3

Has someone experience running these as firewall preferably with package inspection and incoming Wireguard connections?

Sophos XG115 or XG105 seem to be quiet cheap on eBay

6
OPNsense with DSL? (sh.itjust.works)

I'm looking for a cheap but futureproof way to run OPNsense at my place.

So I'm looking for a DSL modem capable of running at 300 Mbits and being able to run im bridge mode, it's fine if I buy it used I just couldn't find any good recommendations as FritzBox seems to not like running in bridge mode. Being able to flash something like OpenWRT on it is a bonus.

And on the other hand I'm looking for good recommendations for the OPNsense box. Should have enough power for Wireguard and package inspection. Used ist probably preferred

Thanks in advance :)

[-] Jerry1098@sh.itjust.works 10 points 9 months ago

Thanks, that looks really promising

[-] Jerry1098@sh.itjust.works 19 points 9 months ago

Thanks a lot, that pretty much what I was looking for

190
submitted 9 months ago by Jerry1098@sh.itjust.works to c/privacy@lemmy.ml

I'm looking for a vacuum robot preferably under 500€ and with a cleaning station. My main concern is that most robot vacuum providers seem to need to be connected to the internet. Are there any providers that either don't need that, where I can block the internet connection or any other way not getting a spy in my home? I'm fine with it if some work is needed

[-] Jerry1098@sh.itjust.works 9 points 10 months ago

If you already have Nextcloud running you can use the Nextcloud Forms app

[-] Jerry1098@sh.itjust.works 3 points 11 months ago

Honestly, I would say because you just have less struggle. I had just a lot more problems when I was using Ubuntu instead of Debian. But I thinks it's mostly personal preference

[-] Jerry1098@sh.itjust.works 4 points 1 year ago

I don't know about photoprism but I guess that's not going to work because it's really hard to provide features like face recognition and a web frontend with a zero trust setup. So if you just want the to have a automatic photo backup you could take a look at encrypted folders for nextcloud

[-] Jerry1098@sh.itjust.works 3 points 1 year ago

But the network is created externally, so shouldn't this be the same?

17
submitted 1 year ago* (last edited 1 year ago) by Jerry1098@sh.itjust.works to c/selfhosted@lemmy.world

I followed this Guide to setup headscale with caddy. And tried to add Keycloak with this guide from the same guy.

Sadly my docker containers do not seem to be able to connect to the keycloak server. What happens is that if i try to download the openid configuration from the host (via wget) or from my local PC it just works. But the headscale server gets a timeout when trying to connect to the endpoint. When i use the internal docker name to connect to the keycloak container the connection works fine but then i get an error because its not the external url.

I experimented a bit and managed to reproduce the issue with a different container (running an ubuntu container and also getting a timeout when trying to download the config from keycloak). If i run the container with the host network i works just fine.

Does anyone know how to fix this?

PS: i also tried the example from the guide with gitea an its also the same problem

Update: I tried most suggestions and for some reason it just didn't work. My solution that is working now is that I bind the container ports to localhost only (by using p.e.: ports: -"127.0.0.1:4567:8080") and using the caddy server in host network mode. Now all containers can connect like expected and are working flawlessly. Thanks for all your suggestions :)

[-] Jerry1098@sh.itjust.works 10 points 1 year ago* (last edited 1 year ago)

For Headscale you don't need a lot of bandwidth or power because your traffic is not routed through the Headscale server. Headscale only helps to directly connect your clients together without having to open ports

[-] Jerry1098@sh.itjust.works 4 points 1 year ago

I agree with you that by using tailscale you have to trust them, but your traffic is not routed through their servers, they are only responsible to directly connect your devices (by nat traversal)

[-] Jerry1098@sh.itjust.works 1 points 1 year ago

Just in case you never heard of it, there is also the option to use Tailscale. It lets you connect to your services without opening any ports and uses Wireguard under the hood but makes configuration simpler

73
How do you use Tailscale? (sh.itjust.works)

I've read a lot of recommendations for tailscale and am on my way to try it out myself. Do you use Tailscale in the "normal" way or do you host your own Headscale server (as I'm planning to do)? Any pros and cons?

[-] Jerry1098@sh.itjust.works 3 points 1 year ago

It's possible to do an automatic only license, but for most people it doesn't make sense to do so, so no one does.

[-] Jerry1098@sh.itjust.works 6 points 1 year ago

Welcome to Lemmy :)

But for real, if you go to the comment section on instagram or something comparable, its really toxic compared to Lemmy. But I'm also a bit worried as mastodon seems to become more toxic over the time, hopefully Lemmy stays the same

[-] Jerry1098@sh.itjust.works 1 points 1 year ago

Maybe you could also try to generate your one SSL certificate and add it to your Android/Linux/Windows devices as root certificate 🤷🏼‍♂️.

That's only a possibility, of you're willing to do this to every single device that should be able to connect to your services

view more: next ›

Jerry1098

joined 1 year ago