zlacker

[parent] [thread] 135 comments
1. drnick+(OP)[view] [source] 2026-01-11 22:25:31
I'd rather expose a Wireguard port and control my keys than introduce a third party like Tailscale.

I am not sure why people are so afraid of exposing ports. I have dozens of ports open on my server including SMTP, IMAP(S), HTTP(S), various game servers and don't see a problem with that. I can't rule out a vulnerability somewhere but services are containerized and/or run as separate UNIX users. It's the way the Internet is meant to work.

replies(31): >>CSSer+W >>sauerc+C1 >>Topgam+h2 >>heavys+D2 >>esseph+f9 >>Schema+ub >>buran7+Rc >>zamada+pd >>Ethery+Yd >>Frotag+if >>epista+gk >>alpn+Sk >>digiow+pJ >>byb+nS >>catlif+EU >>Batter+M01 >>PeterS+Q31 >>nialv7+Mc1 >>arjie+ve1 >>eqvino+Xg1 >>twelve+Zg1 >>pacija+Yo1 >>rubatu+fs1 >>gambit+mA1 >>inapis+kI1 >>abc123+SK1 >>1vuio0+Zq2 >>zobzu+5r2 >>dpacmi+9z2 >>cirell+RL4 >>Ir0nMa+a36
2. CSSer+W[view] [source] 2026-01-11 22:31:53
>>drnick+(OP)
The answer is people who don't truly understand the way it works being in charge of others who also don't in different ways. In the best case, there's an under resourced and over leveraged security team issuing overzealous edicts with the desperate hope of avoiding some disaster. When the sample size is one, it's easy to look at it and come to your conclusion.

In every case where a third party is involved, someone is either providing a service, plugging a knowledge gap, or both.

3. sauerc+C1[view] [source] 2026-01-11 22:35:11
>>drnick+(OP)
People are not full time maintainers of their infra though, that's very different to companies.

In many cases they want something that works, not something that requires a complex setup that needs to be well researched and understood.

replies(1): >>buildf+z6
4. Topgam+h2[view] [source] 2026-01-11 22:38:56
>>drnick+(OP)
I don't have a static IP, so tailscale is convenient. And less likely to fail when I really need it, as apposed to trying to deal with dynamic dns.
5. heavys+D2[view] [source] 2026-01-11 22:40:42
>>drnick+(OP)
> I'd rather expose a Wireguard port and control my keys than introduce a third party like Tailscale.

This is what I do. You can do Tailscale like access using things like Pangolin[0].

You can also use a bastion host, or block all ports and set up Tor or i2p, and then anyone that even wants to talk to your server will need to know cryptographic keys to route traffic to it at all, on top of your SSH/WG/etc keys.

> I am not sure why people are so afraid of exposing ports. I have dozens of ports open on my server including SMTP, IMAP(S), HTTP(S), various game servers and don't see a problem with that.

This is what I don't do. Anything that needs real internet access like mail, raw web access, etc gets its own VPS where an attack will stay isolated, which is important as more self-hosted services are implemented using things like React and Next[1].

[0] https://github.com/fosrl/pangolin

[1] >>46136026

replies(1): >>edoceo+fa
◧◩
6. buildf+z6[view] [source] [discussion] 2026-01-11 23:05:39
>>sauerc+C1
Wireguard is _really_ simple in that sense though. If you're not doing anything complicated it's very easy to set up & maintain, and basically just works.

You can also buy quite a few routers now that have it built in, so you literally just tick a checkbox, then scan a QR code/copy a file to each client device, done.

replies(1): >>vladva+3l1
7. esseph+f9[view] [source] 2026-01-11 23:22:18
>>drnick+(OP)
With ports you have dozens or hundreds of applications and systems to attack.

With tailscale / zerotier / etc the connection is initiated from inside to facilitate NAT hole punching and work over CGNAT.

With wireguard that removes a lot of attack surfaces but wouldn't work if behind CGNAT without a relay box.

◧◩
8. edoceo+fa[view] [source] [discussion] 2026-01-11 23:28:42
>>heavys+D2
Is a container not enough isolation? I do SSH to the host (alt-port) and then services in containers (mail, http)
replies(2): >>heavys+yd >>Imusta+es
9. Schema+ub[view] [source] 2026-01-11 23:37:21
>>drnick+(OP)
If you expose ports, literally everything you are hosting and every plugin is an attack surface. Most of this stuff is built by single hobbiest devs on the weekend. You are also exposed to any security issues you make in your configuration. My first attempt self hosting I had redis compromised because I didn't realise I had exposed it to the internet with no password.

Behind a VPN your only attack surface is the VPN which is generally very well secured.

replies(2): >>sva_+Gc >>Jach+Eu
◧◩
10. sva_+Gc[view] [source] [discussion] 2026-01-11 23:45:48
>>Schema+ub
You exposed your redis publicly? Why?

Edit: This is the kind of service that you should only expose to your intranet, i.e. a network that is protected through wireguard. NEVER expose this publicly, even if you don't have admin:admin credtials.

replies(2): >>Schema+9e >>vladva+nl1
11. buran7+Rc[view] [source] 2026-01-11 23:48:01
>>drnick+(OP)
> I'd rather expose a Wireguard port and control my keys than introduce a third party like Tailscale.

Ideal if you have the resources (time, money, expertise). There are different levels of qualifications, convenience, and trust that shape what people can and will deploy. This defines where you draw the line - at owning every binary of every service you use, at compiling the binaries yourself, at checking the code that you compile.

> I am not sure why people are so afraid of exposing ports

It's simple, you increase your attack surface, and the effort and expertise needed to mitigate that.

> It's the way the Internet is meant to work.

Along with no passwords or security. There's no prescribed way for how to use the internet. If you're serving one person or household rather than the whole internet, then why expose more than you need out of some misguided principle about the internet? Principle of least privilege, it's how security is meant to work.

replies(3): >>lmm+eh >>prmous+jk1 >>observ+Yt2
12. zamada+pd[view] [source] 2026-01-11 23:51:10
>>drnick+(OP)
It's the way the internet was meant to work but it doesn't make it any easier. Even when everything is in containers/VMs/users, if you don't put a decent amount of additional effort into automatic updates and keeping that context hardened as you tinker with it it's quite annoying when it gets pwned.

There was a popular post less than a month ago about this recently >>46305585

I agree maintaining wireguard is a good compromise. It may not be "the way the internet was intended to work" but it lets you keep something which feels very close without relying on a 3rd party or exposing everything directly. On top of that, it's really not any more work than Tailscale to maintain.

replies(3): >>SoftTa+ce >>drnick+lg >>nobody+id3
◧◩◪
13. heavys+yd[view] [source] [discussion] 2026-01-11 23:51:46
>>edoceo+fa
Depends on your risk tolerance.

I personally wouldn't trust a machine if a container was exploited on it, you don't know if there were any successful container escapes, kernel exploits, etc. Even if they escaped with user permissions, that can fill your box with boobytraps if they have container-granted capabilities.

I'd just prefer to nuke the VPS entirely and start over than worry if the server and the rest of my services are okay.

replies(1): >>Imusta+Ts
14. Ethery+Yd[view] [source] 2026-01-11 23:55:46
>>drnick+(OP)
Every time I put anything anywhere on the open net, it gets bombarded 24/7 by every script kiddie, botnet group , and these days, AI company out there. No matter what I'm hosting, it's a lot more convenient to not have to worry about that even for a second.
replies(2): >>drnick+zf >>NewJaz+ew
◧◩◪
15. Schema+9e[view] [source] [discussion] 2026-01-11 23:57:14
>>sva_+Gc
I actually didn't know I had. At the time I didn't properly know how docker networking worked and I exposed redis to the host so my other containers could access it. And then since this was on a VPS with a dedicated IP, this made it exposed to the whole internet.

