this post was submitted on 06 Jul 2023
25 points (93.1% liked)

Selfhosted

40152 readers
495 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

My ISP doesn't give a Public IP and let me open ports without paying a extra fee, which I cannot afford rn. I host all my services on a old PC, Anyways that i can access my services beyond my LAN?

top 18 comments
sorted by: hot top controversial new old
[–] luki1051@lemmy.krobbel.xyz 16 points 1 year ago (1 children)

You could check out Cloudflare Tunnels.

If you want something self-hosted here's a huge list: https://github.com/anderspitman/awesome-tunneling

[–] TheroRando@lemmy.one 3 points 1 year ago

Just checked it out! It's Real Great.

But as Users mentioned ZeroTier and TailScale, I really like those options, just keeping the services private and to myself, but will be hosting my website through this tho,cheers :)

[–] Catsrules@lemmy.ml 11 points 1 year ago (3 children)

You have a few options. Depending on what your trying to do you could look into Tailscale or ZeroTeir. Basically they create a small VPN that you can join multiple devices to. This won't open the services to the public internet but it will open the services to whatever devices join your private Tailscale/ZeroTeir network running over the public internet.

Someone already mentioned but CloudFlare Tunnels would be a really good fit as well.

Another option but more expensive and most complex is rent a VPS in the cloud somewhere setup a VPN link between the box and your PC and then route the traffic thought that VPS. All public access will hit your VPS public IP and port numbers and get relayed though that back to your PC.

[–] TheroRando@lemmy.one 4 points 1 year ago

Never Knew but This is what i am looking for, Thus on. Just Keeping the services and to myself sounds like a bliss for me. Thanks man really appreciate it 🫂

[–] leraje@lemmy.world 1 points 1 year ago (1 children)

One thing I'm wondering about tailscale or zerotier or setting up a VPN on a VPS - how would that affect me using a 3rd party VPN client (e.g. Proton, Mullvad etc) on my PC and/or phone?

To connect to a locally hosted service using one of those options, would I have to first disconnect from the 3rd party client?

[–] Catsrules@lemmy.ml 1 points 1 year ago

Probably depends on how the OS handles multiple VPN connections. Technically I see no reason why you can't have multiple VPNs active at once.

[–] animist@lemmy.one 0 points 1 year ago (1 children)

Is that last one almost like a reverse proxy?

[–] Catsrules@lemmy.ml 2 points 1 year ago

Yeah a reverse proxy would be a really easy way to do it. Assuming whatever your trying to expose will work with one.

But for traffic like a game server or something else that doesn't use the traditional http protocol you could also setup the VPS as more of a router/NAT if you wanted.

Although that said I think NGINX can do a proxy stream that will work with most TCP/UDP connections no matter the protocol, I haven't ever done it so I can't say how universal that works.

[–] 2xsaiko@discuss.tchncs.de 4 points 1 year ago

If you have IPv6, those are public and usually static.

[–] redcalcium@c.calciumlabs.com 4 points 1 year ago* (last edited 1 year ago) (1 children)

Tailscale and Zerotier might be suitable for this, and they're free for personal use. The can be used to work around NAT because they can route your traffic over their transparent relays.

[–] TheroRando@lemmy.one 2 points 1 year ago (2 children)

That's Really Lovely to hear and I am just a tad bit curious, How can someone make sure that the relay's are transparent? You cannot really go and check it there to find out, can we?

[–] redcalcium@c.calciumlabs.com 2 points 1 year ago* (last edited 1 year ago)

Transparent here means the use of the relay is invisible to you. If two devices under the same tailscale/Zerotier network can access each other (e.g. in the same lan), then the relay won't be used. But if both devices are under separate networks (e.g. one in your home, and the other is your phone while outside your home, and both devices are behind NATs), the relay will be automatically used as a bridge so both devices can communicate with each others.

Connections to relays are encrypted, but Zerotier allows you to setup your own relay server if you worry about privacy. Not sure about tailscale.

[–] msinfo32@lemmy.msinfo32.uk 1 points 1 year ago

Obviously you cannot be 100% sure. You can read more here:

[–] mfat@lemdro.id 4 points 1 year ago
[–] kittyrunningnoise@lemm.ee 2 points 1 year ago* (last edited 1 year ago) (1 children)

ultimately, you will need some kind of access to something with at least one port open, if you intend to host services on the clearnet. you could use tor if onion services will work for you. if you have ssh access somewhere with a port open (or a friendly sysadmin), you could tunnel to there and redirect incoming connections back through the tunnel. same thing with a VPN, if the sysadmin is really friendly.

[–] TheroRando@lemmy.one 2 points 1 year ago (1 children)

I initially wanted to open it to the clearnet but users suggested ZeroTeir and I think that works great!

[–] fedonr@lemmy.dbzer0.com 3 points 1 year ago (1 children)

Use tailscale as it is easy to setup, and just with 1 or 2 commands you can have it setup to forward subnets (which can let you use the same local IPs remotely to connect back, instead of Tailscale assigned once) and Exit Node (route all your internet traffic from your Home connection when you are on public network and enable exit note on client)

[–] TheroRando@lemmy.one 1 points 1 year ago

Thanks for the Tip, For sure will do :)

load more comments
view more: next ›