Collaborate: VPN or Open Access?
from schjefer@feddit.org to selfhosted@lemmy.world on 28 Mar 21:02
https://feddit.org/post/27754879

Hey folks,

I‘m new in the HomeServer business. So I started with two little applications on my Proxmox: paperless and do most

In the next time I’ll start a little project to collaborate more. Current I connect to my HomeServer with VPN. But if other people start connecting to my instance it would be useful to get an other secure system.

What is the way you prefer to give other people like your fam or friends access to your services (e. g. nextcloud)?

Thanks for helping an newbie!

#selfhosted

threaded - newest

hendrik@palaver.p3x.de on 28 Mar 21:13 next collapse

I’ll just open them up to the internet via an nginx reverse proxy. Make sure sign up is disabled in the applications, and something blocks people from brute-forcing passwords. Pretty sure Nextcloud comes like that per default. And I’ll do updates. And see if I can run stuff in containers or seperate users so in the unlikely case something happens, access to one of my services doesn’t compromise the entire server.

Lots of other people use VPNs though. Like Wireguard, Netbird, Tailscale…

pgo_lemmy@feddit.it on 28 Mar 22:22 next collapse

I wouch for the VPN route… VPN servers are built to be exposed, are hardened/engineered to resist the harshness of the net and are somewhat safe even with default settings.

Should you publish on the wild a few web apps, you would have to harden, monitor and manage a bunch of environments and/or frameworks with a load of quirks each.

A VPN is easier to maintain and safer for your data with a lower effort.

irmadlad@lemmy.world on 29 Mar 14:08 next collapse

I wouch for the VPN route…

Found Barry Kripke

schjefer@feddit.org on 29 Mar 18:38 collapse

At least of all the answers I prefer your way the most. So you set up a WireGuard access for all of the devices of your users on your router or did you install the vpn-system directly on the homeserver?

tea@lemmy.today on 28 Mar 22:36 next collapse

I do both. Wireguard VPN for anything that’s just me. Expose via nginx proxy for things that are shared with friends and family.

irmadlad@lemmy.world on 28 Mar 22:37 next collapse

I don’t give access to any of my services to anyone, especially family or friends. LOL However, you could investigate Tailscale, Headscale, Wireguard. Additionally, if you set up Cloudflare Tunnel/Zero Trust, you can give individual users a unique access to your server. For example: You can allow alice@mysupercoolserver.com to access home.mysupercoolserver/shell but deny bob@mysupercoolserver.com. Only allow bob access only to home.mysupercoolserver/media.

Decronym@lemmy.decronym.xyz on 29 Mar 00:20 collapse

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
NFS Network File System, a Unix-based file-sharing protocol known for performance and efficiency
SMB Server Message Block protocol for file and printer sharing; Windows-native
VPN Virtual Private Network
nginx Popular HTTP server

4 acronyms in this thread; the most compressed thread commented on today has 5 acronyms.

[Thread #197 for this comm, first seen 29th Mar 2026, 00:20] [FAQ] [Full list] [Contact] [Source code]