this post was submitted on 14 Dec 2024
58 points (92.6% liked)

Selfhosted

40645 readers
298 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Good FOSS software and reliable service providers? Etc.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 7 points 3 days ago (2 children)

Ixury for people that can have public IPs! :)

[–] sugar_in_your_tea 5 points 3 days ago (2 children)
[–] [email protected] 3 points 2 days ago (2 children)

It's why IPv6 is important, but many didn't listen.

[–] [email protected] 3 points 2 days ago

@chronicledmonocle @sugar_in_your_tea This is why I love yggdrasil. Thanks to having a VPS running it that all of my hosts globally can connect to, I can just use IPv6 for everything and reverse proxy using those IPv6 addresses where I need to. Once hosts are connected and on my private yggdrasil network, I stop caring about CGNAT or IPv4 at all other than to maybe create public IPv4 access to a service.

[–] sugar_in_your_tea 0 points 2 days ago (1 children)

IPv6 doesn't help anything if you're behind CGNAT, you can have internal-only IPv6. There are good reasons to not have every household directly accessible to the outside world, so I'm sympathetic to that, but they also seem to love charging extra for it.

[–] [email protected] 2 points 2 days ago* (last edited 2 days ago) (1 children)

CGNAT only applies to IPv4. You cannot NAT IPv6 effectively. It's not designed to be NATed. While there IS provisions for private IPv6 addressing, nobody actually does it because it's pointless.

[–] sugar_in_your_tea 1 points 1 day ago (1 children)

Sure, but NPTv6 exists, and I wouldn't put it past an ISP to do something like that.

[–] [email protected] 1 points 1 day ago (1 children)

Network Prefix Translation isn't the same thing. That's used for things like MultiWAN so that your IPv6 subnet from another WAN during a failover event can still communicate by chopping off the first half and replacing the subnet with the one from the secondary WAN. It is not NAT like in IPv4 and doesn't have all of the pitfalls and gotchas. You still have direct communications without the need for things like port forwarding or 1:1 NAT translations.

I'm a Network Engineer of over a decade and a half. I live and breath this shit. Lol.

[–] sugar_in_your_tea 0 points 1 day ago (1 children)

Yes, it's not the same, but it can be used to bridge private addresses onto a public network, which is basically what NAT is trying to achieve. If you're running an ISP and don't want customers to be directly accessible from the internet, it seems reasonable. In an ISP setup, you would issue private net addresses and just not do the translation if the customer doesn't pay.

Yes, you can achieve the same thing another way, but I could see them deciding to issue private net addresses so customers don't expect public routing without paying, whereas issuing regular public IPv6 addresses makes it clear that the block is entirely artificial.

[–] [email protected] 1 points 1 day ago

Just because you can doesn't mean anyone does. I've never seen an ISP hand out "private" IPv6 addresses. Ever.

If you're doing NAT on IPv6, you're doing it wrong and stupid. Plain and simple.

[–] [email protected] 2 points 3 days ago (1 children)

Yeah, there are workarounds... And who knows, maybe its just safer than public ip... But definitely require some external fixture.

[–] [email protected] 3 points 2 days ago (2 children)

I guess you already know about the options, but for others:

Find the cheapest VPS out there and have a Wireguard tunnel between it and your home network. Run ddclient or similar on the VPS in case the public IP changes.

[–] sugar_in_your_tea 1 points 2 days ago

Yup, that's what I did. I even have my TLS servers running on my LAN as well, so once my ISP no longer puts me behind CGNAT, I just need to change my DNS settings and set up some port forwards on my router.

[–] [email protected] 1 points 2 days ago

Wireguard or ssh tunnel with port forwards, both works.

[–] [email protected] 1 points 2 days ago* (last edited 2 days ago) (1 children)

I'm in the same situation.

Fortunately there's a million companies that offer VPS with a static IP address for only few bucks a month. I set one up to run a wireguard VPN server which all my devices and home servers connect to as clients. I also configured everything to use a split tunnel to save bandwidth.

It's an added layer of security too.

[–] [email protected] 2 points 2 days ago (1 children)

Can you detail the split tunnel part?

[–] [email protected] 2 points 2 days ago* (last edited 2 days ago) (1 children)

Normally when you're on a VPN all the network traffic to and from your device is going through the connection to the VPN server, e.g. browsing the internet, online games, etc. It can cause issues with other online services and uses bandwidth (cheap as it is) many VPS provider charges for.

A split tunnel tells the VPN client to only send certain traffic through the tunnel. My wireguard setup assigns IP addresses for the VPN interfaces in the subnet 192.168.2.x, so only traffic addressed to IPs on that subnet get sent through the tunnel. In wireguard it's a single line in the config file:

AllowedIPs = 192.168.2.0/24
[–] [email protected] 2 points 1 day ago

I am doing split tunnel since years without knowing :)

Thanks, I learned something new.