Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
Same as the public one, just with an internal address.
Have this on my domain, public domain with a subdomain server behind VPN and 1 host that points to an internal address.
Anyone tries to reach from outside just times out or something.
DNS is just a lookup of names to numbers, that's all it is, the numbers can be anything, I can point my domain to Google if I want.
Please elaborate a little more. So assuming the server where the service lies has IP address 1.2.3.4, and some VPN that I can connect to with 1.2.3.4:1194. If my DNS server points to 1.2.3.4, and say there's an http server there that's normally accessible with 1.2.3.4:80, how will we enforce that working only through VPN?
About the DNS, you can use an internal DNS and find some way for your VPN to configure it in all the machines connected to it.
DNS usually has a fall back if the name is not found, so you can always have your custom DNS on and it'll first check its own records then check for some level up (I'm basing this off of my experience with with pihole https://docs.pi-hole.net/ftldns/ )
About your ports question: you just need to change the ip to the VPN one.
For example, I have a VPS which has a public IP and I have tailscale installed.
If I were to make my service listen to all interfaces I could use
1.2.3.4:1194
or100.100.100.100:1194
(this being the tailscale ip)But I usually only configure them to listen to
tailscale0
, so I can no longer reach them with1.2.3.4:1194
, only with the tailscale ip.In your DNS you need to configure this new IP to be served.
I'm guessing you can also do some configuration with a firewall.
Probably
ufw add allow from 10.0.0.0/8
could work if this was the IP range of your VPN, then any one can still use your public IP and only your VPN will be able to connect (But don't quote me on this, I haven't done it).(Just be sure to check the configuration of your service, docker can bypass ufw :/ )
Thank you, but my question was specifically about DNS. Another person pointed out that setting the DNS record to the VPN destination is the right answer. I appreciate the details you wrote and I'll look into them.