I now know better, but there are still a million other pitfalls to fall in to if you are not a full time system admin. So I prefer to just put it all behind a VPN and know that it's safe.

replies(1): >>drnick+Ai
◧◩
16. SoftTa+ce[view] [source] [discussion] 2026-01-11 23:57:22
>>zamada+pd
I just run an SSH server and forward local ports through that as needed. Simple (at least to me).
replies(3): >>zamada+Eq >>Imusta+4r >>Rebelg+QJ
17. Frotag+if[view] [source] 2026-01-12 00:05:30
>>drnick+(OP)
Speaking of Wireguard, my current topology has all peers talking to a single peer that forwards traffic between peers (for hole punching / peers with dynamic ips).

But some peers are sometimes on the same LAN (eg phone is sometimes on same LAN as pc). Is there a way to avoid forwarding traffic through the server peer in this case?

replies(5): >>woopto+sj >>Frotag+Sj >>megous+Gn >>torcet+Ei1 >>darkwa+jz1
◧◩
18. drnick+zf[view] [source] [discussion] 2026-01-12 00:08:07
>>Ethery+Yd
> Every time I put anything anywhere on the open net, it gets bombarded 24/7 by every script kiddie, botnet group , and these days, AI company out there

Are you sure that it isn't just port scanners? I get perhaps hundreds of connections to my STMP server every day, but they are just innocuous connections (hello, then disconnect). I wouldn't worry about that unless you see repeated login attempts, in which case you may want to deploy Fail2Ban.

replies(1): >>TheCra+Ps
◧◩
19. drnick+lg[view] [source] [discussion] 2026-01-12 00:15:04
>>zamada+pd
> There was a popular post less than a month ago about this recently >>46305585

This incident precisely shows that containerization worked as intended and protected the host.

replies(1): >>zamada+hq
◧◩
20. lmm+eh[view] [source] [discussion] 2026-01-12 00:21:10
>>buran7+Rc
> It's simple, you increase your attack surface, and the effort and expertise needed to mitigate that.

Sure, but opening up one port is a much smaller surface than exposing yourself to a whole cloud hosting company.

replies(3): >>apppli+tk >>xnickb+Sc1 >>mycall+N94
◧◩◪◨
21. drnick+Ai[view] [source] [discussion] 2026-01-12 00:33:04
>>Schema+9e
> but there are still a million other pitfalls to fall in to if you are not a full time system admin.

Pro tip: After you configure a new service, review the output of ss -tulpn. This will tell you what ports are open. You should know exactly what each line represents, especially those that bind on 0.0.0.0 or [::] or other public addresses.

The pitfall that you mentioned (Docker automatically punching a hole in the firewall for the services that it manages when an interface isn't specified) is discoverable this way.

replies(1): >>jsrcou+Dl
◧◩
22. woopto+sj[view] [source] [discussion] 2026-01-12 00:39:45
>>Frotag+if
Two separate WG profiles on the phone; one acting as a Proxy (which forwards everything), and one acting just as a regular VPN without forwarding.
◧◩
23. Frotag+Sj[view] [source] [discussion] 2026-01-12 00:42:53
>>Frotag+if
I guess I'm looking for wireguard's version of STUN. And now that I know what to google for, finally found some promising leads.

https://github.com/jwhited/wgsd

https://www.jordanwhited.com/posts/wireguard-endpoint-discov...

https://github.com/tjjh89017/stunmesh-go

24. epista+gk[view] [source] 2026-01-12 00:45:20
>>drnick+(OP)
I've managed wireguard in the past, and would never do it again. Generating keys, distributing them, configuring it all...... bleh!

Never again, it takes too much time and is too painful.

Certs from Tailscale are reason enough to switch, in my opinion!

The key with successful self hosting is to make it easy and fast, IMHO.

◧◩◪
25. apppli+tk[view] [source] [discussion] 2026-01-12 00:47:07
>>lmm+eh
Ah… I really could not disagree more with that statement. I know we don’t want to trust BigCorp and whatnot, but a single exposed port and an incomplete understanding of what you’re doing is really all it takes to be compromised.
replies(5): >>Schema+Pm >>refulg+XP >>justin+dQ >>johnis+s01 >>heavys+t01
26. alpn+Sk[view] [source] 2026-01-12 00:49:58
>>drnick+(OP)
> I'd rather expose a Wireguard port and control my keys than introduce a third party like Tailscale.

I’m working on a (free) service that lets you have it both ways. It’s a thin layer on top of vanilla WireGuard that handles NAT traversal and endpoint updates so you don’t need to expose any ports, while leaving you in full control of your own keys and network topology.

https://wireplug.org

replies(2): >>copper+Bl >>hamand+6n
◧◩
27. copper+Bl[view] [source] [discussion] 2026-01-12 00:55:41
>>alpn+Sk
Apparently I'm ignorant about Tailscale, bacause your service description is exactly what I thought Tailscale was.
replies(1): >>Schema+1n
◧◩◪◨⬒
28. jsrcou+Dl[view] [source] [discussion] 2026-01-12 00:55:47
>>drnick+Ai
Thanks, didn't know about this one.
◧◩◪◨
29. Schema+Pm[view] [source] [discussion] 2026-01-12 01:04:15
>>apppli+tk
Even if you understand what you are doing, you are still exposed to every single security bug in all of the services you host. Most of these self hosted tools have not been through 1% of the security testing big tech services have.
replies(3): >>johnis+z01 >>bjt123+CJ1 >>IgorPa+3j2
◧◩◪
30. Schema+1n[view] [source] [discussion] 2026-01-12 01:05:46
>>copper+Bl
The main issue people have with Tailscale is that it's a centralised service that isn't self hostable. The Tailscale server manages authentication and keeping track of your devices IPs.

Your eventual connection is direct to your device, but all the management before that runs on Tailscales server.

replies(1): >>TOMDM+Cv
◧◩
31. hamand+6n[view] [source] [discussion] 2026-01-12 01:06:23
>>alpn+Sk
This is very cool!

But I also think it's worth a mention that for basic "I want to access my home LAN" use cases you don't need P2P, you just need a single public IP to your lan and perhaps dynamic dns.

replies(2): >>kevin_+BI >>digiow+5K
◧◩
32. megous+Gn[view] [source] [discussion] 2026-01-12 01:10:46
>>Frotag+if
Have your network managing software setup a default route with a lower metric than wireguard default route based on wifi SSID. Can be done easily with systemd-networkd, because you can match .network file configurations on SSID. You're probably out of luck with this approach on network-setup-challenged devices like so called smart phones.
◧◩◪
33. zamada+hq[view] [source] [discussion] 2026-01-12 01:27:41
>>drnick+lg
It protected the host itself but it did not protect the server from being compromised and running malware, mining cryptocurrency.

Containerizing your publicly exposed service will also not protect your HTTP server from hosting malware or your SMTP server from sending SPAM, it only means you've protected your SMTP server from your compromised HTTP server (assuming you've even locked it down accurately, which is exactly the kind of thing people don't want to be worried about).

Tailscale puts the protection of the public portion of the story to a company dedicated to keeping that portion secure. Wireguard (or similar) limit the protection to a single service with low churn and minimal attack surface. It's a very different discussion than preventing lateral movement alone. And that all goes without mentioning not everyone wants to deal with containers in the first place (though many do in either scenario).

