Hello I’ve been using cloudflare to get remote access for the couple apps I selfhost, but lately I’ve been hearing about the wonders of tailscale.

It seems that the free tier is enough for my use. Which would be a safe option to have remote access for my 3D printer? Also how are both in terms of privacy?

  • monkeyman512@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    1 年前

    A VPN is going to offer better security. I would only use cloudflare if you need something to be open to the public. This is useful when you have non-technical users that aren’t going to understand using a VPN.

    • Evotech@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 年前

      Just use CF with host restrictions. You can easily add which hosts should have access of you want to limit access further

  • Encrypt-Keeper@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    1 年前

    Tailscale. Because it can do both. It functions as a mesh VPN for private access, but it also has Tailscale Funnel which does the same thing as Cloudflare tunnels but you don’t give all your traffic to Cloudflare

    • keyez@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      1 年前

      Is there a specific reason tailscale having all the same traffic opposed to cloudflare is a better option? I use cloudflare tunnels right now and figured them handling some of the data is better than me by myself.

      • Encrypt-Keeper@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 年前

        Well like… if you’d rather put your data in the hands of a company instead of your own when you could easily do the same thing yourself, why are you self hosting in the first place?

      • brakenium@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 年前

        Tailscale shouldn’t be getting your data anyway. It’s a mesh VPN that directly connects devices after their auth server gives out certs and let’s clients know where to find another. If you’re not comfortable with using their server for this I’d suggest you look into the open source headscale server. I do remember it routing through their server in the rare case NAT punching doesn’t work

        • keyez@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          1 年前

          Thanks for the info. Though I fail to see how it’s much different than cloudflare tunnels, I’ll probably stick with that for the near future but will try out tailscale funnel in the future.

          • Encrypt-Keeper@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 年前

            It’s not functionally different from Cloudflare tunnels, that’s the point. You get the same functionality without giving all your data to a corporation.

  • axzxc1236@lemm.ee
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    1 年前

    Tailscale server can also be self-hosted, look into headscale.

    From my own experience, I still can’t setup headscale on my Android phone, I think latest tailscale APP fucked up setting custom server function. Don’t install from Google Play

  • PeachMan@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 年前

    If it’s just you, and you’re willing to install it on all your devices, Tailscale is the best option IMO. If you need to share things with others, use CF Tunnels.

  • Zoidberg@lemm.ee
    link
    fedilink
    English
    arrow-up
    8
    ·
    1 年前

    I like tailscale and have been testing it for a few months. I’m also using headscale as the control plane.

    Unfortunately the android client is somewhat unreliable. It works most of the time but once in a while, connections to your tailnet will fail for a bit and require retries. If you ping a machine in your tailnet during this problem, it will show packet loss and then start working after a few pings. This unfortunately makes it difficult to have a reliable split DNS setup.

    I’ve done everything to try and understand what happens without success. It seems like state is lost somewhere and a few packets flowing will fix it. Running a constant ping from Android to my tailnet “fixes” the problem, but is not a great workaround.

    Just something to keep in mind before you jump headfirst.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    1 年前

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    CF CloudFlare
    CGNAT Carrier-Grade NAT
    DNS Domain Name Service/System
    HTTP Hypertext Transfer Protocol, the Web
    HTTPS HTTP over SSL
    IP Internet Protocol
    NAS Network-Attached Storage
    NAT Network Address Translation
    SSH Secure Shell for remote terminal access
    SSL Secure Sockets Layer, for transparent encryption
    TCP Transmission Control Protocol, most often over IP
    TLS Transport Layer Security, supersedes SSL
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)

    13 acronyms in this thread; the most compressed thread commented on today has 8 acronyms.

    [Thread #262 for this sub, first seen 5th Nov 2023, 06:50] [FAQ] [Full list] [Contact] [Source code]

  • state_electrician@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 年前

    You can just self-host Wireguard on an always-free Oracle cloud machine (or of course any other cloud host). It’s quite easy to set up and there are open source Wireguard UIs and clients for any OS. I will never rely on a company like Tailscale or Cloudflare for something like this.

    • lud@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      2
      ·
      1 年前

      That wouldn’t help with accessing their home network.

      I would use wireguard at home for this, but we have CGNAT so that is impossible/hard so I just use tailscale, which uses WireGuard anyways.

      • RaisinBrand@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 年前

        Yes it would. If wireguard is hosted in a vps, they can setup a client on their home network and mobile device, bypassing their home and isp nat.

        • lud@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 年前

          WireGuard wouldn’t work with CGNAT. The two servers can’t connect. I can’t get it to work anyways.

          If it weren’t for CGNAT, are you saying that OP could connect all their servers to the VPS using WireGuard and then OP could connect to the VPS? In that case it seems easier to just host a wireguard on one of the servers at home and I highly recommend doing that if you don’t need to deal with CGNAT.

