eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

205
active users

#tailscale

3 posts3 participants0 posts today
Replied in thread

@bodomenke Bei deinem konkreten Problem kann ich dir nicht helfen. Kann nur beitragen, wie meine Lösung aussieht. Ich verwende #Tailscale. Dabei werden alle Clients einem virtuellen Netzwerk hinzugefügt. Ist für alle für mich relevanten Plattformen verfügbar. Da sind alle Clients, Proxmox-Instanzen, Raspis, Linux-Blech, macOS und iOS-Telefone drin. Sogar Victron GX geht. Company sitzt in Kanada. Bis 100 Clients kostenlos. Sind allerdings neulich gekauft worden. Daher eingeschränkte Empfehlung.

Set up my wife with #tailscale on her phone: took 60 seconds.

Adding her tailscale ID as an auth method in the Leftovers app on Dropserver: 10 seconds. (Maybe less? It's literally one dropdown to select who the user is for this peer user on the tailnet. See screenshot)

A productive afternoon.

I've torn down and rebuilt my personal instances of #nextcloud more times than I care to admit. Crashes, breaking upgrades, AIO migration, and now issues in putting it behind #tailscale which Nextcloud REALLY doesn't like. Skill issue? Absolutely. I tore it down for the last time recently and decided it's overkill for what I need.

I set up #syncthing this week, and IT'S MAGIC. Sure, I have fewer features but all I really needed was file sync that I could use with my own off-site backup. Throw Markor in there for notes and I'm a happy guy. I can't believe I was using an industrial tractor for a shovel job this whole time. #foss

To other #selfhosted users of @atuin: how safe do you feel it is to have your atuin endpoint exposed to the public internet? I ask because I'm currently restricting mine to my #tailscale tailnet, but my employer is now using tailscale, meaning I can no longer access services on my own tailnet without swapping back and forth.

Stop exposing your homelab to the internet! 🔒 There are much safer ways to get remote access.

I wrote a new guide comparing the top 4 methods for 2025:
✅ The Easy Button (Tailscale)
✅ The DIY Powerhouse (WireGuard)
✅ The Web Gateway (Cloudflare)
✅ The Sysadmin's Tool (SSH)

Find the perfect fit for your setup: homelabdad.com/secure-your-hom

Home Lab Dad · Secure Your Homelab: Top 4 Remote Access Methods for 2025
More from Home Lab Dad

Yeah this is why keeping your self-hosted stuff off the public Internet is a really good move. It's why I put #Tailscale in #Dropserver, so that I can access my stuff without risking my instance to the "background radiation of the internet" (great term!)

mastodon.social/@Viss/11486411

MastodonViss (@Viss@mastodon.social)Attached: 1 image if you put a webserver up on the internet. anywhere, hosting anything, you will see "the background radiation of the internet", and it looks like this:

I have a very weird issue with my #tailscale + #mumble server setup:

I have a murmur (mumble) server that binds to the tailscale interface on my server.

I have shared that endpoint with a friend and we're both connecting via tailscale to that mumble server to talk.

Every few minutes (3, 5, something like that), one of us gets reconnected. Mumble (client) says "Server failed to respond to TCP ping". On the server it says (murmur log): "Connection closed: The remote host closed the connection".

The tailscale log on the server says something like "adding connection to derp-* for ..." at that very moment of reconnecting.

How to debug this issue? I don't even know where to start. It looks like (to me, as a networking noob) that tailscale reconfigures connections and breaks the mumble connection.

#followerpower #linuxadmin #NetworkEngineering #networking #sysadmin

CC @tailscale

Please boost :boost_ok: