• jazzmonkai@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I started with Tailscale. My main use in the beginning was to have access to my Home Assistant when I was out, and for that it was perfect.

    Then I started to want access to files on my NAS without using Synology’s Quickconnect after they had a security scare. Tailscale was fine for this too.

    But when I began game streaming from my home PC, that’s when Tailscale stopped working for me. Latency spikes, poor bandwidth, it just wasn’t up to the task.

    Now I have wireguard set up on my Opnsense router, and it’s perfect. My upload speeds are max 20Mbps due to my internet service, but I can reliably stream at around 15Mbps with latency of about 25ms max.

    It’s definitely harder to manage and maintain than Tailscale was, and I’ve ended up doing a bunch of other stuff like buying a domain so I can have SSL for my other hosted services (which have grown since I started, naturally!), but for performance it’s ideal.

    I’d probably start with something like Tailscale or Zerotier because they’re easy to set up and deploy. If that meets your needs, no need to look elsewhere. I considered CF tunnels but I have one already set up for Google Home to interact with Home Assistant and I find it hard to understand so the idea of using it more widely didn’t seem smart. I’m already worrying about the day I have to update the domain name from the current DuckDNS one to my paid for domain…

  • LegitimateCopy7@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    wireguard as primary, Tailscale as backup.

    if I have something I don’t mind Cloudflare and the government taking a look, then Cloudflare tunnel.

  • ElevenNotes@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Pretty simple answer: Wireguard.

    Why? It’s the fastest of them all, works on almost all devices you can imagine, does not rely on any 3rd party like Tailscale with OICD or other IdP. Tailscale has its use when you are behind CGNAT and don’t want to VPS a Wireguard server somewhere with a static IP, other than that, it has no use in my opinion. I’m fully aware that I get downvotes from people who praise the zero trust principals of Tailscale and all the rest, but they always forget that you can do zero trust since decades with any network equipment (VXLAN) and add Wireguard to the mix. You can even run Wireguard in your local network to encrypt unencryptable traffic like NFS.

    Check back in a few hours /u/Silencer306, this comment will have a few if not many downvotes.

    • AnApexBread@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      Tailscale has its use when you are behind CGNAT and don’t want to VPS a Wireguard server somewhere with a static IP, other than that, it has no use in my opinion. I’m fully aware that I get downvotes from people who praise the zero trust principals of Tailscale and all the rest, but they always forget that you can do zero trust since decades with any network equipment (VXLAN) and add Wireguard to the mix.

      People just forget that all Tailscale is is a fancy GUI for managing Wireguard. That’s it.

      Wireguard lacks a lot of user management features so you need a service like Tailscale to handle that, but everything zerotier does is something you can already do in wireguard, just simplified.

    • ArgoPanoptes@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      If you can use Wireguard that is probably a good solution but I would still prefer to have a cloud proxy in front of it because my network can not handle all the attacks and wouldn’t even notice some of them if you use just Wireguard.

      I use CF Tunnels firstly because of all the protections and traffic analysis it does, and secondly, because even DDNS wouldn’t work on my network.

  • arcadianarcadian@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Wireguard.

    Because I would like to self-host everything myself, so why should I use another 3rd party service?

  • wiseguy9317@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I use Wireguard and Tailscale. Some networks block Wireguard connections. Tailscale always works.

    • AnApexBread@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      Some networks block Wireguard connections.

      Dollars to doughnuts they’re blocking the default Wireguard port. Change your wireguard port to something like 8080 or 8443 and you’ll almost certainly make it through

  • driversti@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I use WireGuard. It is sufficient for me, because I have no need to make my services publicly visible.

    • aadoop6@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      How do you access those services from a public network? Say, you want to access something while working from your office or a friend’s computer.

        • aadoop6@alien.topB
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 months ago

          Sure, but what if that computer doesn’t have wireguard installed. I don’t see any other way except exposing the service to the public.

  • NekoLuka@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I wanna host everything myself, but also love tailscale, so I’m using tailscale with headscale… It’s so convenient to not open up ports, especially since I don’t have a static IP

  • vivekkhera@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I’ve used IPSec to connect to my home (and office when I had my own company) networks. It has never failed me and the client is built right into my iphone and mac.

  • TheRealSeeThruHead@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I use both. Cloudflare is for public facing services. Like overseerr and wizarr.

    Tailscale is how I access my private services and dashboards.

  • Anejey@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I use all three.

    • CF tunnels to access generic apps I want public.

    • Tailscale to have remote access to my home network.

    • Wireguard tunnel going to a VPS for apps that I don’t feel comfortable running through CF due to the bandwidth (Jellyfin, AzuraCast).

    I totally could move everything that’s on CF tunnels over to Wireguard, but I see no need to do it. Cloudflare is trustworthy enough and I like the additional protection it offers.

    • AnApexBread@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      CF tunnels to access generic apps I want public.

      I totally could move everything that’s on CF tunnels over to Wireguard, but I see no need to do it

      How would you keep the public apps public if you require a wireguard connection to access them?

  • jkirkcaldy@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    For work, Tailscale between vps and server. It works like cloudflare tunnels but doesn’t have the issues with the TOS excluding media streaming etc.

    Keeps the internal server relatively safe and we can stream media/serve media content.

    Cloudflare is our registrar and dns provider.

  • terramot@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I have a domain on cloudflare to map internal IPs/services and use wireguard to reach the network. Tried Tailscale and Zerotier, there was a problem on some devices when switching from wifi to internet which was breaking internet access, switched to Wireguard and now i’m happy.