◧◩◪
34. zamada+Eq[view] [source] [discussion] 2026-01-12 01:30:34
>>SoftTa+ce
I do that as well, along with using sshd as a SOCKS proxy for web based stuff via Firefox, but it can be a bit of a pain to forward each service to each host individually if you have more than a few things going on - especially if you have things trying to use the same port and need to keep track of how you mapped it locally. It can also a lot harder to manage on mobile devices, e.g. say you have some media or home automation services - they won't be as easy to access via a single public SSH host via port forwarding (if at all) as a VPN would be, and wireguard is about as easy a personal VPN as there is.

That's where wg/Tailscale come in - it's just a traditional IP network at that point. Also less to do to shut up bad login attempts from spam bots and such. I once forgot to configure the log settings on sshd and ended up with GBs of logs in a week.

The other big upside (outside of not having a 3rd party) in putting in the slightly more effort to do wg/ssh/other personal VPN is the latency+bandwidth to your home services will be better.

replies(1): >>jmb99+rR
◧◩◪
35. Imusta+4r[view] [source] [discussion] 2026-01-12 01:33:28
>>SoftTa+ce
Also to Simon: I am not sure about how Iphone works but in android, you could probably use mosh and termux to then connect to the server as well and have the end result while not relying on third party (in this case tailscale)

I am sure there must be an Iphone app which could probably allow something like this too. I highly recommend more people take a look into such workflow, I might look into it more myself.

Tmate is a wonderful service if you have home networks behind nat's.

I personally like using the hosted instance of tmate (tmate.io) itself but It can be self hosted and is open source

Once again it has third party issue but luckily it can be self hosted so you can even have a mini vps on hetzner/upcloud/ovh and route traffic through that by hosting tmate there so ymmv

◧◩◪
36. Imusta+es[view] [source] [discussion] 2026-01-12 01:40:04
>>edoceo+fa
I understand where you are coming from but no, containers aren't enough isolation.

If you are running some public service, it might have bugs and of course we see some RCE issues as well or there can be some misconfig and containers by default dont provide enough security if an hacker tries to break in. Containers aren't secure in that sense.

Virtual machines are the intended use case for that. But they can be full of friction at time.

If you want something of a middle compromise, I can't recommend incus enough. https://linuxcontainers.org/incus/

It allows you to setup vm's as containers and even provides a web ui and provides the amount of isolation that you can trust (usually) everything on.

I'd say to not take chances with your home server because that server can be inside your firewall and can infect on a worst case scenario other devices but virtualization with things like incus or proxmox (another well respected tool) are the safest and provide isolation that you can trust with. I highly recommend that you should take a look at it if you deploy public serving services.

◧◩◪
37. TheCra+Ps[view] [source] [discussion] 2026-01-12 01:43:53
>>drnick+zf
Port scanners don't try to ssh into my server with various username/password combinations.

I prefer to hide my port instead of using F2B for a few reasons.

1. Log spam. Looking in my audit logs for anything suspicious is horrendous when there's just megs of login attempts for days.

2. F2B has banned me in the past due to various oopsies on my part. Which is not good when I'm out of town and really need to get into my server.

3. Zero days may be incredibly rare in ssh, but maybe not so much in Immich or any other relatively new software stack being exposed. I'd prefer not to risk it when simple alternatives exist.

Besides the above, using Tailscale gives me other options, such as locking down cloud servers (or other devices I may not have hardware control over) so that they can only be connected to, but not out of.

replies(1): >>pferde+vF1
◧◩◪◨
38. Imusta+Ts[view] [source] [discussion] 2026-01-12 01:44:20
>>heavys+yd
Yea I feel that too.

there are some well respected compute providers as well which you can use and for very low amount, you can sort of offload this worry to someone else.

That being said, VM themselves are good enough security box too. I consider running VM's even on your home server with public facing strategies usually allowable

replies(1): >>heavys+vO
◧◩
39. Jach+Eu[view] [source] [discussion] 2026-01-12 01:55:55
>>Schema+ub
I have a VPS with OVH, I put Tailscale on it and it's pretty cool to be able to install and access local (to the server) services like Prometheus and Grafana without having to expose them through the public net firewall or mess with more apache/nginx reverse proxies. (Same for individual services' /metrics endpoints that are served with a different port.)
◧◩◪◨
40. TOMDM+Cv[view] [source] [discussion] 2026-01-12 02:01:46
>>Schema+1n
Isn't this what headscale is for?
◧◩
41. NewJaz+ew[view] [source] [discussion] 2026-01-12 02:06:13
>>Ethery+Yd
This is a good reason not to expose random services, but a wireguard endpoint simply won't respond at all if someone hits it with the wrong key. It is better even than key based ssh.
◧◩◪
42. kevin_+BI[view] [source] [discussion] 2026-01-12 03:38:02
>>hamand+6n
A public IP and DDNS can be impossible behind CGNAT. A VPN link to a VPS eliminates that problem.
replies(2): >>digiow+fK >>hamand+CM
43. digiow+pJ[view] [source] 2026-01-12 03:44:59
>>drnick+(OP)
A mesh-type wireguard network is rather annoying to set up if you have more than a few devices, and a hub-type network (on a low powered router) tends to be so slow that it necessitates falling back to alternate interfaces when you're at home. Tailscale does away with all this and always uses direct connections. In principle it is more secure than hosting it on some router without disk encryption (as the keys can be extracted via a physical attack, and a pwned router can also eavesdrop on traffic).
◧◩◪
44. Rebelg+QJ[view] [source] [discussion] 2026-01-12 03:48:15
>>SoftTa+ce
How many random people do you have hitting port 22 on a given day?
replies(2): >>SoftTa+NN >>gsich+Y81
◧◩◪
45. digiow+5K[view] [source] [discussion] 2026-01-12 03:49:43
>>hamand+6n
Where will you host the wg endpoint to open up?

- Each device? This means setting up many peers on each of your devices

- Router/central server? That's a single point of failure, and often a performance bottleneck if you're on LAN. If that's a router, the router may be compromised and eavesdrop on your connections, which you probably didn't secure as hard because it's on a VPN.

Not to mention DDNS can create significant downtime.

Tailscale fails over basically instantly, and is E2EE, unlike the hub setup.

replies(1): >>hamand+5M
◧◩◪◨
46. digiow+fK[view] [source] [discussion] 2026-01-12 03:51:39
>>kevin_+BI
The VPS (using wg-easy or similar solutions) will be able to decrypt traffic as it has all the keys. I think most people self-hosting are not fine with big cloud eavesdropping on their data.

Tailscale really is superior here if you use tailnet lock. Everything always stays encrypted, and fails over to their encrypted relays if direct connection is not possible for various reasons.

◧◩◪◨
47. hamand+5M[view] [source] [discussion] 2026-01-12 04:10:34
>>digiow+5K
To establish a wg connection, only one node needs a public IP/port.

> Router/central server? That's a single point of failure

Your router is a SPOF regardless. If your router goes down you can't reach any nodes on your LAN, Tailscale or otherwise. So what is your point?

> If that's a router, the router may be compromised and eavesdrop on your connections, which you probably didn't secure as hard because it's on a VPN.

Secure your router. This is HN, not advice for your mom.

> Not to mention DDNS can create significant downtime.

