this post was submitted on 13 Jun 2023
13 points (100.0% liked)

Selfhosted

40453 readers
364 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
13
Selfhosting behind VPN? (self.selfhosted)
submitted 1 year ago* (last edited 1 year ago) by stonesimulator to c/selfhosted
 

I have played around with yunohost and other similar tools. I know how to open ports on router, configure port forwarding. I am also interested on hosting my own stuff for experiments, but I also have a VPN enabled for privacy reasons on my router at all times. If you haven't guessed already, I am very reserved on revealing my home IP for selfhosting, as contradictory as it sounds.

I am aware that it's better to rent a VPS, not to mention the dynamic IP issues, but here it goes: assuming my VPN provider permits port forwarding, is it possible to selfhost anything from behind a VPN, including the virtual machine running all the necessary softwares?

edit: title

edit2: I just realized my VPN provider is discontinuing port forwarding next month. Why?!

top 14 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 1 year ago

At the end of the day, packets need to get from whatever your DNS points, to the server that's running. Depending on your tolerance for jank, and as long as a route actually exists for this, you can run the server anywhere you want. Renting a VPS does offer a lot more freedom in how your are routing, and where.

[–] Mountaineer 4 points 1 year ago* (last edited 1 year ago) (1 children)

Absolutely possible.
The key to simple self hosting is to have a dns record that points to your externally accessible IP, whether that be your real one or an external one hosted at a VPN provider.
If that IP changes, you'll need to update it dynamically.

It's becoming increasibly common to be a requirement to do so as CGNat becomes more widespread.

One of the newer ways to do that is with a Cloudflare Tunnel, which whilst technically is only for web traffic, they ignore low throughput usage for other things like SSH.

[–] stonesimulator 1 points 1 year ago (1 children)

My knowledge is a little dated and I remember messing around dyndns or noip to update my IP many years ago. I guess a simple script running on the router or the host should suffice?

[–] Mountaineer 2 points 1 year ago

I personally use a bash script triggered by cron on my server to first determine my external IP address: curl http://v4.ident.me/ then if it differed from the last check, would update one of my dns entries via the godaddy API.

This can be a simple or as complicated as you like.

[–] [email protected] 4 points 1 year ago

If you haven't checked out Tailscale, you should!

[–] [email protected] 3 points 1 year ago

https://ovpn.se has static IPs and port forwarding.

[–] [email protected] 3 points 1 year ago

At home I'm running proxmox on a Ryzen 9 3900X, 96GB of RAM with 4TB of NVME storage. I have VMs for a bunch of stuff, most importantly Unraid which is passed a SATA controller with 8 drives. Storage from unraid then mounted as NFS/SMB shares to various VMs.

[–] [email protected] 2 points 1 year ago

Re your vpn question - I have a number of services on my home server, some of which are exposed via reverse proxy (eg. Nextcloud) and others which are only accessible internally or via my wireguard vpn. Setting up a dedicated vpn server on raspberry pi is very simple to do.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

What hardware do you run on? Or do you use a data center/cloud?

I have 2 home servers - an Intel NUC running Ubuntu and a Raspberry Pi running Raspberry Pi OS. The NUC is my main server and the rpi is a dedicated wireguard/pivpn.

Do you use containers or plain packages?

On the main server I use docker containers almost exclusively. I find them easier to stand up and tear down, particularly using scripts, without worrying about the broader OS.

I have the following services on the NUC -

  • Nginx Proxy Manager (for https proxy)
  • Nextcloud
  • Airsonic
  • Calibre-web
  • Invidious
  • h5ai
  • transmission

I did play around with my own Lemmy instance but that was not successful and I found beehaw :-)

Orchestration tools like K8s or Docker Swarm?

No

How do you handle logs?

Badly. I lost a server due to root filling up a couple years back. Now I monitor disk space (see below) and prune logs as required.

How about updates?

OS updates I push daily. I don't regularly update my docker containers. I did use Watchtower for a while but found it broke stuff a little too often.

Do you have any monitoring tools you love?

Just some custom batch scripts (disk space, backups etc) which send me regular emails. I also have conky running on a small screen 24x7

[–] PriorProject 2 points 1 year ago (1 children)

PureVPN supports port-forwarding over the VPN and is frequently used for making port-forwarding work through janky ISPs that don't support it properly. Some details at: https://www.purevpn.com/blog/how-to-port-forward-your-web-development-server-remotely/

There are many other ways to do similar things, but this is one possible approach.

[–] stonesimulator 2 points 1 year ago

Nice to know there's an actual justifiable use case for what I am describing!

[–] [email protected] 2 points 1 year ago

I just use wireguard with VyOS. Simple and efficient

[–] [email protected] 2 points 1 year ago

I currently host a few services (including the lemmy instance I am replying from) behind a commodity $5 VPS, while the services are actually hosted locally. I setup WireGuard to have a simple hard-coded peer-to-peer VPN connection from my local client to the remote VPS, and then setup some iptable rules on the VPS to redirect traffic to the VPN network. This allows me to host behind a NAT (my biggest issue), but also handles IP changes and hides your home's public IP. I am no networking engineer, so I am not sure how safe this is, manually routing packets can be tricky.

There are also a few services this does not work for. So far I've found CS:GO dedicated servers (if the public IP of the local machine differs from the VPS) and email servers cannot be behind a NAT to function properly. Other services likely exist, but you'll be able to run most services. You do lose the originating IP addresses in this case, which can complicate things (the case for email servers).

This process is explained in detail on wickedyoda.com and with a video tutorial.

load more comments
view more: next ›