Ancestors

Toot

Written by Yingwu@lemmy.dbzer0.com on 2024-10-26 at 17:11

How annoying is it to connect to VPN/use Tailscale instead of being able to access the service directly?

https://lemmy.dbzer0.com/post/30339225

=> More informations about this toot | More toots from Yingwu@lemmy.dbzer0.com

Descendants

Written by Dust0741@lemmy.world on 2024-10-26 at 17:14

I keep it running always. Partly to access stuff at home, and party to get the ad-blocking from pihole.

Do not expose stuff unless you fully understand the security risks

=> More informations about this toot | More toots from Dust0741@lemmy.world

Written by Yingwu@lemmy.dbzer0.com on 2024-10-26 at 17:25

How’s the power draw on mobile devices?

=> More informations about this toot | More toots from Yingwu@lemmy.dbzer0.com

Written by Dust0741@lemmy.world on 2024-10-26 at 17:27

Its not bad using the official wireguard app. Its definitely noticable. On the android battery screen it’ll show around 5% after a full day of use and it on always

=> More informations about this toot | More toots from Dust0741@lemmy.world

Written by BearOfaTime@lemm.ee on 2024-10-26 at 18:08

I’d consider 5% to be trivial, for what it does.

My battery consumption really depends on how much traffic I send over it.

=> More informations about this toot | More toots from BearOfaTime@lemm.ee

Written by Avid Amoeba on 2024-10-27 at 00:26

Not noticeable with always-on Tailscale with the default split-tunnel mode. That is when Tailscale is only used to access Tailscale machines and everything else is routed via the default route.

=> More informations about this toot | More toots from avidamoeba@lemmy.ca

Written by farcaller@fstab.sh on 2024-10-27 at 11:11

For the last 10 days tailscale clocked 1% battery on my phone. I honestly didn’t even consider turning it off for battery savings.

=> More informations about this toot | More toots from farcaller@fstab.sh

Written by Dust0741@lemmy.world on 2024-10-26 at 17:20

For an external VPN like mullvad, I run my own proxy. Again it’s only available from my VPN or inside my network.

It uses socks5 and gluetun docket containers and in apps that support proxies, I can add my proxy to it and it’ll route that traffic through the paid VPN.

Or, a work profile (see shelter) or androids new private spaces.

If you have private spaces, it uses a seperate network. So if you have a VPN installed outside the private space, it won’t work on apps inside the space.

So, what you could do is have a paid VPN inside private spaces, and use it and a web browser or whatever there, and use your server’s VPN outside the private space.

Lmk if you want any of my docker composes

=> More informations about this toot | More toots from Dust0741@lemmy.world

Written by Yingwu@lemmy.dbzer0.com on 2024-10-26 at 17:23

Very interesting. Didn’t know this was a possibility. I don’t need anything now but thanks for offering, might get back to you

=> More informations about this toot | More toots from Yingwu@lemmy.dbzer0.com

Written by theorangeninja@lemmy.today on 2024-10-27 at 18:41

This sounds very interesting. I always wondered if I could use a paid VPN together with Tailscale or Netbird. But I’m not sure I understood how you set this up. And what are Android private spaces?

=> More informations about this toot | More toots from theorangeninja@lemmy.today

Written by Dust0741@lemmy.world on 2024-10-27 at 21:20

I have gluetun+socks5 containea running, then in an app, I put in localip:port into a proxy field. Then that app will use that connection for internet.

Browsers on desktop also support proxies. So if you want a specific browser to always use the VPN, this is a very simple way to do that.

source.android.com/docs/security/…/private-space

=> More informations about this toot | More toots from Dust0741@lemmy.world

Written by theorangeninja@lemmy.today on 2024-10-29 at 15:52

Thank you for pushing me into the rabbit hole. But gluetun already has a socks proxy server built in, if I read that correctly on their github.

=> More informations about this toot | More toots from theorangeninja@lemmy.today

Written by Dust0741@lemmy.world on 2024-10-29 at 18:38

Oh fascinating. I’ll have to look into that

=> More informations about this toot | More toots from Dust0741@lemmy.world

Written by zelifcam on 2024-10-26 at 17:25

How annoying is it to connect to VPN/use Tailscale

I think it’s very important to separate a random “VPN” solution to using Tailscale.

instead of being able to access the service directly?

Focusing on Tailscale. Who turns off Tailscale? It is “directly” connecting to your service or app or whatever. That’s the whole point.

=> More informations about this toot | More toots from zelifcam@lemmy.world

Written by Yingwu@lemmy.dbzer0.com on 2024-10-26 at 17:31

Probably just me that’s confused. I thought Tailscale was similar to WireGuard but much easier to set up. So one connects to the services directly, and not just the general home network (like a VPN) where you then enter whatever address you need to access the service?

=> More informations about this toot | More toots from Yingwu@lemmy.dbzer0.com

Written by signalsayge@lemm.ee on 2024-10-26 at 17:36

It can be just like you’ve said. You can also run tailscale directly on the system hosting a service and access it directly over the tailscale network.

=> More informations about this toot | More toots from signalsayge@lemm.ee

Written by BearOfaTime@lemm.ee on 2024-10-26 at 18:16

Tailscale is wireguard (it uses the wireguard protocols, even says so on the box), just with a centralized resolver to make things easier to setup and manage.

I’m not sure what you’re saying with the rest of your comment, as Tailscale is a mesh network, not a VPN as most people think of it.

