Wildcard dns with port 80 & 443 port forwarded to traefik with tinyauth & fail2ban
Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
-
No low-effort posts. This is subjective and will largely be determined by the community member reports.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
Wireguard.
Dunno if Cloudflare does effective auth for the tunnel or if you have to set that up yourself, but I don't bother trying to expose services to the internet in any way because some of this stuff was just never designed for proper web security (cough Jellyfin).
It's still worth setting up a wildcard cert with ACME so you get nice https and a real domain.
Cloudflare has some opt-in auth. Mail-OTP is a nice balance imo: You can allowlist mail addresses per service/subdomain and set expiry for each. Then for access, you first have to enter the mail address, get the OTP and then access the service.
So, nobody without access to allowed mail addresses even gets to knock on you door.
But yeah, that's why I think about going tail scale: why bother having something exposed when not needed?
I just think, some services might be nice to provide to friends, too - and having them connect to my tailnet for this is a bit too much friction, I guess
I'm liking self hosted NetBird atm
I am very happy with Tailscale
Just Wireguard on a router, but I'm thinking Netbird.
WG can be a bit PITA to set up, but once you do, it just works. What I would to have is more fine grained control over who goes where if I were to expose some of the services to friends.
wg-easy can greatly simplify your wireguard setup. Allows you to quickly generate access configs for friends and family on the fly (QR-codes, too). You still get access to post-up/-down hooks if you want tp create a more specialised deployment.
Wireguard
tailscale. works perfectly, the only problem is needing a google acc for login
And that years back they moved their servers from Canada to the US. That's when I dropped TS and just did wireguard by hand.
the only problem is needing a google acc for login
You can use e-mail now.

No, you cannot. Putting in your emails just redirects to the identity provider you used when signing up. If you try to create an account you'll see that email's not a option.
is it possible to switch to email from my google acc tied account? or do i need to create a new one?
I haven't looked into it yet, I'm in the same position of using Google to login.
I just noticed that the login page changed.
I believe registration is limited to a third party/OIDC. The login page is different to sign-up
third party/OIDC.
Ah, that makes sense
Netbird via a free cloud VM. Works great.
Nice, I'll look into that!
This is the way
I have wireguard, it's supported by my router (Fritzbox).
Nice, I have to take a look if mine supports it, too!
same here, took me 7m to set this up on OPNsense with FritzBox
I do run wireguard on my router, but the main reason is ad blocking, not hiding services. Most services are publicly exposed.
Nice, I thought about using wireguard as a private VPN, too. Having my pihole block my mobile data on the go would be neat
It really is!
Pangolin on a vps.
When I looked into it first, Pangolin seemed a bit overwhelming.
Is it hard to set up?
No, ridiculously easy with docker.
Then it follows the same principles as cloud flare. Create a site (vpn endpoint), get a docker snippet for a newt (what they call the vpn connector), paste it in the docker compose on your Homeserver and see it come up in the Webinterface.
Then you create a public resource and point it to said site and give it a url.
Done.
Ask me if you have questions
Cool, do you get any auth and/or ingress protection?
With cloudflare, you get some auth options, can block AI crawlers (that get recognized...) etc for free
Yes there is auth on by default for resources. You can use real accounts that need to be created or passwords or pins. And I think some id providers.
isn't it awesome? i am scared to update it too far for an unknown reason
It's opensoursrso we should be able to roll back.
Pangolin on a free Oracle VPS.
is there a bandwidth/throughput limit on Oracle VPS?
Not that I've noticed.
Something like 10TB. I’m an incredibly heavy user and I’d have to quadruple all of my usage, including home, to hit it.
Yes it's 10TB.
I nearly hit the cap once when I first testing sunshine/moonlight to see how much bandwidth my set up could do and kinda FOMO for the steam deck hype.
It's like 150 mb/s and works so well (for the kind of games I play) that I forgot the egress cap and just play for like a weeks even in the house, I realized and stop at ~ 9TB. My usual usage don't even hit a TB most of the time lol.
How about both? I run the evil Cloudflare Tunnels/Zero Trust with Tailscale as an overlay on the server.
I'm a bit stumped, what do you gain from this setup?
Or do you mean just running some services through the tunnel for easy access and "hide" others behind tailscale?
what do you gain from this setup?
- Defense in Depth
- Network segmentation
- Fallback
Both.
I have a free vps providing me a public IPv4 address, connected to my opnsense router via tailscale, and use a simple port forward from the VPs to the router's tailscale IP.
I have certain port/connections coming in either via the tailscale IP or my external IPv6 address all forwarded to my internal Caddy reverse proxy which itself is only running IPv4.
And I use cloudflare for my dynamic DNS resolution of my domain. A records are my public VPS IPv4 and AAAA are my own public IPv6 addresses respectively.
If/when I change to a service provider that doesn't use CGnat for IPv4, I can stop doing the forwarding from my VPS.
That's so we can stream music/video without needing to use the VPN.
But, I also run tailscale on my phone, so I can do admin stuff remotely from it, albeit painfully, on this small screen when things break. 🤣
Headscale on fly.io
Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:
| Fewer Letters | More Letters |
|---|---|
| DNS | Domain Name Service/System |
| IP | Internet Protocol |
| VPN | Virtual Private Network |
| VPS | Virtual Private Server (opposed to shared hosting) |
4 acronyms in this thread; the most compressed thread commented on today has 8 acronyms.
[Thread #265 for this comm, first seen 30th Apr 2026, 19:30] [FAQ] [Full list] [Contact] [Source code]
Asked my ISP for a public IP, exposed all things that can handle that to the public. Custom Wireguard server for VPN
Temp stuff where I could care less about the free tier domain name or things that I just want to funnel to my existing devices: Tailscale
Widespread, prolonged services that will be more actively maintained for a longer amount of time and can just spin off of its own domain/subdomain: Cloudflare
Both are great.
Zerotier. I found it easy to set up and use. Free tier gives you one network and ten hosts, I think.
I used wireguard, then switched to Pangolin. Wireguard was simpler and worked better with mobile apps though. I'll prob switch back for most apps.
I have a port forwarding without any tunnel to third parties and Wireguard.