I did not intend to be toxic.
Atemu
No. That's quite literally the point of a proxy. If you don't want to be proxied, don't use a proxy.
I know this is the selfhosted community but if you're new to this, you really shouldn't be hosting email as it's one of the hardest services to get "right".
(Ideally no other public service either, they're a huge liability. Start hosting stuff for local network use.)
VPN use will functionally make it like you’re on your home network. VPN access to your network should not be given to tons of people if at all possible.
Note that Tailscale does not give other users access to your entire home network but just specific machines and you need to explicitly share those machines.
Even has a KVM for emergency access ;)
It's not and it's insane. TDP is a fucky "metric".
https://ifconfig.me/. Can also be be curl
'd.
Easier to remember is to just search for what is my ip
in clear net DuckDuckGo (or Kagi if you have it).
they all ask for CAPTYA which is an obvious attempt to obtain ones true IP.
How exactly is a CAPTCHA supposed to discover your "true IP"?
Also note that your IP address is by far not the only thing used to fingerprint you. See https://abrahamjuliot.github.io/creepjs/ and https://browserleaks.com/.
Use TOR browser if you want your starting conditions to be reasonably anonymous.
Even more critical for fingerprinting is user behaviour though.
The hiding of internet traffic is also a proxy thing, not necessarily a VPN thing.
Note that what is typically referred to a "router" in a home setting is actually many different devices/services in one. It's usually a combination of router, switch, firewall, DHCP server, DNS server, Wireless Access Point, modem and probably a couple other things I forgot.
DHCP is a protocol where the "router" tells the devices that it is the gateway.
Not at all. A VPN can be used as a proxy but that's not what they were intended for.
There’s only one route to an IP.
That's not true. There's an infinite numer of ways to route IP addresses on the internet in fact. Most of them are useless however.
your VPN server can try spoofing its outbound traffic to use the client’s IP, but it’ll most likely get discarded by the ISP because it only allows your IP to go out. But even if you can, the answer to those packets will go to the client’s IP, which will go directly to the client and not the VPN.
Mission accomplished? This may be what OP wants? Really not sure.
I completely misread your post. Your issue isn't outbound connections appearing as if they came from your VPS, it's inbound connections to your local mailserver being proxied.