I’ve managed to set up a baikal server to sync my calendars and tasks instead of using a free cloud service provided by nextcloud. I’m able to reach it from beyond my local network, but this is all very new to me and I’m a little worried about what permanently leaving a port open for this.

I’m hoping to find some resources for securing this, before leaving it up all the time. I suppose as an alternative I can always only run it at home and only sync when I’m home but this seems less ideal.

Thanks a bunch for the help in advance. I really appreciate it.

@BitSound@lemmy.world
link
fedilink
English
21Y

Yeah, when you configure it, you essentially say “all traffic to 1.2.3.0/24 should go through this wireguard connection”. Then, your OS automagically knows “oh, this connection to 1.2.3.4 should go through Wireguard, and I’ll handle it like so”. You don’t have to configure any applications specifically, their network connections just get routed appropriately by your OS.

@Corr@lemm.ee
creator
link
fedilink
English
11Y

So I’m just taking a look at wireguard on android. I just need to point a specific address to wireguard and it takes care of it then? This seems relatively straightforward to configure.

Last question (hopefully). I’m running this server off a pi with bullseye. The guide on their site for setting up a server uses buster but the client uses bullseye. The buster version needs to setup unstable release packages but the bullseye client doesn’t. This should mean that I’m good to just grab the default Debian package on bullseye?

Thank you very much for your help with this!

If you want an (even) simpler wireguard setup, you could also look into https://pivpn.io/ for the server side.

@Corr@lemm.ee
creator
link
fedilink
English
11Y

This seems promising for simplicity. I’ll check it out!

@BitSound@lemmy.world
link
fedilink
English
21Y

Yeah, you’ll also need to configure your server to whitelist your phone, and then everything should just work. And yeah, you should be able to just use the default deb package on bullseye.

@Corr@lemm.ee
creator
link
fedilink
English
21Y

I think I’ve configured it all (using the the link the other person sent). I think I screwed up the port forwarding tho and I’m not home to fix it for now.

Everything looks like it should work but only time will tell lol. Thank you again for your help!

@Corr@lemm.ee
creator
link
fedilink
English
1
edit-2
1Y

So I got home and fixed my port-forwarding rule, but I can’t get my phone to connect. That aside, I’m now a bit lost as to how to get access to baikal , or anything else… I can’t seem to find any resources that explain how to do this either. Do you know of anything I can read to try to set that up?

Edit: I sorted out reaching the baikal server from the VPN. Still working on getting my android phone to work with wireguard tho :/

Edit: I apparently can’t read and mistyped a key value. Turns out everything has been working this whole time 🤦

@BitSound@lemmy.world
link
fedilink
English
21Y

I unfortunately can’t really offer much advice here. I configured Wireguard on my phone by essentially copy/pasting the configuration from my laptop and changing the values as necessary like the public key and client IP address. Turned it on, it activated VPN mode in Android and everything started working.

I guess make sure you haven’t mixed up your public/private keys, your server knows about the new device (and is restarted), and your phone is using the right IP address as basic troubleshooting steps.

@Corr@lemm.ee
creator
link
fedilink
English
11Y

I added a final edit where it turns out I just mistyped the public key and the rest of the config was completely fine. Oops lol. Thanks for your input on this I really appreciate it. Now final question. Since my server now works on a whitelist basis, it should be reasonably safe to leave the port open indefinitely going forward? If not, is there more I should consider doing to increase security?
Thanks again :)

@BitSound@lemmy.world
link
fedilink
English
21Y

Security is a gradient that depends on your threat model, etc, but unless you’re being targeted by a nation-state or something that should be plenty secure

Create a post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

  • 1 user online
  • 279 users / day
  • 589 users / week
  • 1.34K users / month
  • 4.55K users / 6 months
  • 1 subscriber
  • 3.49K Posts
  • 69.8K Comments
  • Modlog