Lifebandit666

joined 1 year ago
[–] [email protected] 5 points 8 months ago* (last edited 8 months ago)

Awesome.

Adguard and piHole share a lot of features and I've spent time with both of them. I liked phole a lot but I have kids and one feature I liked about Adguard was that I could set up groups (so the kids get a group and essential services get another) and I could in theory just switch off internet to the kids' devices as a punishment, or even services like Fortnite or whatever.

So that's why I picked Adguard.

Now before I bought my server pc I bought an old Nighthawk router/modem on eBay specifically because I could use it to replace my ISP router that was locked down (seriously, everyone in the building uses this ISP and all the WiFi bands are the same!) I can lock devices out of the WiFi with that now if I do desire, but honestly the threat is enough so far lol.

First thing I did was send DNS to Adguard. I have run DHCP through Adguard before and it just jammed up and worked a bunch of times until I had to change it back or withstand ear bashings from my 10 year old because it kept killing his online gaming.

So as far as I can see, I don't have to use the DHCP feature to resolve the names to ip addresses, since the IP address resolves to the name via a domain name server, DNS, the Adguard, right?

I was considering .Lan but I like your .ourhome idea. We live in an old church and have The-Crypt (it was gonna be de-crypt but I changed my mind last minute) as the WiFi address so .crypt is sounding good.

[–] [email protected] 2 points 8 months ago

I just clicked on it to see. "This site does not have a certificate"

My internal servers are the same, all http. But I started self hosting 2 weeks ago...

[–] [email protected] 3 points 8 months ago (3 children)

My new workplace has a web portal to give jobs to the maintenance team, and the web browser says "Insecure" in the corner.

My self hosted stuff has that too. Difference is I plan to learn how to do something about it

[–] [email protected] 1 points 8 months ago

As another noob, Tailscale is great.

I've been playing with VPNs for a week or two, can't get anything running. Then I remembered I have Tailscale installed on my Home Assistant and I opened it up on my phone and connected up

And now I can access my network at work, and can use WhatsApp when I'm connected to works WiFi even though it's been blocked on their firewall.

I've just been listening to the Self Hosted podcast (who are sponsored by Tailscale) and learned that you can basically do networking with Tailscale by putting everything on the Tailnet. So now I'm going down that rabbit hole.

But I've run Home Assistant for years and used reverse proxies and Cloudflare to access it from outside my network, yet now I'm learning I can just have Tailscale on all the time on my phone and I'm on my own network wherever I am in the world, which is amazing considering I just put an add-on on my HA instance and scanned a QR code.

[–] [email protected] 1 points 8 months ago

This is with Wireguard too, it's just inside OpenWRT.

I've put my Windows VM behind it and checked it's working and it is, but now I can't access Plex and SMB lol, more tinkering when I finish work I guess

[–] [email protected] 2 points 8 months ago

You can do that with Supervised too. I have a tablet on the wall, I'm the only one that uses it lol

[–] [email protected] 1 points 8 months ago

Have a look at my reply to the other guy, I'm pretty sure I've got it working now

[–] [email protected] 1 points 8 months ago* (last edited 8 months ago) (3 children)

Well I've had another go this morning and believe I've managed it. My problem seemed to be that I already had 5 devices in Mullvad through my tinkering, so I deleted one and made a new one (just as an fyi in case you hit the same issue).

So I followed this guy on YouTube to set up an Openwrt router VM https://www.youtube.com/watch?v=3mPbrunpjpk&t=897s

When you are able to route traffic through the VM stop following the tutorial and use this link instead to set up the VPN https://mullvad.net/en/help/running-wireguard-router

And apparently I'm now running the Openwrt router through Mullvad.

I did all the SSH parts in Console and I put my public key into the website through the Mullvad link above and copied the IP addresses from the same page.

So theoretically I just have to set vmbr1 as my bridge to containers and VMS that I want to run through my VPN and set up port forwarding for them in the OpenWRT interface and they'll route through Mullvad

Hope this helps.

[–] [email protected] 3 points 8 months ago (2 children)

Just throw it in a VM and try it out that way if you can. The Docker version is just the Home Assistant part but if you run the VM you can run HAOS which is the "Supervised" version that can install add-ons to. There is a way to run Supervised in Docker but it's not supported (and when my version died it was devastating)

[–] [email protected] 1 points 8 months ago

Not to my knowledge no

[–] [email protected] 3 points 8 months ago (1 children)

Community edition. It's free!

[–] [email protected] 1 points 8 months ago

I probably can get the container way working now I've had some time with it. The problem is routing it through Mullvad. Prowlarr deffo needs to go through it, otherwise it can't see the indexers (I've been using Prowlarr without a VPN for a while and it's much better with it). Debrid doesn't need a VPN I just prefer it to be there

I watched a YouTube tutorial to get an OpenWRT container set up to route traffic through ,and managed to get it working. I struggled however to set the VPN up through it, I feel like I was in spitting distance!

The bonus of using that method was that I could have multiple containers use the OpenWRT container, meaning they would all share the same IP address and just have different ports, so all my Self Hosted containers would be in the same place on my network.

I'll keep plugging away and give pfsense a look. Now that I have OMV running I can kill my Windows server without losing the media

view more: ‹ prev next ›