this post was submitted on 17 Jun 2024
12 points (83.3% liked)

Selfhosted

40382 readers
467 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I’ve just started hosting stuff and i’ve been using frp’s stcp to make stuff accessible when i’m at school. I was wondering if I should bother setting up/switching over to wireguard which is apparently the way to go?

all 16 comments
sorted by: hot top controversial new old
[–] colifloro@lemmy.world 1 points 5 months ago* (last edited 5 months ago)

Have you checked tailscale? a one click wireguard, free for quite a lot of devices. there is a project to selfhost the control server https://headscale.net/

[–] Moonrise2473@feddit.it 0 points 5 months ago (1 children)

never heard about stcp nor i see something called like that in their github repository

Does it have authentication?

For safety i'd add an additional layer of authentication. Easy way: cloudflare access + cloudflare tunnel; hard mode: authelia + a reverse proxy

[–] EpicStuff@lemmy.ca 1 points 5 months ago* (last edited 5 months ago)

id say it’s basically tcp with a password

try ctrl f on the readme?

[–] possiblylinux127@lemmy.zip -1 points 5 months ago (3 children)

You didn't expose it to the internet right? Right?

Use Netbird and a network share. I don't know what stcp is but I would go with SMB or syncthing

[–] seang96@spgrn.com 2 points 5 months ago (1 children)

From the link in the post it's a reverse proxy backed by terminos which is a secure OS for kubernetes and is really good, so I imagine this proxy is also really good. So OPs setup is already likely fine as is.

[–] possiblylinux127@lemmy.zip 0 points 5 months ago

Still why risk it? It seems like there are better ways to do this

[–] theorangeninja@lemmy.today 1 points 5 months ago (1 children)

How are you using Netbird in your setup if I may ask?

[–] possiblylinux127@lemmy.zip 2 points 5 months ago (1 children)

How? I install the client and use ACLs

[–] theorangeninja@lemmy.today 1 points 5 months ago (1 children)

What are ACLs? And do you use the self hosted or the hosted option?

[–] possiblylinux127@lemmy.zip 2 points 5 months ago (1 children)

You don't need ACLs for small stuff (access control lists, they are used for least privilege) all you need to do is to install the client in each machine and then those machines can talk as if they were on the same network.

If you wanted to access device C from device B running Netbird you could also use the routing feature to route traffic as if you were on the local network. You also can use the VPN feature if you want to get the same experience as if you were at home.

[–] theorangeninja@lemmy.today 0 points 5 months ago (1 children)

Thank you very much! Can you link to a noob-friendly guide for all the features Netbird offers?

[–] EpicStuff@lemmy.ca 1 points 5 months ago* (last edited 5 months ago) (2 children)

uh, i did?

can u explain why its a bad idea?

[–] seang96@spgrn.com 1 points 5 months ago* (last edited 5 months ago)

The proxy you are using seems like a good one and if you are using auth on it you aren't exposing the services under it directly, so the vulnerability would be proxy or your password to reach any potential vulnerabilities on the service. Sure there could be some crazy bad vulnerability on the proxy, but as long as your using a good trusted one and not doing some config to bypass their security, and updating it, you should be fine. Some people here think you could use vpns and such for everything and sometimes you just gotta share your services and going through a proxy service is a good solution.

[–] possiblylinux127@lemmy.zip 0 points 5 months ago

Anything on the internet gets hammered. As soon as there is any sort of vulnerability you are compromised.

You don't need to take that risk