Also what additional security measures have you implemented?

View Poll

  • s3r3ng@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 months ago

    If you guard the machine well via firewall you can simply Let’s Encrypt for SSL via AAAA records to the public IPV6 address of one of your home machines with nginx reverse proxy.

  • Spuxilet@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 months ago

    I have two wireguard servers and a reverse proxy (Traefik).

    I have setup my services so that they are only accessible from one wireguard VPN. No matter i am on LAN or WAN.

    Second wireguard server is to connect to different vpn networks that i usually need to push some code or access the dev or prod servers for my projects. I have build wg-easy manually to install many vpn clients within it’s image and configure routes so that they work without problems simultaniously. It all works GREAT. Openvpn, Openconnect, pptp and barracuda VPN.

    I had this setup on my router but i was given this barracuda vpn client which can’t work on devices except X86. Sadly my router is not x86 and i just moved everything and installed all these vpn clients with that barracyda vpn client inside docker container with wg-easy.

  • Anejey@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 months ago

    Tailscale, and a Cloudflare Tunnel going to Nginx Proxy Manager. So all three, in a way.

  • tounaze@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 months ago

    We can’t choose multiple answers and I think a lot of us are using a combination of at least two of the answers

  • lucassou@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 months ago

    Traefik only accessible through tailscale, cloudflare tunnel for one website and I just noticed a few days ago that apparently plex used upnp to make itself accessible to the internet…