Set your DNS ttl correctly and you should experience no more than a minute of downtime whenever your public IP changes.

replies(1): >>digiow+WM
◧◩◪◨
48. hamand+CM[view] [source] [discussion] 2026-01-12 04:15:19
>>kevin_+BI
When I said "you just need a single public IP" I figured it was clear that I wasn't claiming this works for people who don't have a public IP.
◧◩◪◨⬒
49. digiow+WM[view] [source] [discussion] 2026-01-12 04:17:24
>>hamand+5M
> one node needs a public IP/port

A lot of people are behind CGNAT or behind a non-configurable router, which is an abomination.

> Secure your router

A typical router cannot be secured against physical access, unlike your servers which can have disk encryption.

> Your router is a SPOF regardless

Tailscale will keep your connection over a downstream switch, for example. It will not go through the router if it doesn't have to. If you use it for other usecases like kdeconnect synchronizing clipboard between phone and laptop, that will also stay up independent of your home router.

◧◩◪◨
50. SoftTa+NN[view] [source] [discussion] 2026-01-12 04:26:19
>>Rebelg+QJ
Dozens. Maybe hundreds. But they can't get in as they don't have the key.
◧◩◪◨⬒
51. heavys+vO[view] [source] [discussion] 2026-01-12 04:33:44
>>Imusta+Ts
Yeah, I only run very little on VPS, so this is practically free to me. Everything else I host at home behind Wireguard w/ Pangolin.
◧◩◪◨
52. refulg+XP[view] [source] [discussion] 2026-01-12 04:52:21
>>apppli+tk
This felt like it didn’t do your aim justice, “$X and an incomplete understanding of what you’re doing is all it takes to be compromised” applies to many $X, including Tailscale.
◧◩◪◨
53. justin+dQ[view] [source] [discussion] 2026-01-12 04:56:04
>>apppli+tk
Using a BigCorp service also has risks. You are exposed to many of their vulnerabilities, that’s why our information ends up in data leaks.
◧◩◪◨
54. jmb99+rR[view] [source] [discussion] 2026-01-12 05:10:14
>>zamada+Eq
> and wireguard is about as easy a personal VPN as there is.

I would argue OpenVPN is easier. I currently run both (there are some networks I can’t use UDP on, and I haven’t bothered figuring out how to get wireguard to work with TCP), and the OpenVPN initial configuration was easier, as is adding clients (DHCP, pre-shared cert+username/password).

This isn’t to say wireguard is hard. But imo OpenVPN is still easier - and it works everywhere out of the box. (The exception is networks that only let you talk on 80 and 443, but you can solve that by hosting OpenVPN on 443, in my experience.)

This is all based on my experience with opnsense as the vpn host (+router/firewall/DNS/DHCP). Maybe it would be a different story if I was trying to run the VPN server on a machine behind my router, but I have no reason to do so - I get at least 500Mbps symmetrical through OpenVPN, and that’s just the fastest network I’ve tested a client on. And even if that is the limit, that’s good enough for me, I don’t need faster throughput on my VPN since I’m almost always going to be latency limited.

55. byb+nS[view] [source] 2026-01-12 05:21:09
>>drnick+(OP)
My biggest source of paranoia is my open home assistant port, while it requires a strong password and is TLS-encrypted, I'm sure that one day someone will find an exploit letting them in, and then the attacker will rapidly turn my smart home devices on and off until they break/overheat the power components until they start a fire and burn down my house.
replies(2): >>seszet+aT >>wao0uu+Ma1
◧◩
56. seszet+aT[view] [source] [discussion] 2026-01-12 05:28:16
>>byb+nS
That seems like a very irrational fear. Attackers don't go around trying to break into Home Assistant to turn the lights on at some stranger's house.

There's also no particular reason to think Home Assistant's authentication has to have a weakness point.

And your devices are also unlikely to start a fire just by being turned on and off, if that's your fear you should replace them at once because if they catch fire it doesn't matter if it's an attacker or yourself turning them on and off.

replies(1): >>timc3+5e1
57. catlif+EU[view] [source] 2026-01-12 05:43:24
>>drnick+(OP)
Honestly the managed PKI is the main value-add from Tailscale over plain wireguard.

I’ve been meaning to give this a try this winter: https://github.com/juanfont/headscale

◧◩◪◨
58. johnis+s01[view] [source] [discussion] 2026-01-12 06:39:54
>>apppli+tk
Same applies to Tailscale. A Tailscale client, coordination plane vulnerability, or incomplete understanding of their trust model is also all it takes. You are adding attack surface, not removing it.

If your threat model includes "OpenSSH might have an RCE" then "Tailscale might have an RCE" belongs there too.

If you are exposing a handful of hardened services on infrastructure you control, Tailscale adds complexity for no gain. If you are connecting machines across networks you do not control, or want zero-config access to internal services, then I can see its appeal.

replies(1): >>b112+OB1
◧◩◪◨
59. heavys+t01[view] [source] [discussion] 2026-01-12 06:40:12
>>apppli+tk
Someone would need your 256-bit key to do anything to an exposed Wireguard port.
replies(1): >>eqvino+fg1
◧◩◪◨⬒
60. johnis+z01[view] [source] [discussion] 2026-01-12 06:40:45
>>Schema+Pm
Now you are exposed to every security bug in Tailscale's client, DERP relays, and coordination plane, plus you have added a trust dependency on infrastructure you do not control. The attack surface did not shrink, it shifted.
replies(1): >>Schema+OK3
61. Batter+M01[view] [source] 2026-01-12 06:42:18
>>drnick+(OP)
Which router OS are you using? I have openwrt + daily auto updates configure with a couple of packages blacklisted that I manually update now & then.
62. PeterS+Q31[view] [source] 2026-01-12 07:09:17
>>drnick+(OP)
Defence in dept. You have a layer of security even before a packet reaches your port. I might have a zero day on your service, but now I also need to breach your reverse proxy to get to it.
◧◩◪◨
63. gsich+Y81[view] [source] [discussion] 2026-01-12 08:02:35
>>Rebelg+QJ
change port.
replies(4): >>sally_+Yf1 >>Maledi+tz1 >>lee_ar+SB1 >>Rebelg+o83
◧◩
64. wao0uu+Ma1[view] [source] [discussion] 2026-01-12 08:16:55
>>byb+nS
Why expose HA to the internet? I’m genuinely curious.
65. nialv7+Mc1[view] [source] 2026-01-12 08:33:23
>>drnick+(OP)
> introduce a third party like Tailscale.

Well just use headscale and you'll have control over everything.

replies(1): >>vladva+sk1
◧◩◪
66. xnickb+Sc1[view] [source] [discussion] 2026-01-12 08:35:18
>>lmm+eh
Headscale is a thing
replies(1): >>prmous+gl1
◧◩◪
67. timc3+5e1[view] [source] [discussion] 2026-01-12 08:43:03
>>seszet+aT
People are putting their whole infrastructure onto HA - cars, Apple/Google/other accounts, integrations to grid companies, managing ESP software etc..

I think that has more potential for problems than turning lights on and off and warrants strong security.

68. arjie+ve1[view] [source] 2026-01-12 08:47:25
>>drnick+(OP)
I used to do that, but Tailscale with your own headscale server is pretty snazzy. The other thing is with cloudflared running your server doesn't have to be Internet-routable. Everything is tunneled.
◧◩◪◨⬒
69. sally_+Yf1[view] [source] [discussion] 2026-01-12 08:59:02
>>gsich+Y81
Underrated reply - I randomize the default ports everywhere I can, really cuts down on brute force/credential stuffing attempts.
◧◩◪◨⬒
70. eqvino+fg1[view] [source] [discussion] 2026-01-12 09:00:39
>>heavys+t01
In theory.

In the same theory, someone would need your EC SSH key to do anything with an exposed SSH port.

