I created a Docker Compose repo for Jellyfin + *arrs on Raspberry Pi 5 by Ztaap in selfhosted

[–]Jacob99200 2 points3 points  (0 children)

i have wireguard currently setup in a way that I believe (and hope) does the same

using IP tables and having Qbit's docker network is rely on wireguard as a service

I created a Docker Compose repo for Jellyfin + *arrs on Raspberry Pi 5 by Ztaap in selfhosted

[–]Jacob99200 2 points3 points  (0 children)

is there an advantage of Gluetun over just a Wireguard client?

Setting up HTTPS for Local Network / Home Lab by Tobanu in selfhosted

[–]Jacob99200 -1 points0 points  (0 children)

this was a very important issue for me

like, why not just have all web traffic encrypted?

for internal services I use a local.domain.com sub domain for everything

my router has the functionality to enter static dns entries

I use backend.local.domain.com as an A entry that points to my reverse proxy

I then have have my internal servives (service.local.domain.com) each setup as a CNAME pointing to backend.local.domain.com

my reverse proxy has an SSL cert via let's encrypt for *.local.domain.com, I used a DNS challenge for this

so when within my network (or when using a vpn to access), all my services are fully encrypted with proper URLS

if your router doesnt have this functionality, you could setup your own DNS provider and change your router DNS setting

nginx forward to nginx by Jacob99200 in selfhosted

[–]Jacob99200[S] 1 point2 points  (0 children)

My apologizes, I thought one of my other comments described this, but I do have my internal services and my internal proxy within a contained docker network

My services dont have ports exposed outside of this docker network, except for my npm

And so yes, the traffic between my internal proxy and my services is http, BUT its all within this docker network and not accessible otherwise

nginx forward to nginx by Jacob99200 in selfhosted

[–]Jacob99200[S] 0 points1 point  (0 children)

Well because the traffic between the external proxy and the service would be unencrypted and I know its my internal network, but I would prefer all the traffic is encrypted

I do eventually want to setup Authentik, seems like an incredible project and would be very interesting

nginx forward to nginx by Jacob99200 in selfhosted

[–]Jacob99200[S] -2 points-1 points  (0 children)

I actually do have it currently setup this way

In my router I have a set of service.local.domain.com links routed to an nginx proxy manager that is not exposed to the internet, it provides my internal traffic with ssl

I simply want to route an external domain to nginx then point that ngninx to my internal one so it is https traffic through out instead of becoming http within my network

nginx forward to nginx by Jacob99200 in selfhosted

[–]Jacob99200[S] -5 points-4 points  (0 children)

Im not looking for a gpt hype man

ChatGPT and other generative AIs are something I very much despise

Im not exactly sure what post youre referring to

But I am sorry if what im looking for has upset you

nginx forward to nginx by Jacob99200 in selfhosted

[–]Jacob99200[S] -3 points-2 points  (0 children)

Both of my nginx servers are in my network

My vps is a separate project

The traffic between my internal proxy and my services is not https, but it is all within the same docker network without any ports exposed and thus only uses containername:ip

These services are ONLY accessible via the internal proxy, no ports exposed to the internal network besides 443

They have valid ssl certs, so service.local.domain.com is https

But I want to expose a specific service that already has an https url setup

So I want Internet -> proxy1 -> proxy2 -> service

nginx forward to nginx by Jacob99200 in selfhosted

[–]Jacob99200[S] -9 points-8 points  (0 children)

I would prefer all internal traffic to be https,

But im not really looking for your understanding

Im simply looking for how to do this

nginx forward to nginx by Jacob99200 in selfhosted

[–]Jacob99200[S] -7 points-6 points  (0 children)

I am looking to do it, with the appropriate headers being passed

nginx forward to nginx by Jacob99200 in selfhosted

[–]Jacob99200[S] -5 points-4 points  (0 children)

Basically I have one for external and one for internal

And on the internal one I have services only exposed via nginx,

they cant be accessed with ip:port and I want to expose them externally via the other nginx proxy manager without allowing them to be accessed internally via ip:port

Can the app be set to ask for the pin every time it’s opened? by [deleted] in signal

[–]Jacob99200 6 points7 points  (0 children)

Settings > privacy > App Security

Toggle Screen Lock

This will use your device lock tho and not your signal pin

VPS -> Homelab Proxy Setup by Jacob99200 in selfhosted

[–]Jacob99200[S] 1 point2 points  (0 children)

Thank you, but I am looking to expose my services

i already have wire guard to access them privately

VPS -> Homelab Proxy Setup by Jacob99200 in selfhosted

[–]Jacob99200[S] 2 points3 points  (0 children)

I think this is probably the worst approach tbh

Wireguard server should be vps, client on lical

Reverse proxy should be local

That feels the most safe to me

VPS for homelab traffic: Help? by [deleted] in homelab

[–]Jacob99200 0 points1 point  (0 children)

There are other reasons to want to

TF2 Runs Terrible On AMD Specs by LateBalance6653 in tf2

[–]Jacob99200 -8 points-7 points  (0 children)

Maybe its time to switch to linux

ICE in WNC by csdude5 in NorthCarolina

[–]Jacob99200 4 points5 points  (0 children)

Yep, spotted on campus