this post was submitted on 07 Sep 2023
351 points (99.2% liked)

Selfhosted

40405 readers
853 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

cross-posted from: https://lemmy.blahaj.zone/post/2728889

From the article:

Since Tailscale was founded in 2019, customers have been forced to choose between either Tailscale or Mullvad without the ability for them to co-exist.
Today we announce a partnership with Tailscale that allows you to use both in conjunction through the Tailscale app. This functionality is not available through the Mullvad VPN app. This partnership allows customers of Tailscale to make use of our WireGuard VPN servers as “exit nodes”. This means that whilst connected to Tailscale, you can access your devices across Tailscale’s mesh network, whilst still connecting outbound through Mullvad VPN WireGuard servers in any location.

Announcement also on Tailscale blog.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 6 points 1 year ago* (last edited 1 year ago) (2 children)

If anyone wants to achieve something similar without using Tailscale or with alternative VPN providers, the setup outlined in this LSIO guide is pretty neat: https://www.linuxserver.io/blog/advanced-wireguard-container-routing

Edit: Don't be intimidated by the word "advanced". I struggled with this a bit at first (was also adapting it to use at home instead of on a VPS that's tunneling to home) but I got it working eventually and learned a lot in the process. Willing to assist folks who want to set it up.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

As an aside, I wish technical documents like this would stop saying "Wireguard client" and "Wireguard server". Wireguard doesn't have clients and servers - everyone is a peer, and whether you can route through the peer or not is just based on the routing table and nftables/iptables rules.

[–] zzzz 1 points 1 year ago

You can also achieve this with any VPN by using two Docker containers:

  1. Gluetun: https://github.com/qdm12/gluetun
  2. Tailscale: https://tailscale.com/kb/1282/docker/

Set Gluetun up to connect to your VPN (they support a huge number of providers) and then set the Tailscale container to use the Gluetun's network. Then, use that Tailscale container as your exit node.

You can also combine this with a self-hosted Headscale (https://github.com/juanfont/headscale) instance.