Practice is a separate question.

replies(2): >>bjt123+kJ1 >>JasonA+nK1
71. eqvino+Xg1[view] [source] 2026-01-12 09:06:30
>>drnick+(OP)
> I am not sure why people are so afraid of exposing ports.

Similar here, I only build & run services that I trust myself enough to run in a secure manner by themselves. I still have a VPN for some things, but everything is built to be secure on its own.

It's quite a few services on my list at this point and really don't want to have a break in one thing lead to a break in everything. It's always possible to leave a hole in one or two things by accident.

On the other side this also means I have a Postgres instance with TCP/5432 open to the internet - with no ill effects so far, and quite a bit of trust it'll remain that way, because I understand its security properties and config now.

72. twelve+Zg1[view] [source] 2026-01-12 09:06:38
>>drnick+(OP)
i tried wireguard and ended up giving up on it, too many isps just block it here or use some kind of tech that fucks with it and i have no idea why, i couldn't connect to my home network because it was blocked on whatever random wifi i was on

the new problem is now my isp uses cgnat and there's no easy way around it

tailscale avoids all that, if i wanted more control i'd probably use headscale rather than bother with raw wireguard

replies(1): >>pferde+8G1
◧◩
73. torcet+Ei1[view] [source] [discussion] 2026-01-12 09:21:10
>>Frotag+if
The way I do it is to have two different first level domains. Let's say:

- w for the wireguard network. - h for the home network.

Nothing fancy, just populate the /etc/hosts on every machine with these names.

Now, it's up to me to connect to my server1.h or server1.w depending whether I am at home or somewhere else.

◧◩
74. prmous+jk1[view] [source] [discussion] 2026-01-12 09:35:49
>>buran7+Rc
> Ideal if you have the resources (time, money, expertise). There are different levels of qualifications, convenience, and trust that shape what people can and will deploy. This defines where you draw the line - at owning every binary of every service you use, at compiling the binaries yourself, at checking the code that you compile.

Wireguard is distributed by distros in official packages. You don't need time, money and expertise to setup unattended upgrades with auto reboot on a debian or redhat based distro. At least it is not more complicated than setting an AI agent.

replies(1): >>madeof+Er1
◧◩
75. vladva+sk1[view] [source] [discussion] 2026-01-12 09:36:53
>>nialv7+Mc1
That just moves the problem, since headscale will require a server you manage with an open port.

Sure, tailscale is nice, but from an open-port-on-the-net perspective it's probably a bit below just opening wireguard.

◧◩◪
76. vladva+3l1[view] [source] [discussion] 2026-01-12 09:41:42
>>buildf+z6
This may come with its own limitations, though.

My ISP-provided router (Free, in France) has WG built-in. But other than performance being abysmal, its main pain point is not supporting subnet routing.

So if all you want is to connect your phone / laptop while away to the local home network, it's fine. If you want to run a tunnel between two locations with multiple IPs on the remote side, you're SoL.

◧◩◪◨
77. prmous+gl1[view] [source] [discussion] 2026-01-12 09:43:07
>>xnickb+Sc1
Headscale is only really useful if you need to manage multiple users and/or networks. If you only have one network you want to have access to and a small number of users/devices it only increases the attack surface over having one wireguard listening because it has more moving parts.
replies(2): >>mfru+kn1 >>ErneX+Jq1
◧◩◪
78. vladva+nl1[view] [source] [discussion] 2026-01-12 09:43:23
>>sva_+Gc
Isn't GP's point inadvertently exposing stuff? Just mention docker networking on HN and you'll get threadfuls of comments on how it helpfully messes with your networking without telling you. Maybe redis does the same?

I mitigate this by having a dedicated machine on the border that only does routing and firewalling, with no random services installed. So anything that helpfully opens ports on internal vms won't automatically be reachable from the outside.

◧◩◪◨⬒
79. mfru+kn1[view] [source] [discussion] 2026-01-12 09:59:38
>>prmous+gl1
I think the most important thing about Tailscale is how accessible it is. Is there a GUI for Wireguard that lets me configure my whole private network as easily as Tailscale does?
80. pacija+Yo1[view] [source] 2026-01-12 10:13:40
>>drnick+(OP)
Of course. A port is a door. If service listening on a port is secure and properly configured (e.g. ssh), whole Internet can bang on it all day every day, they won't let through without proper key. Same for imap, xmpp or any othet service.

But what can you expect from people who provide services but won't even try to understand how they work and how they are configured as it's 'not fun enough', expecting claude code to do it right for them.

Asking AI to do thing you did 100 times before is OK I guess. Asking AI to do thing you never did and have no idea how it's properly done - not so much I'd say. But this guy obviously does not signal his sysadmin skills but his AI skills. I hope it brings him the result he aimed for.

◧◩◪◨⬒
81. ErneX+Jq1[view] [source] [discussion] 2026-01-12 10:27:56
>>prmous+gl1
I set it up to open the port for few secs via port knocking. Plus another script that runs on the server that opens connections to my home ip addr doing reverse lookup to a domain my router updates via dyndns so devices at my home don’t need to port knock to connect.
◧◩◪
82. madeof+Er1[view] [source] [discussion] 2026-01-12 10:34:03
>>prmous+jk1
What about SMTP, IMAP(S), HTTP(S), various game servers parent mentioned have open ports for?

Having a single port open for VPN access seems okay for me. That's what I did, But I don't want an "etc" involved in what has direct access to hardware/services in my house from outside.

replies(1): >>bjt123+WJ1
83. rubatu+fs1[view] [source] 2026-01-12 10:38:26
>>drnick+(OP)
Yggdrasil network is probably the future. At Hoppy Network we're about to release private yggdrasil relays as a service so you don't get spammed with "WAN" traffic. With Yggdrasil, IP addresses aren't allocated by an authority - they are owned and proven by public key cryptography.
◧◩
84. darkwa+jz1[view] [source] [discussion] 2026-01-12 11:34:26
>>Frotag+if
I don't fully understand your topology use case. You have different peers that are "road-warriors" and that sometimes happen to be both on the same LAN which is not your home LAN, and need to speak the one to the other? And I guess you are connecting to the other peer via DNS, so your DNS record always points to the Wireguard-provided IP?
◧◩◪◨⬒
85. Maledi+tz1[view] [source] [discussion] 2026-01-12 11:35:54
>>gsich+Y81
or keep the port and move to IPv6 only.
86. gambit+mA1[view] [source] 2026-01-12 11:43:14
>>drnick+(OP)
"Back in the day"(just few years ago) I used to expose a port for RDP on my router, on a non-standard port. Typically it would be fine and quiet for a few weeks, then I assume some automatic scanner would find it and from that point onwards I could see windows event log reporting a log in attempt every second, with random login/password combinations, clearly just looking for something that would work. I would change the port and the whole dance would repeat all over again. Tens of thousands of login attempts every day, all year round. I used to just ignore it, since clearly they weren't going to log in with those random attempts, but eventually just switched to OpenVPN.

So yeah, the lesson there is that if you have a port open to the internet, someone will scan it and try to attack it. Maybe not if it's a random game server, but any popular service will get under attack.

replies(1): >>drnick+xs2
◧◩◪◨⬒
87. b112+OB1[view] [source] [discussion] 2026-01-12 11:54:11
>>johnis+s01
There was a time when people were allowed to drive cars unlicensed.

These days, that seems insane.

As the traffic grew, as speeds increased, licensing became necessary.

I think, these days, we're almost into that category. I don't say this happily. But having unrestricted access seems like an era coming to an end.

