tapdattl

joined 2 years ago
[–] tapdattl@lemmy.world 2 points 2 weeks ago

In that case, this seems pretty reasonable -- disclaimer: I can't personally attest to the effectiveness of this

https://github.com/Lissy93/personal-security-checklist

[–] tapdattl@lemmy.world 3 points 1 month ago (1 children)

I think the general consensus for homelabbers is a mesh network -- Tailscale and Netbird are the two most popular options

[–] tapdattl@lemmy.world 1 points 2 months ago

The Homelab Show was a good one, though they haven't posted a new podcast in almost a year. Lawrence Systems and Learn Linux TV are the makers of it and have their own content as well

 

I'm re-setting up my HomeLab and one of the things I'm trying to learn about on this go-around is Zero Trust networking. To accomplish this I am planning on using NetBird's mesh overlay network. I would like all of my services to use the NetBird mesh network at all times, whether they are communicating within my homelab's LAN or I am accessing them from outside via the greater internet.

I have successfully set up the NetBird management interface on a Hetzner VPS, however the issue I run into is if I lose internet access at home, none of my services are able to function as they can no longer reach the management interface. However, if I self host the management interface in my homelab, I am unable to access it from outside my home LAN.

I've identified 2 solutions that could solve this:

  1. Self host the management interface and set up a Cloudflare tunnel to the management interface, which would allow access from outside my home network.

  2. Self host the management interface, then set up a wireguard proxy/tunnel on a VPS that forwards traffic to my management interface (Similar in my mind to option 1, but not relying on Cloudflare)

What are your thoughts? Any other ideas?

I appreciate your comments/criticisms!