So for the past few years (?) I have been using wireguard to vpn into (effectively) my firewall and a dynamic dns setup to access that remotely. But with the shitshow that is google domains and the like, this seems like a good opportunity to look into a few of the alternatives. I am not entirely opposed to just going in and changing the dns server once I figure out what I am going to do on that front, but wireguard has always been a bit of a mess to set up for less “tech savvy” people who need access to the home network.

Every so often I see some cloud based solutions get suggested. Which is sketchy but I already have a few alerts set up to be able to remotely shut my network down if wireguard is acting up when it shouldn’t be and shutting down a VM is a lot less of a “do I really need to do this?” than shutting off the entire network. But most of those solutions seem built around selling seats which means they want you to add individual devices rather than just setting up a tunnel.

So is wireguard still the gold standard? Or is there a more user friendly solution that will let me compromise a bit but also have a setup that doesn’t require me to be physically on site to fix the inevitable hiccups because it takes hours of reading articles to understand the setup?

Thanks

  • lntl@lemmy.ml
    link
    fedilink
    English
    arrow-up
    20
    ·
    edit-2
    9 months ago

    If you’re just accessing one device, why not use SSH?

    SSH with pubkey authentication and sane firewall rules is very secure. Bonus points for fail2ban

    • kylian0087@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      9 months ago

      Fail2ban might not be a good thing. You can flood the blacklist.

      You just have to run a continous attack with spoofed source addresses. use IPv6 addresses and just wait until the whole ipv6 space is in the blacklist. by then that file will be huge. might even crash some servers

      • lntl@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        9 months ago

        you’re right and sane firewall rules could prevent this type of attack

    • ErisA
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 months ago

      This is what I do.

      Even if it’s more than one device, assign one that’s reliable as the main, and proxy jump off that to the others. Can even do a dynamic tunnel and get http etc working with socks5.