Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB

  1. Home
  2. Selfhosted
  3. VPN server on router or within home network?

VPN server on router or within home network?

Scheduled Pinned Locked Moved Selfhosted
selfhosted
42 Posts 17 Posters 18 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C [email protected]

    If you use the ISP one, you'll rapidly find you can't configure it to do what you want. Run your own, lock it down, and keep it up to date.

    R This user is from outside of this forum
    R This user is from outside of this forum
    [email protected]
    wrote last edited by
    #16

    Seems like rule #1 😄

    1 Reply Last reply
    0
    • boydster@sh.itjust.worksB [email protected]

      Got an old raspberry pi laying around? PiHole+PiVPN is something I run on an old 3B+ I think, so I have something dedicated running both. But otherwise, I'd probably just spin up a container on a server or cluster and I'd probably go with debian and just run the exact same PiVPN setup script I did for the pi because it was super easy.

      R This user is from outside of this forum
      R This user is from outside of this forum
      [email protected]
      wrote last edited by
      #17

      Running piHole on a NAS, so would avoid adding another device. Adding a trusted router works already increase the device count.

      (My rPi1 is connected to my PS2 and hosts all my ISO files from USB via Ethernet so no discs are required and loading is faster )

      boydster@sh.itjust.worksB M 2 Replies Last reply
      0
      • dual_sport_dork@lemmy.worldD [email protected]

        I personally do not trust ISP provided routers to be secure and up to date, nor free of purposefully built in back doors for either tech support or surveillance purposes (or both). You can expect patches and updates on those somewhere on the timescale between late and never.

        Therefore I always put those straight into bridge mode and serve my network with my own router, which I can trust and control. Bad actors (or David from the ISP help desk) may be able to have their way with my ISP router, but all that will let them do is talk to my own router, which will then summarily invite them to fuck off.

        Likewise, I would not be keen on using an ISP provided router's inbuilt VPN capability, which is probably limited to plain old PTPP -- it has been on all of the examples I've touched so far -- and thus should not be treated as secure.

        You can configure an OpenWRT based router to act as an L2TP/IPSec gateway to provide VPN access on your network without the need for any additional hardware. It's kind of a faff at the moment and requires manually installing packages and editing config files, but it can be done.

        R This user is from outside of this forum
        R This user is from outside of this forum
        [email protected]
        wrote last edited by
        #18

        Thank you for the David link 🎆

        The distrust is adding up, I see your point.
        Will be adding an openWRT router to host a VPN and also manage VLANs. Ultimately might move AdGuard there instead of piHole on my NAS.

        Still not sure what to think about the cloud-pangolin setup, so might work stepwise.

        Thanks!

        1 Reply Last reply
        0
        • D [email protected]

          Expand on your use case. Why/what do want to access on your local network when you are not there?

          R This user is from outside of this forum
          R This user is from outside of this forum
          [email protected]
          wrote last edited by
          #19

          I want to access my NAS, incl the containers it is running.

          1 Reply Last reply
          0
          • C [email protected]

            If you use the ISP one, you'll rapidly find you can't configure it to do what you want. Run your own, lock it down, and keep it up to date.

            nighed@feddit.ukN This user is from outside of this forum
            nighed@feddit.ukN This user is from outside of this forum
            [email protected]
            wrote last edited by
            #20

            Depends on the ISP, my old one just handed out Fritz box routers with nothing locked down. Still using it now with the new ISP!

            1 Reply Last reply
            1
            • R [email protected]

              Sounds interesting to consider, thank you! Did not know about Pangolin and was considering a wireguard VPN on the router to access my NAS services (jellyfin, files, foto backup), avoiding exposed ports etc, and also to avoid hotel WiFi security risks.

              What are the benefits of using the could-pangolin setup vs. wireguard on the router?

              F This user is from outside of this forum
              F This user is from outside of this forum
              [email protected]
              wrote last edited by
              #21

              I believe Pangolin is also using Wireguard. Pangolin is basically a self hosted Tailscale. I think the biggest advantage is the ease of management, but I've never used Pangolin or Tailscale so I couldn't really tell you.

              J 1 Reply Last reply
              1
              • F [email protected]

                I believe Pangolin is also using Wireguard. Pangolin is basically a self hosted Tailscale. I think the biggest advantage is the ease of management, but I've never used Pangolin or Tailscale so I couldn't really tell you.

                J This user is from outside of this forum
                J This user is from outside of this forum
                [email protected]
                wrote last edited by
                #22

                Pangolin Is a reverse proxy for TLS/https. Headscale is the self hosted Tailscale.

                F 1 Reply Last reply
                1
                • R [email protected]

                  Hi,
                  looking for some advice to set up a VPN server to get into my home network when traveling.

                  I have a NAS and an openWRT AP within the network. My router is provided by the ISP and with a built-in VPN.
                  Being a hobbyist in networking, I would like to tab your brains for suggestions and know how:

                  Should I get my own router to run a wireguard VPN off the router directly, i.e. on the edge of the network, OR run a VPN service off the openWRT AP or the NAS, i.e. from within the home network?

                  Thanks a lot for your help!

                  R This user is from outside of this forum
                  R This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #23

                  I use ZeroTier on a MikroTik router.

                  Then just advertise routes on the router.

                  1 Reply Last reply
                  5
                  • F [email protected]

                    I know gross Oracle, but they have a fantastic free tier that would be good for that.

                    R This user is from outside of this forum
                    R This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #24

                    Actually you can get 2 IPs for free. Then use high availability

                    F 1 Reply Last reply
                    0
                    • R [email protected]

                      Actually you can get 2 IPs for free. Then use high availability

                      F This user is from outside of this forum
                      F This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #25

                      I don't understand, each compute unit gets their own IP right?

