• 4 Posts
  • 62 Comments
Joined 2 years ago
cake
Cake day: October 18th, 2023

help-circle
  • I don’t know of any sftp programs specifically, but any file sync program should work.

    It would be massive overkill for this one task, but I personally use my Nextcloud server to move files on and off my iPhone to my services as needed. I have the Jellyfin media directory, Calibre upload, and Paperless upload directories mounted in Nextcloud as external directories (as SFTP mounts, I think) and then access them from my phone from the Nextcloud app.


  • Are you using some Apple or MS author account?

    Google and Github SSO were the only options when I originally setup tailscale. There are a few more options now including what looks like every self-hosted OIDC provider I’ve ever heard of, and a few I hadn’t.

    How did you config tail scale though?

    There are a couple options depending on how you are using it. Most of the time I just use the tailscale command to configure each node.

    Most systems were just sudo tailscale up --ssh to get it up and running, although I have one system setup as a subnet router to give me outside-the-house access to systems that I can’t put tailscale on. That was a little more involved but it was still pretty straightforward and well documented. Their documentation is actually very well written and is worth the read.


  • The way Tailscale works, you don’t need to worry to much about your local IP address. You can just use the Tailscale IP address and it will connect as if you were local using the fastest route. That’s the beauty of a mesh VPN. Each device knows the fastest route to each other.

    Without more information I can’t really tell what issue you are actually having, but if your system has internet, you have a local IP and if the system is showing as up on your tailscale dashboard than it will have a tailscale IP. Not being able to connect using one or the other would be a configuration issue. Whatever service you are having trouble with is probably only listening to one of the interfaces but not the other.

    I’m assuming you are running a linux or unix box, but try running the command ip addr. Assuming you have the package installed, it will tell you all of your IP addresses for the system you run the command on. The list may be quite long if you have a lot of docker containers running. The command tailscale ip will do the same but limited to your tailscale IP addresses.




  • Peertube uses bittorrent tech underneath to help distribute the load. Each viewer shares what they’ve downloaded to others viewing the same video at the same time. If 100 people are watching the same video at the roughly the same time the original host really only sends out 1 or 2 streams.

    Things might get interesting if each of those 100 people want to watch a different video though. Pretty sure a server run by a popular youtuber like Mumbo Jumbo or even Justin Guitar would choke.



  • Well, yes I looked at tailscale too, but that would prevent me from using my normal commercial VPN

    You can split your devices traffic, Tailscale traffic through Tailscale, everything else through your masking VPN.

    I’m trying to get the best of 2 worlds: using the VPN to hide my IP from services that i visit and my ISP, and a secure connection to my home server.

    For that, what I would do is put the masking VPN (like PIA or whatever) on your router (not all routers can do this) and then have Tailscale on the devices or individual services. In theory, everything would still be able to talk to each other (even if your mobile device is not behind the router), but everything that is behind the router would enter and exit their traffic wherever you have the masking VPN set to. Downside of doing this is that EVERYTHING that is behind that router is also behind that VPN which can cause problems with some services, like banking and streaming.

    It would also mean that the only way you could host a public service is to have an external VPS acting as a reverse proxy. Cloudflare might also have something that could work around this setup, but I’m not familiar with their offerings.

    This setup also doesn’t mask your traffic (origin and destination) from your mobile provider (just your home ISP), but that is a harder nut to crack as they can see, real time, where you are physically, and depending on your device, may have deeper device access anyways. I’m thinking prepaid phones and phones bought from the carrier (at least here in the US) or if your carrier has “asked” you to install an app to manage your account. My assumption is that my mobile provider can see anything I do while I have my phone or tablet with me, and just work around that.

    You might want to ask in !privacy@lemmy.ml and !privacy@lemmy.world, as this is more up their alley.


  • Hosting for the public, it’s honestly going to depend on how many users you are going to have. Pretty much anything that is light on bandwidth should be doable. Websites, blogs, wikis. XMPP chat servers might work. Matrix might work as well. Adding to your seeding idea, you might seed torrents for any Linux distros you happen to like or build torrent seeds for projects with larger download sizes. I seem to recall a project that would enable you to seed peertube channels as well, though I can’t find the project right now.

    If it’s just you and maybe a few family and friends,say over a mesh VPN, what ever you want, though video streaming may be a bit much for that bandwidth. Any other type of personal media should be very doable. Books, music, that sort of thing.




  • Possibly. I don’t remember that being an option when I was setting things up last time.

    From what I’m reading it’s sounding like it’s just acting as a slightly simplified DNS server/reverse proxy for individual services on the tailnet. Sounds Interesting. I’m not sure it’s something I’d want to use on the backend (what happens if Tailscale goes down? Does that DNS go down too?), but for family members I’ve set up on the tailnet, it sounds like an interesting option.

    Much as I like Tailscale, it seems like using this may introduce a few too many failure points that rely on a single provider. Especially one that isn’t charging me anything for what they provide.


  • In my case, most things that I didn’t explicitly make public are running on Tailscale using their own Tailscale containers.

    Doing it this way each one gets their own address and I don’t have to worry about port numbers. I can just type http://cars/ (Yes, I know. Not secure. Not worried about it) and get to my LubeLogger instance. But it also means I have 20ish copies of just the Tailscale container running.

    On top of that, many services, like Nextcloud, are broken up into multiple containers. I think Nextcloud-aio alone has something like 5 or 6 containers it spins up, in addition to the master container. Tends to inflate the container numbers.








  • I use FinAmp client with Jellyfin for music.

    I agree the Jellyfin interface is not well optimized for music, but FinAmp negates most of that and my phone is how I mostly listen to music anyway.

    I like Navidrone, but it’s a duplicate service that doesn’t really have a big value add over Jellyfin beyond the ability to share tracks with friends. A major feature upgrade, but not something I use terribly often.