| ▲ | jedberg 5 hours ago | |||||||||||||||||||||||||
This seems like a good place to ask: What is the current state of the art for connecting back to my home network while remote? I want: access to my home server ability to stream US TV when abroad (by exiting from my home network) ability to make it easy for others with non-tech backgrounds to connect with their devices (parents, kids, etc) ability to have remote linux servers connect automatically on boot. This one is because I can't get OTA TV at home and want to set up a simple streaming box at someone else's house to do it that connects back to my house, so we can stream off all of our devices. I'm guessing tailscale will be a part of this setup which is why I ask here. | ||||||||||||||||||||||||||
| ▲ | paxys 5 hours ago | parent | next [-] | |||||||||||||||||||||||||
Tailscale will enable all of this. Set up a US device as an exit node, and configure other devices to proxy through it. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | pants2 5 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
Yes, you've described Tailscale + Exit Nodes + Tailnet that you invite your family to. Install Tailscale and enable some devices as exit nodes - it's pretty much as simple as that. | ||||||||||||||||||||||||||
| ▲ | nightski 4 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
I just use WireGuard to connect my local network. I see no point in throwing a middleman into the mix. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | lemming an hour ago | parent | prev | next [-] | |||||||||||||||||||||||||
Related question: how are people handling adding family members of varying technical abilities to your tailnets? Does each family member get a separate user so you can manage their access? For my immediate family I was just logging tailscale in as me on their devices, but that becomes a pain when they get logged out and need me to log in again before things go back to working. | ||||||||||||||||||||||||||
| ▲ | Lammy 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
Tailscale is probably what you want, but if you care about privacy you'll have to be sure to disable the telemetry/logging/spying option on each of your nodes. By default it will leak your so-called “private” network behavior to Tailscale (connections on what port, from what node, to what node, opened when, closed when): https://tailscale.com/docs/features/logging | ||||||||||||||||||||||||||
| ▲ | fastingrat 4 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
if you are behind cgnat (both ipv4, ipv6) then vps, have public ipv6 then you can connect via public domain (ddns openwrt) and if you have a public ip, wireguard it is | ||||||||||||||||||||||||||
| ▲ | colechristensen 5 hours ago | parent | prev [-] | |||||||||||||||||||||||||
I found good success with OpenWRT/Tomato and WireGuard. The interface is bad when it comes to provisioning but it can be done with a QR code and once it works the native experience of turning on the VPN was just stunningly fast. In this day and age you expect things to be slow with negotiation and various unreliable steps but it was just amazing that I tap the VPN button on iOS and it's connected in a fraction of a second. | ||||||||||||||||||||||||||