this post was submitted on 12 May 2026
69 points (98.6% liked)

Selfhosted

59110 readers
594 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I wanted to move away from Tailscale but found Headscale a bit too convoluted for what I actually needed.

Ended up with a simple WireGuard setup using two VPSes: one as a VPN hub, the other acting as a reverse proxy back into my home lab.

It lets me expose services publicly without any inbound port forwarding on my home connection.

top 12 comments
sorted by: hot top controversial new old
[–] kwarg@mander.xyz 8 points 3 hours ago* (last edited 3 hours ago)

None of this is especially complicated

It is for an absolute noob like me... i need vacation so i can start learning all this networking jargon.

Thank you for sharing though!

[–] AcornTickler@sh.itjust.works 1 points 1 hour ago (1 children)

What did you not like about Headscale? I started using it recently and it seems fine so far. Works identically to Tailscale.

[–] TheIPW@lemmy.ml 1 points 1 hour ago

It's not that I didn't like it, I just wanted to back to basics! A simple config file on each machine, job done

[–] stratself@lemdro.id 1 points 1 hour ago

The article makes sense. I think it's good to note that if the services you're running makes outbound requests (e.g. a Matrix homeserver), you could also tunnel outbound traffic to the same VPS as your inbound, so your residential IPs won't be leaked.

I've written about a similar setup, but for Tailscale nodes, here.

[–] brewery@feddit.uk 6 points 3 hours ago (1 children)

Just to clarify for my simple brain - vps1 has just 80/443 open, vps2 just has a wireguard port open (51825 or whichever). Vps2 has no domain pointing to it's public IP, vps has your domain pointing to it. Vps1 and home server have wireguard configs pointing to the vps2 public IP, so punch through automatically. Is that all correct?

I think I have the same setup but with vps1 + 2 combined but that means it's public IP is easily found by the domain (one includes a public business website) and has WG ports open (although my understanding is this in itself is not an issue as WG gives no reply)

Have you opened an SSH port on both vps1 and vps2 for backup or happy to rely on wireguard? Thinking about it, you could open up the port on the vps but use the providers firewall to block the port - if needed can login to their site, open the port and then SSH in - would this work? They have KVMs for emergencies but just trying to think of worst case scenarios.

[–] TheIPW@lemmy.ml 1 points 3 hours ago

Exactly that, VPS2 handles the WireGuard port and has no domain pointing to it, so it’s basically hiding in plain sight. VPS1 holds the domain and handles the web traffic.

I keep SSH open on both, but locked down (key-based auth + restricted to my IPs).

Your idea of using the provider firewall (Ionos in my case) as a “mechanical” lock is a good one, block it at the edge and only open it when needed. I’ve thought about doing that, but I’m generally happy relying on a hardened SSH config and the provider’s KVM if everything goes sideways.

Netbird could be a nice alternative.

https://github.com/netbirdio/netbird

[–] slazer2au@lemmy.world 13 points 6 hours ago (2 children)

Might want to have a look at your mobile site, it seems to cut stuff off on Firefox for Android.

[–] TheIPW@lemmy.ml 15 points 6 hours ago (1 children)

Thank you for the heads up, turns out it was the custom html code in the code blocks causing the issue. Fixed now.

[–] Strit@lemmy.linuxuserspace.show 8 points 5 hours ago

Yeah, seems fixed. Thank you.

[–] Strit@lemmy.linuxuserspace.show 7 points 6 hours ago

Seems to be a fixed width site, indeed.

[–] Decronym@lemmy.decronym.xyz 2 points 3 hours ago* (last edited 55 minutes ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
IP Internet Protocol
SSH Secure Shell for remote terminal access
VPS Virtual Private Server (opposed to shared hosting)

2 acronyms in this thread; the most compressed thread commented on today has 9 acronyms.

[Thread #286 for this comm, first seen 12th May 2026, 13:20] [FAQ] [Full list] [Contact] [Source code]