In this spooky 13th edition of #selfhostember, we take a look at #Netbird - an overlay VPN , and #tailscale competitor - to access our services from anywhere without exposing them to the public internet.
6 free tools that should be on every self-hoster's machine:
#Authentik, Simple way to add SSO to your app stack
#NginxProxyManager, For your reverse proxy needs
#UptimeKuma, To get notified when your services go down
#Portainer Make container management a lot easier
#Tailscale Remotely access your arsenal of services
#Kopia Back up your container volumes
https://www.xda-developers.com/free-tools-that-should-be-on-every-self-hosters-machine/
Okay, it seems there are some #tailscale (or similar services) users here. Everything works great so far, tailscale serve + their services are easy to use. However, I'd like to get an understanding if it is possible to access my #homelab services without the tailscale client whenever I'm in my home lan network und with the tailscale client when I'm connected remotely - from the same https (sub-) domain. I have read that I need a public domain and a #reverseproxy for that (which I don't have in my current setup) - is this the right way to go?
Okay, it seems there are some #tailscale (or similar services) users here. Everything works great so far, tailscale serve + their services are easy to use. However, I'd like to get an understanding if it is possible to access my #homelab services without the tailscale client whenever I'm in my home lan network und with the tailscale client when I'm connected remotely - from the same https (sub-) domain. I have read that I need a public domain and a #reverseproxy for that (which I don't have in my current setup) - is this the right way to go?
Been thinking about setting up #Tailscale for accessing my #Synology off network. Just went to sign up, and you have to use a 3rd party SSO provider. I hate that. Why can't I just sign up with a bloody email address??
Been thinking about setting up #Tailscale for accessing my #Synology off network. Just went to sign up, and you have to use a 3rd party SSO provider. I hate that. Why can't I just sign up with a bloody email address??
I did some more digging on how to get my Tailscale traffic to bypass a Wireguard VPN which otherwise routes all internet traffic on OpenWrt without using the 'pbr' package, and found a rather strange document:
tl;dr it's definitely possible, but I'm going to have to bite the bullet and not use the simple "route all traffic over Wireguard and enable a 'killswitch' to prevent leaks" two-checkbox setup I've been using thus far.
I did some more digging on how to get my Tailscale traffic to bypass a Wireguard VPN which otherwise routes all internet traffic on OpenWrt without using the 'pbr' package, and found a rather strange document:
tl;dr it's definitely possible, but I'm going to have to bite the bullet and not use the simple "route all traffic over Wireguard and enable a 'killswitch' to prevent leaks" two-checkbox setup I've been using thus far.
Everyone and their mother on Masto has and talks about #Tailscale and I don't know what it is so I go to their website and learn that Tailscale is a "a secure and private, identity-based, infrastructure agnostic network with a flexible topology, resilient networking, and a streamlined setup" and well you don't say !
"resilient networking" 🤭
Everyone and their mother on Masto has and talks about #Tailscale and I don't know what it is so I go to their website and learn that Tailscale is a "a secure and private, identity-based, infrastructure agnostic network with a flexible topology, resilient networking, and a streamlined setup" and well you don't say !
"resilient networking" 🤭
Progress update for #Dropserver for September (finally!)
I write about Bubblewrap, sandboxing, #Tailscale in the real world, work on the Leftovers app, and the installation experience for ds-host (which will be separate blog post.)
https://olivierforget.net/blog/2025/dropserver-progress-sept-2025/
Progress update for #Dropserver for September (finally!)
I write about Bubblewrap, sandboxing, #Tailscale in the real world, work on the Leftovers app, and the installation experience for ds-host (which will be separate blog post.)
https://olivierforget.net/blog/2025/dropserver-progress-sept-2025/
6 free tools that should be on every self-hoster's machine:
#Authentik, Simple way to add SSO to your app stack
#NginxProxyManager, For your reverse proxy needs
#UptimeKuma, To get notified when your services go down
#Portainer Make container management a lot easier
#Tailscale Remotely access your arsenal of services
#Kopia Back up your container volumes
https://www.xda-developers.com/free-tools-that-should-be-on-every-self-hosters-machine/
If anyone knows anyone at #Tailscale, I'd like a quiet word (they've closed their user-facing forum)
Machine A has subnet 10.0.0.0/23
Machine B, dead for a few months, happens to advertise subnet 10.0.0.0/23 in the admin panel.
tailscale up --accept-routes on Machine A seems to kill networking.
What?
Your local machine subnet should always be a higher priority, shouldn't it?
root@VM1:~# tailscale up --accept-routes
*connection drops, routing loop*
I love #Tailscale. I hate #Tailscale.
Looking for an alternative to Nextcloud for remote file access across my Tailnet. Tailscale Drive is SO CLOSE to what I need, but the filename requirements for the webDAV access are a no-go for me and the family.
What’s an easy way to access my files across my Tailnet?
Bonus points if there’s an iOS app or integration into the iOS Files app.
Shout out to #TsDProxy (Tailscale Docker Proxy). Such a neat tool and works wonderfully.
Please do yourself a favour and go check it out if you #selfhost services in #docker and proxy through #tailscale.
Ii was looking for this exact solution and couldn't really believe it when I found it.
Shout out to #TsDProxy (Tailscale Docker Proxy). Such a neat tool and works wonderfully.
Please do yourself a favour and go check it out if you #selfhost services in #docker and proxy through #tailscale.
Ii was looking for this exact solution and couldn't really believe it when I found it.
The work on #EU_OS continues. In the last days, the Proof-of-Concept pages at https://eu-os.eu/poc/ have received a few updates on provisioning, branding and thoughts on user data backups. Open questions and issues are listed at https://gitlab.com/eu-os/eu-os.gitlab.io/-/issues
Please lend us your helping hand, reshare ♻️ and spread the word 🗣️!
1/3
2/3 Topics #EU_OS needs help with:
1) What is the best way to backup user data for Linux EU OS users? https://gitlab.com/eu-os/eu-os.gitlab.io/-/issues/46 #borgbackup #btrfsbk #btrfs#nextcloud
2) How can unattended deployment with #foreman look like during pilot stage (thus without reconfiguring the network/DHCP yet)? https://gitlab.com/eu-os/eu-os.gitlab.io/-/issues/39 #foreman
3) How can a modern VPN provide extra security for people in home offices or on business trips? https://gitlab.com/eu-os/eu-os.gitlab.io/-/issues/47 #tailscale #headscale #rosenpass #wireguard #openvpn
Blog post: Progress report for #Dropserver for June and July.
I talk about how UI improvements came about for the #Tailscale node connection interface, and where things might go next now that Tailscale integration is done (or done enough for now at least).
https://olivierforget.net/blog/2025/dropserver-progress-june-july-2025.md/