stratself

joined 1 month ago
[–] stratself 1 points 1 day ago* (last edited 1 day ago)

Rsync depends on OpenSSH, but it definitely isn't SFTP. I've tried using it against an SFTPGo instance, and lost some files because it runs its own binary, bypassing SFTPGo's permission checks. Instead, I've opted for rclone with the SFTP backend, which does everything rsync do and is very well compliant.

In fact, while SFTPGo's main developer published a fix for this bug, he also expressed intention to drop support for the command entirely. I think I'm just commenting to give a heads up for any passerby.

[–] stratself 1 points 2 days ago (1 children)

Hi, I think OP wants their sibilings to directly connect to their PC, skipping any relays, even if it's their VPS.

But if you are comparing setting up your own VPS instead of relaying through Tailscale's DERP, then the answer is... it depends on the distance and whether you can establish VPS->Local VM direct connections.

I found opening a specified port for Tailscale on the VPS to help with direct connections with CGNAT'd peers. I'm not familiar with Pangolin, but I think the same principle applies as long as at least one address:port combination is agreed between Wireguard peers.

If I'm being honest though, before doing all this, try asking your ISPs for IPv6 to avoid these cumbersome things together.

[–] stratself 4 points 4 days ago* (last edited 4 days ago) (3 children)

If both your Jellyfin server and your siblings are behind residential CGNAT, then high chance your connections are relayed through Tailscale's DERP servers. You can check with tailscale ping-ing your sibilings' nodes.

If this is the case, you may consider selfhosting your own DERP somewhere close to you, but I'd argue the performance gains are minimal compared to the extra costs. Another solution would be to enable IPv6 for both you and your siblings, skipping NAT traversal. I just hope both ISPs support it and support it properly in $CURRENT_YEAR.

This is all assuming you can direct play (i.e. not transcoding) your media. If you're transcoding, then it's good to look into hardware acceleration like the other comment mentioned, too

[–] stratself 1 points 2 weeks ago* (last edited 2 weeks ago)

try adding the sysctls parameters to your docker container too

[–] stratself 2 points 2 weeks ago (2 children)

Is there a way for a Wireguard peer to advertise AllowedIPs similar to Tailscale's subnet routings? If that's right, perhaps you can configure your host's address as one of the AllowedIPs on the OpenWRT peer, and skip port forwarding too

[–] stratself 2 points 3 weeks ago* (last edited 3 weeks ago)

Two separate functions should go into two separate nodes

  1. Run Tailscale binary on host. Connect to Jellyfin server using that node's IP address.

and

  1. Run Gluetun + another Tailscale instance in containers. Don't use host networking, use bridge or something else. Connect to that node as an exit node

As an (advanced) alternative to Gluetun + Tailscale I propose tswg (my project)

[–] stratself 1 points 3 weeks ago* (last edited 3 weeks ago)

I've vaguely thought about this with Split DNS.

My concern would be the need to set up some non-Tailnet mechanism to expose it to the internet and keep it secure. Either port forwarding, Pangolin, or even using Funnel... all of which would be better off on a separate device (and maybe a separate VLAN)

It'd be an interesting idea for sure, perhaps for when I can get myself the separate Headscale-dedicated device. Although now I'd have to learn the "normal" zone-based networking ahah

[–] stratself 3 points 3 weeks ago

That's a nice thing with Wireguard yea. I'll keep this in mind if ever I can grok Tailscale to do such things

[–] stratself 17 points 3 weeks ago* (last edited 3 weeks ago)
  • DNS adjustments aren't needed if you do .well-known delegations which is easier
  • Can recommend continuwuity, it runs much better on less resources. Lacks certain features compared to Synapse but overall good
  • Notifications (and read markers) depend on client-specific black magic to work
  • Federation do sometimes silent-fail completely, you can reset continuwuity's cache + restart when that happens. But full room history convergence needs patience
  • Don't join large rooms unless your server can handle the load
  • Don't host public rooms without modbots

The many small bugs make Matrix still bad - I wouldn't recommend a non-tech user unless accompanied by a 24/7 admin. It is trying to improve but very slow because of reasons

[–] stratself 4 points 4 weeks ago

Should've specifically asked the operators/hosters if they need a better answer. But this has more engagement so

[–] stratself 2 points 1 month ago* (last edited 1 month ago) (1 children)

Worth noting that there's an open issue to support Wireguard peers into Headscale, so you could use it with e.g. a wg0.conf file from a commercial VPN

[–] stratself 2 points 1 month ago* (last edited 1 month ago) (1 children)

If you can selfhost and can use containers/docker, I wanna shamelessly plugin my solution: https://github.com/stratself/tswg. Basically mount a WireGuard config from Nord or any upstream VPN, and the container will tunnel traffic to said VPN when you choose it as an exit node.

There are other gluetun + tailscale solutions that are worth a look too

 

Hi all. Per the title, I'm looking for something that:

  • Can run as an unprivileged user inside a container

  • Allows OpenID Connect authentication for a multiuser setup

  • Doesn't take hostage of my CPU

Homarr and Dashy are featureful solutions, but they can't run unprivileged in docker. Dashy closed this issue, but in fact it's not resolved. Meanwhile Homarr does work with UID/GID env vars, but starting as root and dropping capabilities is not the same as defining user: 1234:1234 from the get-go. Furthermore, they are really heavy node apps, which kinda deter me from deploying.

I neither wanna use my reverse proxy with forward auth or having an extra oauth2-proxy container, so Organizr (using forwarded auth headers) or Homer/Homepage/bunch of static pages behind a reverse proxy is out of scope.

Feature-wise I'm just looking for a beautified link keeper, preferably with multiple dashboard mapped to different user groups (ideally it could be done via custom OAuth metadata/claims). Fancy plugins like RSS and weather are not needed, but appreciated.

With all that said (and sorry if I'm too choosy), is there a current solution that fits the bills above? My IDP's UI is quite rudimentary, but I can resort to using it as a "homepage". I wanna thank in advance for any guidance

P/S: Seems like most dashboards fall into two categories - bloated fancy apps, or dead simple frontpages. It'd be nice to have something inbetween.

view more: next ›