This may be a simple question, but I could not find resources on that. Does creating a VPN into my home network using my router increase my attack surface? What are the security implications of that in general?

  • BearOfaTime@lemm.ee
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    7 months ago

    It’s a virtual mesh network.

    I’ve used it to:

    Access a single machine (one client on a machine at home, one client on my laptop)

    Connect multiple machines on disparate networks to each other (each machine has a client and is joined to my TS network)

    Enable complete access to my home network using Subnet Routing (one machine at home has the TS client, with subnet routing enabled)

    Provide access to a single service for anyone using Funnel (one machine at home running TS client, with Funnel configured for a specific service)

    It all depends on how you configure it. I find running Tailscale on a Raspberry Pi with Subnet Routing configured provides most of what I need:the ability to access any device on my home network (including printers, digital photo display, TV, router, etc), from anywhere I install the TS client.

    • brownmustardminion
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      7 months ago

      I’ve tried Nebula before but couldn’t get it running properly on all devices. How is Tailscale in terms of compatibility and can you also use wireguard simultaneously? Mesh networks are great for connecting my own devices and servers, but I still need a wireguard interface for certain servers to provide public access through a public router. I also ran into a major issue setting up Nebula on my laptop in which it couldn’t be used without disabling my VPN. Is any of that a problem with Tailscale? Also, is Tailscales coordination server self hostable or do you have to use theirs? That seems like a dealbreaker if you’re forced to use a third party coordinator