Which route did you go for your homeland, a tunnel to your services or setting up tail scale/wireguard and access them on your trailer?
I have wireguard, it’s supported by my router (Fritzbox).
Nice, I have to take a look if mine supports it, too!
same here, took me 7m to set this up on OPNsense with FritzBox
tailscale. works perfectly, the only problem is needing a google acc for login
And that years back they moved their servers from Canada to the US. That’s when I dropped TS and just did wireguard by hand.
Netbird allows email & TOTP 2FA.
You can use GitHub.
That’s not really a solution.
the only problem is needing a google acc for login
You can use e-mail now.

No, you cannot. Putting in your emails just redirects to the identity provider you used when signing up. If you try to create an account you’ll see that email’s not a option.
is it possible to switch to email from my google acc tied account? or do i need to create a new one?
I haven’t looked into it yet, I’m in the same position of using Google to login.
I just noticed that the login page changed.
I believe registration is limited to a third party/OIDC. The login page is different to sign-up
third party/OIDC.
Ah, that makes sense
I am very happy with Tailscale
I do run wireguard on my router, but the main reason is ad blocking, not hiding services. Most services are publicly exposed.
Nice, I thought about using wireguard as a private VPN, too. Having my pihole block my mobile data on the go would be neat
It really is!
Wireguard.
Dunno if Cloudflare does effective auth for the tunnel or if you have to set that up yourself, but I don’t bother trying to expose services to the internet in any way because some of this stuff was just never designed for proper web security (cough Jellyfin).
It’s still worth setting up a wildcard cert with ACME so you get nice https and a real domain.
Cloudflare has some opt-in auth. Mail-OTP is a nice balance imo: You can allowlist mail addresses per service/subdomain and set expiry for each. Then for access, you first have to enter the mail address, get the OTP and then access the service.
So, nobody without access to allowed mail addresses even gets to knock on you door.
But yeah, that’s why I think about going tail scale: why bother having something exposed when not needed?
I just think, some services might be nice to provide to friends, too - and having them connect to my tailnet for this is a bit too much friction, I guess
Pangolin on a free Oracle VPS.
How about both? I run the evil Cloudflare Tunnels/Zero Trust with Tailscale as an overlay on the server.
I’m a bit stumped, what do you gain from this setup?
Or do you mean just running some services through the tunnel for easy access and “hide” others behind tailscale?
what do you gain from this setup?
- Defense in Depth
- Network segmentation
- Fallback
Temp stuff where I could care less about the free tier domain name or things that I just want to funnel to my existing devices: Tailscale
Widespread, prolonged services that will be more actively maintained for a longer amount of time and can just spin off of its own domain/subdomain: Cloudflare
Both are great.
- option 3: self-host Netbird control plane
- option 4: use Netbird’s reverse proxy
Netbird via a free cloud VM. Works great.
Who provides free cloud VM?
Nice, I’ll look into that!
Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:
Fewer Letters More Letters DNS Domain Name Service/System IP Internet Protocol VPN Virtual Private Network VPS Virtual Private Server (opposed to shared hosting)
[Thread #265 for this comm, first seen 30th Apr 2026, 19:30] [FAQ] [Full list] [Contact] [Source code]
Headscale on fly.io
I actually have Wireguard running on a pi zero 2, all it really does is provide me my pihole DNS.
Edit:
I should say I have pihole running on a couple of pi 5’s currently, overkill yes but one of my pi 4’s was sacrificed to the whims of magic smoke another was donated to a friend and another now hosts HAOS, I have a few pi zero 2’s (only one was sacrificial) the one that hosts wireguard has one of my last few working SD cards. The pi 5’s host many other things other than just pihole.
Taking do one thing, but do it good to the next level, nice!
I thought about getting a pi zero also just for the pi-hole. But my pi3b holds up pretty good, still
In the not to distant future I will be retiring wireguard from that pi zero 2 and turning it into a pots server. I have grand ambitions to make a better home lab with a few more pi’s and to help me get away from big tech more.
The only thing google I have is an email I do not use but so I can watch YouTube, but I use unwatched to block ads.
The only thing apple is my iPhone and my iPad, when it becomes time to replace those I will have to figure out graphenOS and some Linux distro for a tablet of some sort.
Wildcard dns with port 80 & 443 port forwarded to traefik with tinyauth & fail2ban
Did you get a static public IP from your ISP?
No, I use dynamic dns
Zerotier. I found it easy to set up and use. Free tier gives you one network and ten hosts, I think.