It encrypts your traffic, but only into the network of which your device is a member. You can’t even see any devices, or networking, outside the Tailscale network, unless a device is configured as a Subnet router. Then you can see devices n the network which the Subnet Router links together.

For example, you have 3 machines, a laptop on mobile data, and 2 desktops on your home LAN. One desktop and the laptop have Tailscale, they can communicate over Tailscale to each other, but the laptop cannot connect to the second desktop because it’s on a different network, since there’s no routing between Tailscale and your home LAN.

You then configure Subnet Routing on the desktop that has Tailscale, now your laptop can connect o any device on the home LAN, so long as the desktop is running and Tailscale is up.

=> More informations about this toot | More toots from BearOfaTime@lemm.ee

Written by Yingwu@lemmy.dbzer0.com on 2024-10-26 at 19:00

Great explanation, thank you! Hamachi brings back memories haha

=> More informations about this toot | More toots from Yingwu@lemmy.dbzer0.com

Written by BearOfaTime@lemm.ee on 2024-10-26 at 20:51

It still exists! (Or did about a year ago).

When I got my first Android (2009 ish), I searched high and low for a way to run Hamachi on it. There have been solutions, but always clumsy and difficult to implement.

I miss Hamachi, it was so simple to use.

=> More informations about this toot | More toots from BearOfaTime@lemm.ee

Written by Andres Salomon on 2024-10-27 at 00:23

@BearOfaTime @Yingwu I don't see folks mentioning it, but yggdrasil is what I use instead of tailscale. Not just for easy access to machines across networks, but also for exposing services; I have a VPS running apache that does a reverse proxy to the service via yggdrasil-specific IP.

=> More informations about this toot | More toots from Andres4NY@social.ridetrans.it

Written by Denis Evsyukov :verified: on 2024-11-17 at 18:44

@Andres4NY @BearOfaTime @Yingwu As far as I know, the Yggdrasil is still in alpha?

Isn’t it dangerous to use a project that is still being developed in the work. And maybe break something at any moment?

=> More informations about this toot | More toots from juev@hachyderm.io

Written by Andres Salomon on 2024-11-17 at 19:18

@juev @BearOfaTime @Yingwu It's alpha in the sense that there may be protocol changes, but its generally pretty stable. I've been on 0.4 for a number of years. 0.5.x is a protocol change, so when I upgrade I'll have to upgrade all machines at once.

=> More informations about this toot | More toots from Andres4NY@social.ridetrans.it

Written by Kevin Karhan :verified: on 2024-10-26 at 17:26

@Yingwu Just don't do #Tailscale because it's yet another #ValueRemoving #Middlemen like #ClownFlare aka. #Cloudflare!

=> More informations about this toot | More toots from kkarhan@infosec.space

Written by #!/usr/bin/woof on 2024-10-26 at 17:26

Use Tailscale, for the most part it’s pretty transparent. As long as all the magic DNS stuff is setup correctly, I can access all my internal services by name and it just works.

=> More informations about this toot | More toots from jhoward@lemmy.sdf.org

Written by InverseParallax@lemmy.world on 2024-10-26 at 17:57

Not much, I have services that run both externally and only over wg.

Only issue with wg is sometimes I have to shut it off for things like multicastdns, or otherwise that try to look around the network or wifi.

=> More informations about this toot | More toots from InverseParallax@lemmy.world

Written by Agility0971 on 2024-10-26 at 17:59

Im using tailscale and have all my devices connected through it. Im not exposung any services in particular, just handy to be able to ssh around

=> More informations about this toot | More toots from Agility0971@lemmy.world

Written by merde alors on 2024-10-26 at 18:43

🤔

=> More informations about this toot | More toots from merde@sh.itjust.works

Written by OneCardboardBox@lemmy.sdf.org on 2024-10-27 at 05:02

isn’t it an annoyance having to connect to your home network all the time?

It’s less annoying than the gnawing fear that my network might be an easy target for attackers.

=> More informations about this toot | More toots from OneCardboardBox@lemmy.sdf.org

Written by irotsoma on 2024-10-27 at 07:00

Depends on how secure the application and the security you use in front of the application such as reverse proxies, load balancers, etc. If you are exposing a web application with no SSL, no two factor with, or something in a beta state or if you can’t trust your ISP not to create man-in-the-middle attacks for advertising and collecting information to sell which also likely introduces security vulnerabilities, then that could be a problem and a VPN or similar might be a big help.

=> More informations about this toot | More toots from irotsoma@lemmy.world

Written by Kusimulkku@lemm.ee on 2024-10-27 at 07:13

Sucks a high hard one if you plan for others to use your services too. If it’s just you it’s not that annoying

=> More informations about this toot | More toots from Kusimulkku@lemm.ee

Written by Encrypt-Keeper on 2024-10-28 at 16:37

If you have an iPhone, it’s a pain over Tailscale because Tailscale frequently likes to disconnect for various reasons and this isn’t something Tailscale can fix, it’s something with the way Apple manages background processes.

If you’d like an alternative, you can host your services directly to the internet via a reverse proxy like Caddy or Nginx, and then use mTLS to secure that access with a certificate you load only onto your devices.

=> More informations about this toot | More toots from EncryptKeeper@lemmy.world

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/113374834998284872
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
451.370999 milliseconds
Gemini-to-HTML Time
6.631049 milliseconds

This content has been proxied by September (3851b).