zlacker

[parent] [thread] 10 comments
1. aaomid+(OP)[view] [source] 2025-01-05 14:14:35
Tbh I prefer not exposing any ports directly, and then throwing Tailscale on the network used by docker. This automatically protects everything behind a private network too.
replies(5): >>smarx0+v1 >>yx827h+45 >>Manouc+S6 >>diggan+17 >>bakugo+wm
2. smarx0+v1[view] [source] 2025-01-05 14:28:56
>>aaomid+(OP)
I would love to read a write-up on that! Are you doing something like https://tailscale.com/blog/docker-tailscale-guide ?
replies(1): >>aaomid+3D
3. yx827h+45[view] [source] 2025-01-05 14:59:09
>>aaomid+(OP)
I agree, Tailscale FTW! You didn't even need to integrate it with docker. Just add a subnet route and evening just works. It's a great product.
4. Manouc+S6[view] [source] 2025-01-05 15:13:29
>>aaomid+(OP)
Another option is using Cloudflare Tunnels (`cloudflared`), and stacking Cloudflare Access on top (for non-public services) to enforce authentication.
replies(1): >>aaomid+LC
5. diggan+17[view] [source] 2025-01-05 15:14:23
>>aaomid+(OP)
FOSS alternative is to throw up a $5 VPS on some trusted host, then use Wireguard (FOSS FTW) to do basically exactly the same, but cheaper, without giving away control and with better privacy.

There is bunch of software that makes this easier than trivial too, one example: https://github.com/g1ibby/auto-vpn/

replies(1): >>eadmun+8H
6. bakugo+wm[view] [source] 2025-01-05 17:18:43
>>aaomid+(OP)
Important to note that, even if you use Tailscale, the firewall punching happens regardless, so you still have to make sure you either:

1. Have some external firewall outside of the Docker host blocking the port

2. Explicitly tell Docker to bind to the Tailscale IP only

replies(1): >>aaomid+WC
◧◩
7. aaomid+LC[view] [source] [discussion] 2025-01-05 19:23:04
>>Manouc+S6
just fyi cloudflare closes any idle connection thats been around longer than 10 seconds.
◧◩
8. aaomid+WC[view] [source] [discussion] 2025-01-05 19:23:59
>>bakugo+wm
> the firewall punching happens regardless

Does it? I think it only happens if you specifically enumerate the ports. You do not need to enumerate the ports at all if you're using Tailscale as a container.

replies(1): >>bakugo+KF
◧◩
9. aaomid+3D[view] [source] [discussion] 2025-01-05 19:24:36
>>smarx0+v1
Yep! That's very similar to what I do.

I have a tailscale container, and a traefik container. Then I use labels with all my other containers to expose themselves on Traefik.

◧◩◪
10. bakugo+KF[view] [source] [discussion] 2025-01-05 19:47:26
>>aaomid+WC
Oh, I didn't realize you meant running Tailscale in docker, my bad. Then yeah, that's safe.
◧◩
11. eadmun+8H[view] [source] [discussion] 2025-01-05 19:57:49
>>diggan+17
Or you can use headscale (BSD) with the Tailscale client (BSD), which is still FOSS but also very very easy to use.
[go to top]