nobody @nobody - 11mo
TheSameCat’s relay will be coming off of Cloudflare sometime in the next 24 hours, depending on where you live. Going forward none of my publicly facing projects will be hosted on Cloudflare. #relays
They are not privacy friendly, have been caught engaging in some shady business practices multiple times, and my members have requested it. It’s been planned for a while, but I needed an alternative that I liked first, and some time to watch things and make sure nothing breaks. 😳
Doesn’t seem to be a good place to be any more.
Depends on how you’re using the tunnel. Are you exposing a service to the web? TBH the answer is probably Tailscale. Not quite self-hosted, but much more private. Let me know a bit more about how you’re using the tunnel.
I would recommend checking out Tailscale Funnel. It sounds like what you need, and they have a higher reputation for privacy, etc. Your IP will not be revealed. I use Tailscale a LOT.
David @mleku - 11mo
i have a VPS that i only run a wireguard server and a reverse proxy, which i can use to point at wireguard client addresses it also lets me use teh public IP of the VPS, which i point all of my domains to, meaning i can turn these domains into paths to my little test server lets me get around the problem of web clients, it gives me both a public address and TLS certificate i haven't considered the idea of adding an access limit to particular reverse proxied mappings though, that would be neat for getting the best of all worlds you would be able to blanket do that for the reverse proxy using iptables, or, extending the mapping syntax to enable specifying an access whitelist https://github.com/mleku/lerproxy is the reverse proxy, it also gives you nip-05 and #golang vanity import redirections currently PRs for a origin filtering syntax most welcome
now that i've heard/had the idea i may just add this feature myself
https://tailscale.com/kb/1223/funnel Meant to post that above. Enjoy!