                      R 1 Reply Last reply
                      0
                      • J [email protected]

                        Pangolin Is a reverse proxy for TLS/https. Headscale is the self hosted Tailscale.

                        F This user is from outside of this forum
                        F This user is from outside of this forum
                        [email protected]
                        wrote last edited by [email protected]
                        #26

                        Oh, I must have completely misunderstood what Pangolin is for. Is Pangolin like a replacement for Cloudflare tunnels in that case?

                        J 1 Reply Last reply
                        2
                        • R [email protected]

                          Thanks, I can follow and understand the first two paragraphs. That feels like my preferred option for now.

                          Don't understand your third paragraph. Any good resources you can point me to for learning?

                          Thanks!

                          D This user is from outside of this forum
                          D This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #27

                          A jump host is just a system that serves as an exit point into the restricted network. You can do this with Ubuntu desktop but you need to figure out how you are going to jump into your host. Others have mentioned tail scale and head scale as options for doing this. Tailscale would be an example of an agent based adhoc vpn solution; this would place a dependency on an external provider to host a connection broker service and use an agent that periodically checks into the broker service for connection requests. Headscale would be the self hosted option and you would need to forward a port into your network and you should guard it with a reverse proxy.

                          R 1 Reply Last reply
                          1
                          • R [email protected]

                            Tailscale. It does some UDP fuckery to bypass NAT and firewalls (most of the time) so you don't even need to open any ports. You can run it on individual hosts to access them directly, and/or you can set it up on one device to advertise an entire subnet and have the client work like a split tunnel VPN. I don't know about OpenWRT, but both pfSense and OpnSense have built-in Tailscale plugins.

                            People are freaking out about their plan to go public, but for the moment, it's a reliable, high quality service even on the free tier.

                            I've also used Ngrok and Twingate to access my LAN from outside, but they simply use relay servers instead of Tailscale's black magic fuckery.

                            F This user is from outside of this forum
                            F This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #28

                            It does some UDP fuckery to bypass NAT and firewalls

                            I wouldn't be surprised if they use hole punching. It's an old but effective technique which Skype famously used back in its heyday.

                            R G 2 Replies Last reply
                            1
                            • F [email protected]

                              It does some UDP fuckery to bypass NAT and firewalls

                              I wouldn't be surprised if they use hole punching. It's an old but effective technique which Skype famously used back in its heyday.

                              R This user is from outside of this forum
                              R This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #29

                              It's based on hole punching, but with extras. The clients punch a hole in their respective firewalls then the service connect the holes so the clients end up communicating directly with each other. They have a lengthy blog post about NAT traversal.

                              1 Reply Last reply
                              0
                              • F [email protected]

                                I have wireguard on my router. To me it makes sense. If my router is down, nothing inside my network is reachable anyway. If I'm going through my router, anything inside my network can be rebooted without effecting my connection. That said, I'm really considering using Pangolin https://github.com/fosrl/pangolin, and hosting it in Oracle Cloud. If you don't know, Oracle Cloud has an extremely generous free tier. As much as I generally hate Oracle, I still recommend their free tier.

                                E This user is from outside of this forum
                                E This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #30

                                Oracle??!!

                                F 1 Reply Last reply
                                0
                                • D [email protected]

                                  A jump host is just a system that serves as an exit point into the restricted network. You can do this with Ubuntu desktop but you need to figure out how you are going to jump into your host. Others have mentioned tail scale and head scale as options for doing this. Tailscale would be an example of an agent based adhoc vpn solution; this would place a dependency on an external provider to host a connection broker service and use an agent that periodically checks into the broker service for connection requests. Headscale would be the self hosted option and you would need to forward a port into your network and you should guard it with a reverse proxy.

                                  R This user is from outside of this forum
                                  R This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #31

                                  Great, understood. Thanks a lot!

                                  1 Reply Last reply
                                  0
                                  • E [email protected]

                                    Oracle??!!

                                    F This user is from outside of this forum
                                    F This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #32

                                    Yeah... I know it's insane. But they give you 4 arm cores, 24GB RAM, 200GB of storage in their always free tier.

                                    1 Reply Last reply
                                    0
                                    • F [email protected]

                                      It does some UDP fuckery to bypass NAT and firewalls

                                      I wouldn't be surprised if they use hole punching. It's an old but effective technique which Skype famously used back in its heyday.

                                      G This user is from outside of this forum
                                      G This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #33

                                      It does a few techniques depending on the type of network and security obstacles. They posted an article on it that's interesting.

                                      I'd also check out pangolin or headscale like others recommeded though since you're already looking to self-host.

                                      1 Reply Last reply
                                      0
                                      • R [email protected]

                                        Running piHole on a NAS, so would avoid adding another device. Adding a trusted router works already increase the device count.

                                        (My rPi1 is connected to my PS2 and hosts all my ISO files from USB via Ethernet so no discs are required and loading is faster )

                                        boydster@sh.itjust.worksB This user is from outside of this forum
                                        boydster@sh.itjust.worksB This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by
                                        #34

                                        I just don't want my NAS doing anything other than being a NAS, so I intentionally don't run extra services there, but its a matter of finding what works for you. As long as you get to the destination you're looking for, its mission accomplished

                                        R 1 Reply Last reply
                                        0
                                        • F [email protected]

                                          Oh, I must have completely misunderstood what Pangolin is for. Is Pangolin like a replacement for Cloudflare tunnels in that case?

                                          J This user is from outside of this forum
                                          J This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by
                                          #35

                                          Yeah, basically. It does bundle wireguard so that it can reverse proxy services over that. That’s probably what you were thinking of.

                                          F 1 Reply Last reply
                                          1
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups