fritzboxes and everything works fine.
Dynamic IP is one that changes. I think you meant static IP.
No, I specifically meant dynamic, because most ISPs only give static IPv4 for business plans, and a dynamic IP is fine if you use a dynamic DNS service (the Fritzbox has one).
If you don’t have a static IP then you will automatically have a dynamic one. You don’t need to ask for a dynamic IP as that is the default. And I’m no idiot, I’ve used dynamic DNS services for for over 20 years.
There is also Carrier Grade NAT, which basically means that you share an IP with other customers, so if you try to access your network from the outside, you will only end up at your ISP’s router, where the network is divided up for a group of customers.
Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:
Fewer Letters More Letters CF CloudFlare DNS Domain Name Service/System IP Internet Protocol NAT Network Address Translation VPN Virtual Private Network
5 acronyms in this thread; the most compressed thread commented on today has 8 acronyms.
[Thread #437 for this sub, first seen 18th Jan 2024, 10:55] [FAQ] [Full list] [Contact] [Source code]
Check out Twingate. It’s super easy and with granular controls.
Recently commented on a different post about setting up a VPN. Check out firezone
I don’t recommend using Tailscale or anything that relies on a third party.
You can self-host Headscale to cut the third party out of the Tailscale equation.
If you’re going to do that you may as well cut out the extra server/service and run regular wireguard.
Not quite, it’s still much more useful because you can connect multiple devices, have users, and relay when some devices can’t see each other, among other features.
You can do all of those things with wireguard as well… I’m not seeing any benefit to running Tailscale/headscale.