          I think you could host your own Tailscale server on a VPS and then use tailscale on the servers and your client computers/mobile to bypass CGNAT. That’s basically what I am doing right now, except I haven’t hosted my own Tailscale server.

          • RaisinBrand@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 年前

            I think you have a misunderstanding about wireguard clients.

            As long as the server isn’t behind a cgnat, a connection from the client to the server can be made. It does not matter if the client is behind a cgnat or not. If that were true, privacy vpns like proton and mullvad would not work.

            That said, tailscale is easy to setup compared to a wireguard tunnel, but wireguard has potentially more performance because tailscale uses wireguard-go rather than wireguard kernel.

            • lud@lemm.ee
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 年前

              I haven’t tried reversing it like that, but I was under the impression that there were no specific servers or clients in WireGuard land and that both devices had to connect to each other and authenticate.

              I have never really thought about how the servers of VPN providers are supposed to work if this was the case.

              I guess I just got confused when I tried setting it up someday.

              I haven’t benchmarked it personally but apparently tailscale and WireGuard are very similar in performance due to optimization done by tailscale. I think they wanted to push the improvements upstream but I am not sure if that happened or if it’s still waiting.

              • RaisinBrand@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                1 年前

                I believe performance is situationally dependent, so it may or may not be faster, but it theoretically is. I personally choose wireguard over tailscale because it’s one less 3rd party involved, not for potential performance increases.

                • lud@lemm.ee
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  1 年前

                  That’s fair. I use Wireguard somewhere else for the same reason.

  • BastingChemina@slrpnk.net
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 年前

    What I enjoy with tailscale is that the traffic goes directly from the host to the client.

    Since there is no cloud relay I can connect to all my services via tailscale, even on local network and it’s not going to impact the speed.

    This way I only have one setup that works the same way on local network or remotely but still have the local network speed when I am at home.

    • varsock@programming.dev
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 年前

      discovered tailscale from this post and after reading their “how tailscale works” I was hoping to get some clarification from an activer user (you).

      CF tunnels setup an outbound-only tunnel from my private network via cloudflared, I have no ingress holes in my firewall to access my services. cloudflared does all the proxying. Plus my IP changes monthly as I don’t pay for a static one from my ISP. This “outbound-only” connection is resilient to that.

      Tailscale is point-to-point (for data plane) connection and only the control plane is “hub and spoke”. This sounds like I need to allow ingress rules on my private network so my server can be connected to? Is this true or where did I misunderstand?

      • BastingChemina@slrpnk.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 年前

        I’m probably not the beat person to answer to you about the technical aspect and I’m not sure if I fully understand your question.

        However I can tell you that there is no need to change anything at network level for tailscale to work.

        I’ve installed and used tailscale on desktops, VM, raspberry, NAS or smartphone on plenty of different network, I’ve also remotely guided people to install tailscale on their machine at home and it always just worked. No issue at all and nothing to change on the network for it to work.

        • varsock@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 年前

          interesting, I’ll have to read about this some more then. thanks for pointing me in the right direction

  • flappy@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    1 年前

    Cloudflare hates VPNs, so when it comes to privacy, it’s not really a contest.

    • hottari@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      1 年前

      Cloudflare ironically has a VPN-ish service that no one talks about called Cloudflare Warp.

      • varsock@programming.dev
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 年前

        WARP (a client) just connects you to CF’s network.

        If your server is running cloudflared (an outbound-only tunnel) then you can enroll your WARP client to reach your server, while your server is never accessible on the public web. That’s the principal behind Zero Trust.

        While techinically yes, WARP can be considered as a VPN, it is just a secure tunnel to an endpoint. In which case you can argue any point-to-point tunnel is a VPN.

        • hottari@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 年前

          Warp is 2 products. A wireguard-go VPN that changes your IP and uses cloudflare’s network instead of your ISP. This service doesn’t necessarily require the 1.1.1.1 app (desktop app is called cloudflared) since it’s just Wireguard under the hood.

          And Warp is also a VPN tunnel that allows you to reach services hosted on Cloudflare’s network with their client cloudflared as you just described. This allows you to make any service available on the internet and further manage its access using Cloudflare’s firewall options or Zero Trust for secure private applications.

          The latter use is more popular than the former in my observance since not many people I know aside from the Chinese use it as a VPN. (mainly for circumventing their national firewall).

  • Lunch@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    1 年前

    Tailscale Funnel and Serve will also let you point services to the public. I only use tailscale for all of my access needs and it’s perfect and easy to handle 👌

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 年前

    Neither, I setup a VPS and wireguard. I also use netbird for some things that aren’t publicly accessible

  • Moonrise2473@feddit.it
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    1 年前

    Why not both?

    I use tailscale for full access to network and cloudflare tunnels to specific access to a service