You could self host a web client
Well the internet down scenario has only happened once, and I returned home to no internet, booted up my laptop, and could not connect to any of my services since I couldn’t reach my control server. I haven’t forced the issue to occur by disconnecting my internet and testing connectivity. I just did the lazy thing and connected to the services I wanted via their IPv4 address
you’re almost certainly routing local network traffic over NetBird instead of using local routes
That’s precisely the functionality I want, though. Secure, encrypted, mutually identified traffic should be the only traffic in a zero trust network.
I’m simply trying to create an ingress point into this network for outside access.
Thanks for your response! I’m completely self-taught, so I’ll go ahead and acknowledge knowledge gaps on my end, but how would putting all the nodes in a network cause routing problems or ARP poisoning?
I recognize that what I’m trying to accomplish is a bit overkill for the average home network, and a lot of my reasoning behind my design is purely for learning. My reasoning for putting everything on a mesh network is 2-fold:
I have successfully run this setup previously with the NetBird management console hosted in a VPS, however the issue I ran into was that if internet went down at home, I could no longer access my locally hosted services through the mesh network. I could still access them via IP, since I was on the same LAN, but that defeats my goal of centralized control, mDNS, and a central source of truth that I got via the mesh network.
I have also successfully ran this setup completely local, however I am unable to access it from outside my homelab. For my use case, I think having all components of the mesh network hosted within my homelab is the best design. However now I have to figure out the best way to allow external connections to my management interface. Thus my original question should I use a cloudflare tunnel to my management interface, set up a wireguard tunnel from an externally accessible VPS service pointed to my management interface, or something different?
Ahh gotcha, that makes sense, so like the difference between a self signed SSL certificate and something like LetsEncrypt.
Re 2: I was thinking in the scenario to allow auto discovery of your certificate, so someone who is emailing you for the first time could look up your public key automatically and use it to encrypt their email.
Also, great writeup and thank you!
Any recommendations on a FOSS MDM?
Question 1: What’s the point of using Actalis? Can’t you generate your own certificate?
Question 2: Is there a way to get your email.server to automatically publish your public key?
You have backups?
I dont think the covering of webcams with tape on windows is necessarily about a malware or an exploit watching you, but more about windows itself monitoring and selling off everything you do.
Do you recommend any resources about this? I’d be interested in learning how to implement this.
While I normally agree on #2, it doesnt really apply to Tailscale. Tailscale isn’t completely free, they have a free tier to generate business but it’s limited to 3 users per tailnet. Also its cryptographically impossible for them to snoop on your traffic.
Can you make the domain somehow personalized to you so you can say its for an online resume to further your education and employability? If you happen to host other personal stuff that won’t cost you anything extra, just make sure you have a fancy looking CV at the root.
I just set up a security camera for my dad’s office: zoneminder running the webcam and tailscale for access anywhere.
I’m glad it helped!
I recently ran into the same issue flashing firmware on a Cisco Aironet 3700, the command I ended up using was sudo in.tftpd -L (directory) --verbose --permissive -s
I was running TFTPD on Fedora 38 on my laptop, though. I’m pretty sure I had the same issue you did, I think changing the command to in.tftpd fixed it, but I could be misremembering as this was about 6 months ago.
I laughed, then had to explain the joke to my parents, which meant I had to explain what Linux was, what daemons were, and why I was giggling
Good point, I like the ability to choose between VMs and containers. If I had TrueNAS in one VM and Nextcloud in another, how would you link Nextcloud to TrueNAS? SMB share?
Would you use something other than TrueNAS, then?
Why is there a dunkin donuts app?