tailscale + wireguard guide โ€” on 4grab.com private networking without exposing ports. connect all your machines, access home lab remotely, no static IP needed. https://4grab.com/pay.php?id=ptag_69c44732a48d7 #prompt #tailscale #networking #selfhosted
@happyborg you could also just use plain old #wireguard to your router, or #tailscale if you want the fancy features and integrations
tailscale + wireguard guide โ€” on 4grab.com private networking without exposing ports. connect all your machines, access home lab remotely, no static IP needed. https://4grab.com/pay.php?id=ptag_69c44732a48d7 #prompt #tailscale #networking #selfhosted
Tailscale and WireGuard: Private Networking Without Exposing Ports โ€” Purchase

Spent like 2 hours trying to figure out why my MOTD (via update-motd.d) wasn't showing up when using SSH. Turns out there's a bug in Debian 13 where the 'remote' pam service configuration is missing. My SSH connection was over tailscale, and tailscale execs `login -h` which uses the 'remote' service instead of 'login'. The default pam configuration is empty so `pam_motd.so` is never invoked.

References for the curious:
- https://github.com/tailscale/tailscale/issues/16983
- https://bugs-devel.debian.org/cgi-bin/bugreport.cgi?bug=1103923

That's enough computer for today, I think.

#Linux #Debian #Tailscale

Locale/environment issue on Debian 13 w/ Tailscale SSH ยท Issue #16983 ยท tailscale/tailscale

What is the issue? I've upgraded a couple of my servers to Debian 13 (trixie) and I've noticed that Tailscale SSH seems to be a little broken, things like btop refuse to run, saying that they requi...

GitHub

Tailscale v1.98.1 released

https://mander.xyz/post/51977257

Tailscale v1.98.1 released - Mander

Lemmy

tailscale + wireguard guide โ€” on 4grab.com private networking without exposing ports. connect all your machines, access home lab remotely, no static IP needed. https://4grab.com/pay.php?id=ptag_69c44732a48d7 #prompt #tailscale #networking #selfhosted
Tailscale and WireGuard: Private Networking Without Exposing Ports โ€” Purchase

Tailscale es divino

#Tailscale

Ripped out Tailscale and built a simpler WireGuard setup instead.

Tried Headscale but it felt a bit too convoluted for what I actually needed, so I kept it basic: two VPSes and plain config files. One VPS acts as the VPN hub, the other as a reverse proxy back into my home lab, letting me expose services without any inbound port forwarding.

https://the.unknown-universe.co.uk/home-lab/wireguard-vpn-two-vps

#SelfHosting #HomeLab #Privacy #Linux #Networking #Tailscale #WireGuard
Replacing Tailscale with WireGuard

I replaced Tailscale with a self-hosted WireGuard setup using two VPSes to securely expose home lab services without port forwarding or SaaS.

The Unknown Universe

Spent several hours yesterday setting up Beszel. It looks incredibly slick and Iโ€™m very impressed with how easy they make the setup across several nodes. But the majority of the time setting up was spent on figuring out why the agent on my #synology was connecting over SSH instead of a WebSocket.

Apparently DSM7 disallows outgoing connections for external packages which breaks #Tailscale in subtle ways. Granted, Tailscale does have this documented and provides a solution but this was not easy to troubleshoot. #homelab #selfhosting

Self-hosted Tailscale, Part 2: Ad-blocking DNS

์ด ๊ธ€์€ Tailscale ๋„คํŠธ์›Œํฌ ๋‚ด์—์„œ ์ž์ฒด ํ˜ธ์ŠคํŒ… DNS ์„œ๋ฒ„์ธ Blocky๋ฅผ ์‚ฌ์šฉํ•ด ๊ด‘๊ณ  ๋ฐ ํŠธ๋ž˜์ปค ์ฐจ๋‹จ, ๋‚ด๋ถ€ ์ด๋ฆ„ ํ•ด์„์„ ๊ตฌํ˜„ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ๋‹ค๋ฃน๋‹ˆ๋‹ค. ๊ธฐ์กด Cloudflare DNS ๋Œ€์‹  Blocky๋ฅผ ๋„์ปค ์ปดํฌ์ฆˆ ํ™˜๊ฒฝ์— ๋ฐฐํฌํ•˜๊ณ , DNS-over-TLS๋ฅผ ํ†ตํ•ด ์—…์ŠคํŠธ๋ฆผ DNS์™€ ์•”ํ˜ธํ™”๋œ ํ†ต์‹ ์„ ์œ ์ง€ํ•˜๋ฉฐ, Headscale์ด ํด๋ผ์ด์–ธํŠธ์— DNS ์„ค์ •์„ ์ž๋™์œผ๋กœ ํ‘ธ์‹œํ•˜๋„๋ก ๊ตฌ์„ฑํ•ฉ๋‹ˆ๋‹ค. Android์˜ Private DNS ๊ธฐ๋Šฅ๊ณผ์˜ ์ถฉ๋Œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ , ๋„คํŠธ์›Œํฌ ์ „๋ฐ˜์— ๊ฑธ์ณ ์ผ๊ด€๋œ DNS ํ•„ํ„ฐ๋ง๊ณผ ๋‚ด๋ถ€ ๋„๋ฉ”์ธ ํ•ด์„์„ ์ œ๊ณตํ•˜๋Š” ์‹ค์šฉ์ ์ธ ์‚ฌ๋ก€์ž…๋‹ˆ๋‹ค.

https://blog.fidelramos.net/software/tailscale-2-ad-blocking-dns

#tailscale #dns #blocky #headscale #docker

Self-hosted Tailscale, Part 2: Ad-blocking DNS

In Part 1 I set up Headscale and had every tailnet client use Cloudflare DNS. That works, but it's leaving value on the table: every device that connects to my Tailscale gets whatever DNS servers I set, so I might as well run my own DNS server inside the private โ€ฆ

blog.fidelramos.net