I realise this seems unworkable. But so was the idea of a driver's license. Sometimes society and safety comes first.

I'm willing to bet that in under a decade, something akin to this will happen.

replies(3): >>yreg+CV1 >>mpalme+tZ1 >>sejje+9j2
◧◩◪◨⬒
88. lee_ar+SB1[view] [source] [discussion] 2026-01-12 11:55:10
>>gsich+Y81
After years of cargo-culting this advice—"run ssh on a nonstandard port"—I gave up and reverted to 22 because ssh being on nonstandard ports didn't change the volume of access attempts in the slightest. It was thousands per day on port 22, and thousands per day on port anything-else-i-changed-it-to.

It's worth an assessment of what you _think_ running ssh on a nonstandard port protects you against, and what it's actually doing. It won't stop anything other than the lightest and most casual script-based shotgun attacks, and it won't help you if someone is attempting to exploit an actual-for-real vuln in the ssh authentication or login process. And although I'm aware the plural of "anecdote" isn't "data," it sure as hell didn't reduce the volume of login attempts.

Public key-only auth + strict allowlists will do a lot more for your security posture. If you feel like ssh is using enough CPU rejecting bad login attempts to actually make you notice, stick it behind wireguard or set up port-knocking.

And sure, put it on a nonstandard port, if it makes you feel better. But it doesn't really do much, and anyone hitting your host up with censys.io or any other assessment tool will see your nonstandard ssh port instantly.

replies(2): >>wasmit+BI1 >>gsich+5p7
◧◩◪◨
89. pferde+vF1[view] [source] [discussion] 2026-01-12 12:18:27
>>TheCra+Ps
You can tweak rate thresholds for F2B, so that it blocks the 100-attempts-per-second attackers, but doesn't block your three-attempts-per-minute manual fumbling.
replies(1): >>TheCra+RH1
◧◩
90. pferde+8G1[view] [source] [discussion] 2026-01-12 12:23:08
>>twelve+Zg1
And there's nothing wrong with it. That is what wireguard is meant to be - a rock-solid secure tunneling implementation that's easy to build higher-level solutions on.
◧◩◪◨⬒
91. TheCra+RH1[view] [source] [discussion] 2026-01-12 12:33:07
>>pferde+vF1
I know this. But I don't like that they still get to try at least once, and there's still the rest of my list.
92. inapis+kI1[view] [source] 2026-01-12 12:37:20
>>drnick+(OP)
Skill issue. Not to mention the ongoing effort required to maintain and secure the service. But even before that, a lot of people are behing CGNAT. Tailscale makes punching a hole through that very easy. Otherwise you have to run your own relay server somewhere in the cloud.
◧◩◪◨⬒⬓
93. wasmit+BI1[view] [source] [discussion] 2026-01-12 12:39:26
>>lee_ar+SB1
Conversely, what do you gain by using a standard port?

Now, I do agree a non-standard port is not a security tool, but it doesn't hurt running a random high-number port.

replies(1): >>lee_ar+QI1
◧◩◪◨⬒⬓⬔
94. lee_ar+QI1[view] [source] [discussion] 2026-01-12 12:41:15
>>wasmit+BI1
> Conversely, what do you gain by using a standard port?

One less setup step in the runbook, one less thing to remember. But I agree, it doesn't hurt! It just doesn't really help, either.

◧◩◪◨⬒⬓
95. bjt123+kJ1[view] [source] [discussion] 2026-01-12 12:43:42
>>eqvino+fg1
SSH is TCP though and the outside world can initiate a handshake, the point being that wireguard silently discards unauthenticated traffic - there's no way they can know the port is open for listening.
replies(1): >>eqvino+CJ4
◧◩◪◨⬒
96. bjt123+CJ1[view] [source] [discussion] 2026-01-12 12:45:41
>>Schema+Pm
How would another service be impacted by an open UDP port on a server that the service is not using?
◧◩◪◨
97. bjt123+WJ1[view] [source] [discussion] 2026-01-12 12:48:05
>>madeof+Er1
How does wireguard interfere with email?
◧◩◪◨⬒⬓
98. JasonA+nK1[view] [source] [discussion] 2026-01-12 12:51:12
>>eqvino+fg1
Not even remotely comparable.

Wireguard is explicitly designed to not allow unauthenticated users to do anything, whereas SSH is explicitly designed to allow unauthenticated users to do a whole lot of things.

replies(1): >>eqvino+IJ4
99. abc123+SK1[view] [source] 2026-01-12 12:53:59
>>drnick+(OP)
This is the truth. I've been exposing 22 and 80 for decades, and nothing has happened. The ones I know who had something bad happen to them exposed proprietary services or security nightmares like wordpress.
◧◩◪◨⬒⬓
100. yreg+CV1[view] [source] [discussion] 2026-01-12 13:47:07
>>b112+OB1
Can you be more concrete what do you predict?
◧◩◪◨⬒⬓
101. mpalme+tZ1[view] [source] [discussion] 2026-01-12 14:05:33
>>b112+OB1
I'll take this to mean that you think arbitrary access to a computer's capabilities will require licensure, in which case I think this is a bad metaphor.

The point of a driver's license is that driving a ton of steel around at >50mph presents risk of harm to others.

Not knowing how to use a computer - driving it "poorly" - does not risk harm to others. Why does it merit restriction, based on the topic of this post?

replies(1): >>oarsin+y12
◧◩◪◨⬒⬓⬔
102. oarsin+y12[view] [source] [discussion] 2026-01-12 14:15:07
>>mpalme+tZ1
Your unpatched Wordpress install is someone else’s botnet host, forming part of the “distributed” in DDoS, which harms others.

It’s why Cloudflare exists, which in itself is another form of harm, in centralising a decentralised network.

replies(2): >>johnis+Y32 >>mpalme+oL2
◧◩◪◨⬒⬓⬔⧯
103. johnis+Y32[view] [source] [discussion] 2026-01-12 14:26:51
>>oarsin+y12
The argument is self-defeating:

1. "Unpatched servers become botnet hosts" - true, but Tailscale does not prevent this. A compromised machine on your tailnet is still compromised. The botnet argument applies regardless of how you access your server.

2. Following this logic, you would need to license all internet-connected devices: phones, smart TVs, IoT. They get pwned and join botnets constantly. Are we licensing grandma's router?

3. The Cloudflare point undermines the argument: "botnets cause centralization (Cloudflare), which is harm", so the solution is... licensing, which would centralize infrastructure further? That is the same outcome being called harmful.

4. Corporate servers get compromised constantly. Should only "licensed" corporations run services? They already are, and they are not doing better.

Back to the topic: I have no clue what you think Tailscale is, but it does increase security, only convenience.

replies(2): >>johnis+yQ2 >>oarsin+FU2
◧◩◪◨⬒
104. IgorPa+3j2[view] [source] [discussion] 2026-01-12 15:39:24
>>Schema+Pm
For every remote exploit and cloud-wide outage that has happened over the past 20 years my sshd that is exposed to the internet on port 22 has had zero of either. There were a couple of major OpenSSH bugs but my auto updater took care of that before I saw it on the news.

You can trust BugCorp all you want but there are more sshd processes out there than tailnets and the scrutiny is on OpenSSH. We are not comparing sshd to say WordPress here. Maybe when you don’t over engineer a solution you don’t need to spend 100x the resources auditing it…

replies(1): >>lillec+VY2
◧◩◪◨⬒⬓
105. sejje+9j2[view] [source] [discussion] 2026-01-12 15:39:45
>>b112+OB1
If I threw my license away tomorrow, what would be insane about me driving without a license?

