• 0 Posts
  • 115 Comments
Joined 3 years ago
cake
Cake day: July 23rd, 2023

help-circle

  • I was doing basically this with a different sync tool, but I had a couple issues with it:

    • If I needed to toggle ad blocking I had to go toggle it on both pihole instances
    • When troubleshooting an issue I had to check two log sources, or disable one and then reproduce the issue again
    • Sync was one directional so I could only make configuration changes from the primary instance

    I’ve been a very happy Pihole user for years and years and Pihole 6 is the best yet, but once you’re dealing with multiple pihole instances, Nebula Sync and Unbound, then Technitium is actually simpler to manage since it does all that natively.








  • I avoided tailscale for so long because I was already using wireguard and I didn’t know you could self-host with headscale. But once I started using it with headscale the mesh design really is a big improvement to usability. I don’t miss having to carefully manage my config files and ip route rules.

    I need to get setup with app connectors and then I think it’ll finally be a high enough wife-usability factor for me to remove some things I still have exposed over the internet.


  • DERP is the service that actually relays packets between tailscale connected devices when they are crossing a NAT (leaving one private network and going across the internet to another private network).

    If you host headscale (the self-hosted community version of the tailscale control plane) and use it with tailscale, by default it will still use the public Tailscale DERP servers. Your traffic is still encrypted and not visible to them, but it does still rely on part of their centralized architecture even though you are hosting the control plane yourself.

    That being said, you can just use the embedded DERP that ships with headscale, although there are some other considerations when doing that because it will need to be publicly on the internet, probably with a proper domain name and publicly trusted certificate.



  • You can self host the control plane for Tailscale using a community project called Headscale. I use that along with Headplane which gives you a nice admin web UI.

    Then you just use the tailscale client on devices like normal but you authenticate new clients with your endpoint instead of the centralized one.