Komisches #Netbird / #Pfsense Problem:

Aus dem Netz zuhause zum Proxmox Cluster hinter der Pfsense mit Netbird per SSH auf 3 Container mit den IPs am Ende .121, .122 und .123.

Die .121 und .123 sind per SSH erreichbar. Die .122 wird hingegen auf der Pfsense im Datacenter auf dem wt0 Interface von der Default Policy geblockt.

Bei Netbird ist alles der Einfachheit halber auf /24 freigegeben.

Keine Ahnung, wie Netbird/Pfsense auf den Trichter kommt, den Zielhost blocken zu wollen...?

@Natanox It's a bit of work, but I'd suggest something like #NetBird or #tailscale to keep your private things private.

The only real downside I see so far is that on mobile devices (iOS in my case) it increases battery consumption to a noticeable degree.

@marcoarment @siracusa @caseyliss I'd chime in with the others who recommended #Ansible for Marco's fascinating project (which has inspired one I've started on now!). I love it since it can help do automated updates and deployment on both Mac and Linux systems _with the same deployment script_, including triggering apt or rpm on Linux and brew on MacOS (and even WinGet on Windows!). I use it over #Netbird, which runs well in a Docker container and drops #Tailscale's cost and centralized control. And one more possibly useful tidbit: not terribly relevant to Marco's project, but to his early prototype-form, I've been really happy with #ColoCrossing and they offer single RU colocation, not just whole cabinets.

I've been putting off some necessary maintenance and overall system streamlining on my home server for a while. Everything works, and services are secure and up to date, but I've got a bit of a messy setup that mixes #podman with #docker containers, #tailscale with #tsdproxy. I set this all up before I had my own domain, hence tsdproxy.

Now I have my own domain, I want to refactor my server using #netbird with #caddy and #pocketid.

It's a little daunting, but I'm going to take the plunge

Loving that I can use Netbird for reverse proxy to my self hosted apps #netbird #homelab

They say the best way to learn is by doing. I've always agreed! For example, I've spent the day attempting to set up a self-hosted instance of NetBird. In the process, I've learned the limits of my patience and that I'm a stubborn, cheap SOB.

#selfhosting #netbird

@tioan @jabster28
Haven't really tested #netbird yet but this sounds like at least IPv6 traffic should work: https://github.com/netbirdio/netbird/issues/577

Even if IPv6 subnets aren't supported yet:
https://github.com/netbirdio/netbird/issues/46

Tho somebody in that thread did say "unable to route IPv6 route through IPv4 addressable Peer" wich sounds bad if true.

Please correct me if thats wrong; if you know what actually works.
Am also curious cause thus far #netbird did seem like the best open source option available.

Support sending wireguard traffic over IPv6 · Issue #577 · netbirdio/netbird

Currently only IPv4 addresses are used in the peer discovery process and as wireguard endpoints. IPv6 support would enable clients that can't establish connection via NAT traversal but have IPv6 ad...

GitHub
@jabster28 also actuall chrckout #netbird too that is 100% open source and has all cool features also #wireguard base; but also central control.
Just read more about #NetBird and excited there is a totally #opensource alternative to #Tailscale. I think I need to wait for Tailscale to do something stupid before switching though. Need that outrage energy to rebuild everything with a new system.
https://netbird.io/knowledge-hub/tailscale-vs-netbird
#selfhosting #homelab
Tailscale vs. NetBird

Looking for an alternative to Tailscale? This article provides an overview of the key differences and features that Tailscale and NetBird have to offer.

Nuevo artículo sobre diferentes alternativas a los servicios vpn. Se agradece retoot & difusión -> https://alt43.es/mas-alla-de-la-vpn-tuneles-y-redes-mesh-para-conectividad-privada/
#cloudflare #Tailscale #zerotier #Yggdrasil #netbird
Más allá de la VPN: túneles y redes mesh para conectividad privada - alt43

La conectividad privada ya no es sinónimo de VPN. Cloudflare Tunnel, Tailscale, NetBird, ZeroTier y Yggdrasil ofrecen modelos alternativos (túneles salientes, redes mesh, Ethernet virtual y topologías descentralizadas) con menor superficie de ataque, mejor usabilidad y, en varios casos, mayor control real sobre la infraestructura. Analizamos cómo funciona cada uno, en qué se diferencian y cuándo tiene sentido seguir usando una VPN clásica.

alt43