Are you saying "unlicensed" where you mean "untrained?"

replies(1): >>b112+LI2
106. 1vuio0+Zq2[view] [source] 2026-01-12 16:10:24
>>drnick+(OP)
"I'd rather expose a Wireguard port and control my keys than introduce a third party like Tailscale."

It's always perplexing to me how HN commenters replying to a comment with a statement like this, e.g., something like "I prefer [choice with some degree of DIY]", will try to "argue" against it

The "arguments" are rarely, "I think that is a poor choice because [list of valid reasons]"

Instead the responses are something like, "Most people...". In other words, a nonsensical reference to other computer users

It might make sense for a commercial third party to care about what other computer users do, but why should any individual computer user care what others do (besides genuine curiosity or commercial motive)

For example, telling family, friends, colleagues how you think they should use their computers usually isn't very effective. They usually do not care about your choices or preferences. They make their own

Would telling strangers how to use their computers be any more effective

Forum commenters often try to tell strangers what to do, or what not to do

But every computer user is free to make their own choices and pursue their own preferences

NB. I am not commenting on the open ports statement

replies(1): >>1vuio0+7g4
107. zobzu+5r2[view] [source] 2026-01-12 16:10:44
>>drnick+(OP)
put simply and fairly bluntly: because they do not know how things work.

but actually it's worse. this is HN - supposedly, most commenters are curious by nature and well versed into most basic computer stuff. in practice, it's slowly less and less the case.

worse: what is learned and expected is different from what you'd think.

for example, separating service users sure is better than nothing, but the OS attack surface as a local user is still huge, hence why we use sandboxes, which really are just OS level firewalls to reduce the attack surface.

the open port attack surface isnt terrible though: you get a bit more of the very well tested tcp/ip stack and up to 65k ports all doing the exact same thing, not terrible at all.

Now, add to it "AI" which can automatically regurgitate and implement whatever reddit and stack overflow says.. it makes for a fun future problem - such forums will end up with mostly non-new AI content (new problem being solved will be a needle in the haystack) - and - users will have learned that AI is always right no matter what it decides (because they don't know any better and they're being trained to blindly trust it).

Heck, i predict there will be a chat, where a bunch of humans will argue very strongly that an AI is right while its blatantly wrong, and some will likely put their life on the line to defend it.

Fun times ahead. As for my take: humans _need_ learning to live, but are lazy. Nature fixes itself.

◧◩
108. drnick+xs2[view] [source] [discussion] 2026-01-12 16:17:09
>>gambit+mA1
> someone will scan it and try to attack it. Maybe not if it's a random game server, but any popular service will get under attack.

That's fine, it's only people knocking on a closed door. You cannot host things such as email or HTTP without open ports, your service needs to be publicly accessible by definition.

◧◩
109. observ+Yt2[view] [source] [discussion] 2026-01-12 16:21:17
>>buran7+Rc
This is where using frontier models can help - You can have them assist with configuring and operating wireguard nearly as easily as you can have them walk you through Tailscale, eliminating the need for a middleman.

The mid-level and free tiers aren't necessarily going to help, but the Pro/Max/Heavy tier can absolutely make setting up and using wireguard and having a reasonably secure environment practical and easy.

You can also have the high tier models help with things like operating a FreePBX server and VOIP, manage a private domain, and all sorts of things that require domain expertise to do well, but are often out of reach for people who haven't gotten the requisite hands on experience and training.

I'd say that going through the process of setting up your self hosting environment, then after the fact asking the language model "This is my environment: blah, a, b, c, x, y, z, blah, blah. What simple things can I do to make it more secure?"

And then repeating that exercise - create a chatgpt project, or codex repo, or claude or grok project, wherein you have the model do a thorough interrogation of you to lay out and document your environment. With that done, you condense it to a prompt, and operate within the context where your network is documented. Then you can easily iterate and improve.

Something like this isn't going to take more than a few 15 minute weekend sessions each month after initially setting it up, and it's going to be a lot more secure than the average, completely unattended, default settings consumer network.

You could try to yolo it with Operator or an elevated MCP interface with your system, but the point is, those high tier models are sufficiently good enough to make significant self hosting easily achievable.

110. dpacmi+9z2[view] [source] 2026-01-12 16:42:02
>>drnick+(OP)
Tailscale works behind NAT, wireguard does not unless you also have a publicly reachable relay server which introduces its own maintenance headaches and cost.
◧◩◪◨⬒⬓⬔
111. b112+LI2[view] [source] [discussion] 2026-01-12 17:22:52
>>sejje+9j2
The point of massive fines, and in some cases jailtime for driving without a license is control.

If someone breaks regs, you want to be able to levy fines or jail. If they do it a lot, you want an inability to drive at all.

It's about regulating poor drivers. And yes, initially vetting a driver too.

replies(1): >>sejje+dO2
◧◩◪◨⬒⬓⬔⧯
112. mpalme+oL2[view] [source] [discussion] 2026-01-12 17:36:19
>>oarsin+y12
I would detest living in a world where regulators assign liability in this way, it sounds completely ridiculous. On a level with "speech is violence".
◧◩◪◨⬒⬓⬔⧯
113. sejje+dO2[view] [source] [discussion] 2026-01-12 17:50:43
>>b112+LI2
I don't really know any adults who don't drive, and nobody ever told me they weren't capable.

I don't think it's about driving ability, besides the initial vetting.

replies(3): >>johnis+KQ2 >>b112+vp3 >>lmm+Va4
◧◩◪◨⬒⬓⬔⧯▣
114. johnis+yQ2[view] [source] [discussion] 2026-01-12 18:02:17
>>johnis+Y32
I meant: does not increase security.
◧◩◪◨⬒⬓⬔⧯▣
115. johnis+KQ2[view] [source] [discussion] 2026-01-12 18:03:18
>>sejje+dO2
I am ~30 years old and I do not drive. In fact, I cannot drive.
◧◩◪◨⬒⬓⬔⧯▣
116. oarsin+FU2[view] [source] [discussion] 2026-01-12 18:24:01
>>johnis+Y32
The comment I was replying to was claiming that using your computer 'poorly' does not harm others. I was simply refuting that. Having spent the last two decades null routing customer servers when they decide to join an attack, this isn't theoretical.

As an aside, I dislike tailscale, and use wireguard directly.

Back to the topic: Your connected device can harm others if used poorly. I am not proposing licensing requirements.

◧◩◪◨⬒⬓
117. lillec+VY2[view] [source] [discussion] 2026-01-12 18:43:14
>>IgorPa+3j2
If you only expose SSH then you're fine, but if you're deploying a bunch of WebApps you might not want them accessible on the internet.

The few things I self host I keep out in the open. etcd, Kubernetes, Postgres, pgAdmin, Grafana and Keycloak but I can see why someone would want to hide inside a private network.

replies(1): >>IgorPa+ul3
◧◩◪◨⬒
118. Rebelg+o83[view] [source] [discussion] 2026-01-12 19:32:29
>>gsich+Y81
I've tried using a nonstandard port but I still see a bunch of IPs getting banned, with the added downside of if I'm on the go sometimes I don't remember the port
◧◩
119. nobody+id3[view] [source] [discussion] 2026-01-12 19:56:04
>>zamada+pd
>It's the way the internet was meant to work but it doesn't make it any easier. Even when everything is in containers/VMs/users, if you don't put a decent amount of additional effort into automatic updates and keeping that context hardened as you tinker with it it's quite annoying when it gets pwned.

