this post was submitted on 12 Jul 2023
88 points (94.9% liked)

Selfhosted

40441 readers
785 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I see a lot of people here uses some form of remote access tool (VPN/Tailscale) to access their home network when not at home. I can’t really do this because my phone (iOS) can only activate one VPN profile at a time, and I often need this for other stuff.

So I chose to expose most web based services on the public internet, behind Authelia. But I don’t know how safe this is.

What I’m really unsure are things like Vaultwarden: while the web interface is protected by Authelia (even use 2FA), its API address needs to be bypassed for direct access, otherwise the mobile APP won’t work. It feels like this is negative everything I’ve done so far.

you are viewing a single comment's thread
view the rest of the comments
[–] ilmagico 10 points 1 year ago* (last edited 1 year ago) (4 children)

I have my nextcloud server exposed, I keep it up to date, patched, etc. but I'd love to use the extra protection of a VPN. Just ... I don't think mobile apps work very well with that, unless I keep my phone constantly connected to the VPN, right? Or is there a smart way to do that?

[–] SomethingBurger 10 points 1 year ago* (last edited 1 year ago) (1 children)

I believe you can configure your phone to only route traffic to your server though the VPN.

[–] ilmagico 3 points 1 year ago (1 children)

Nice! ... how exactly, I wanna know :)

[–] [email protected] 3 points 1 year ago

I'm my case, I'm using the OpenVPN server on my router. When I set it up, there was an option for the client to only use the VPN for local traffic. That way it's part of the config file on my phone. Works flawlessly

[–] twent4 6 points 1 year ago

this thread mentions an OVPN client that can do split tunneling so all you'd do is whitelist your server in the android phone and turn it on.

ProtonVPN has tunneling too, for instance, but no self hosting option.

[–] OmltCat 4 points 1 year ago (1 children)

Yea that’s basically the reason why I can’t use a VPN.

In fact there isn’t really a problem to leave your phone connected to the selfhosted VPN all the time. If split tunneling works properly, only traffic that access your home network would actually go through the VPN, all others will just get bypassed.

But in my case, I already need to be connected to another VPN most of my day, so can’t really go this route.

[–] [email protected] 1 points 1 year ago

Is the existing one wireguard? Because on android you can use the same interface and add another peer. You'd also have to use the same ip range and key on your VPN.

[–] [email protected] 1 points 1 year ago

Not sure of your setup but I use OpenVPN on my Android and have set it to whitelist apps so only the apps that need to use the VPN do so. You can also go the opposite and blacklist so all apps except those you specify use the VPN.