As someone who spent decades implementing and securing networks and internet-facing services for corporations large and small as well as self-hosting my own services for much of that time, the primary lesson I've learned and tried to pass on to clients, colleagues and family is:

   If you expose it to the Internet, assume it will be pwned at some point.
No, that's not universally true. But it's a smart assumption to make for several reasons:

1. No software is completely bug free and those bugs can expose your service(s) to compromise;

2. Humans (and their creations) are imperfect and will make mistakes -- possibly exposing your service(s) to compromise;

3. Bad actors, ranging from marginally competent script kiddies to master crackers with big salaries and big budgets from governments and criminal organizations are out there 24x7 trying to break into whatever systems they can reach.

The above applies just as much to tailscale or wireguard as it does to ssh/http(s)/imap/smtp/etc.

I'll say it again as it's possibly the most important concept related to exposing anything:

   If you expose it to the Internet, assume that, at some point, it will be 
   compromised and plan accordingly.
If you're lucky (and good), it may not happen while you're responsible for it, but assuming it will and having a plan to mitigate/control an "inevitable" compromise will save your bacon much better than just relying on someone else's code to never break or have bugs which put you at risk.

Want to expose ports? Use Wireguard? Tailscale? HAProxy? Go for it.

And do so in ways that meet your requirements/use cases. But don't forget to at least think (better yet script/document) about what you will do if your services are compromised.

Because odds are that one day they will.

◧◩◪◨⬒⬓⬔
120. IgorPa+ul3[view] [source] [discussion] 2026-01-12 20:31:07
>>lillec+VY2
Yeah any web app that is meant to be private is not something I allow to be accessible from the outside world. Easy enough to do this with ssh tunnels OR Wireguard, both of which I trust a lot more than anything that got VC funding. Plus that way any downtime is my own doing and in my control to fix.
◧◩◪◨⬒⬓⬔⧯▣
121. b112+vp3[view] [source] [discussion] 2026-01-12 20:50:39
>>sejje+dO2
From the perspective of those writing the regs, speeding, running lights, driving carelessly or dangerously (all fines or crimes here) are indeed indicators of safe driving or not.

Understand, I am not advocating this. I said I did not like it. Neirher of those statements have anything totk do with whether I think it will come to pass, or not.

◧◩◪◨⬒⬓
122. Schema+OK3[view] [source] [discussion] 2026-01-12 23:09:21
>>johnis+z01
I run the tailscale client in it's own LXC on Proxmox. Which connects to nginx proxy manager also in it's own LXC, which then connects to Nextcloud configured with all the normal features (Passkeys, HTTPS, etc). The Nextcloud VM uses full disk encryption as well.

Any one of those components might be exploitable, but to get my data you'd have to exploit all of them.

replies(1): >>johnis+oR3
◧◩◪◨⬒⬓⬔
123. johnis+oR3[view] [source] [discussion] 2026-01-13 00:13:19
>>Schema+OK3
You do not need to exploit each layer because you traverse them. Tailnet access (compromised device, account, Tailscale itself) gets you to nginx. Then you only need to exploit Nextcloud.

LXC isolation protects Proxmox from container escapes, not services from each other over the network. Full disk encryption protects against physical theft, not network attacks while running.

And if Nextcloud has passkeys, HTTPS, and proper auth, what is Tailscale adding exactly? What is the point of this setup over the alternative? What threat does this stop that "hardened Nextcloud, exposed directly" does not? It is complexity theater. Looks like defense in depth, but the "layers" are network hops, not security boundaries.

replies(1): >>butvac+xg8
◧◩◪
124. mycall+N94[view] [source] [discussion] 2026-01-13 03:21:45
>>lmm+eh
You could also use ZeroTier and get similar capabilities without a third-party being a blocker.
replies(1): >>woleiu+Gg4
◧◩◪◨⬒⬓⬔⧯▣
125. lmm+Va4[view] [source] [discussion] 2026-01-13 03:33:47
>>sejje+dO2
Most inadequate drivers don't think they're inadequate, which is part of the problem. Unless your acquaintances are exclusively PMC you most likely know several adults who've lost their licenses because they are not adequately safe drivers, and if your acquaintances are exclusively PMC you most likely know several adults who are not adequately safe drivers and should've lost their licenses but knew the legal tricks to avoid it.
◧◩
126. 1vuio0+7g4[view] [source] [discussion] 2026-01-13 04:43:48
>>1vuio0+Zq2
O5QXGIBLGMQC4LQK
◧◩◪◨
127. woleiu+Gg4[view] [source] [discussion] 2026-01-13 04:51:10
>>mycall+N94
or netbird
replies(1): >>mycall+ls8
◧◩◪◨⬒⬓⬔
128. eqvino+CJ4[view] [source] [discussion] 2026-01-13 10:24:35
>>bjt123+kJ1
Uh, you know you can scan UDP ports just fine, right? Hosts reply with an ICMP destination unreachable / port unreachable (3/3 in IPv4, 1/4 in IPv6) if the port is closed. Discarding packets won't send that ICMP error.

It's slow to scan due to ICMP ratelimiting, but you can parallelize.

(Sure, you can disable / firewall drop that ICMP error… but then you can do the same thing with TCP RSTs.)

replies(1): >>apstls+Yf7
◧◩◪◨⬒⬓⬔
129. eqvino+IJ4[view] [source] [discussion] 2026-01-13 10:25:19
>>JasonA+nK1
> SSH is explicitly designed to allow unauthenticated users to do a whole lot of things

I'm sorry, what?

130. cirell+RL4[view] [source] 2026-01-13 10:49:38
>>drnick+(OP)
I did it and I was just hacked because of a CVE on my pangolin reverse proxy! Sadly, I didn't knew of the CVE soon enough and I only noticed when a crypto malware took my fan 100% all day long...
131. Ir0nMa+a36[view] [source] 2026-01-13 17:25:07
>>drnick+(OP)
It's worth considering: Run the PiVPN script on a Ubuntu/Debian based VM. Set it to use a non-standard random port. That will be your only port exposed to the internet.

Add the generated Wireguard key to any device (laptops, phones, etc) and access your home LAN as if it was local from anywhere in the world for free.

Works well, super easy to setup, secure, and fast.

◧◩◪◨⬒⬓⬔⧯
132. apstls+Yf7[view] [source] [discussion] 2026-01-13 22:03:04
>>eqvino+CJ4
That's why you discard ICMP errors.
replies(1): >>eqvino+Kc8
◧◩◪◨⬒⬓
133. gsich+5p7[view] [source] [discussion] 2026-01-13 22:48:51
>>lee_ar+SB1
it did for me.
◧◩◪◨⬒⬓⬔⧯▣
134. eqvino+Kc8[view] [source] [discussion] 2026-01-14 05:09:16
>>apstls+Yf7
If anything, that's why you discard ICMP port unreachable, which I assume you meant.

If you're blanket dropping all ICMP errors, you're breaking PMTUD. There's a special place reserved in hell for that.

(And if you're firewalling your ICMP, why aren't you firewalling TCP?)

◧◩◪◨⬒⬓⬔⧯
135. butvac+xg8[view] [source] [discussion] 2026-01-14 05:51:52
>>johnis+oR3
And, Proxmox makes it worse in this case as most people won't know or understand that proxmox's netoworking is fundamentally wrong: its configured with consistent interface naming set the wrong way.
◧◩◪◨⬒
136. mycall+ls8[view] [source] [discussion] 2026-01-14 08:04:34
>>woleiu+Gg4
Interesting product here, thanks although I prefer the p2p transport layer (VL1) plus an Ethernet emulation layer (VL2) for bridging and multicast support.
[go to top]