I’m currently running both a home server and a VPS. The former is not reachable through the internet, only through vpn. The latter hosts public services.

The VPS is regularly cutting it very close with storage and today I messed up and crashed the whole stack trying to make an impromptu backup. Lesson learned: we need more storage! I could just rent more storage but just today I updated my home server with 16 TB of raid 1 enterprise HDDs.

So I thought I could maybe do a (wireguard) VPN tunnel directly to some storage service that I host on my homeserver. The upload is not great but realistically I dont need much. The important stuff stays on the VPS. Mainly videos, pictures and other stuff that doesnt get accessed a lot should go there. The rest should be “cached” at the VPS.

I would have to host wireguard on a server port, only have it access one folder which doesnt contain anything important, forward the port on the router and have the vps have the keys. Even if someone gets into the VPS and steals the keys, they only get that one file storage folder.

Has anyone done this? Are there services that do this or do I just host wireguard and thats it?

Thanks for reading. Have a good one! :)

  • Dran@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    7 months ago

    You should consider reversing the roles. There’s no reason your homelab cannot be the client, and have your vps be the server. Once the wireguard virtual network exists, network traffic doesn’t really care which was the client and which was the server. Saves you from opening a port to attackers on your home network.

      • TCB13@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        7 months ago

        You can also configure your server to only accept traffic on the VPN port coming from your home IP address if you’ve a static one. Or… only allow incoming connection from your country (https://wiki.nftables.org/wiki-nftables/index.php/GeoIP_matching). This will provide you an extra layer of security.

        Either way don’t be afraid to expose the Wireguard port because an attacker won’t even know there’s something listening on that port as it will ignore any piece of traffic that isn’t properly encrypted with your keys;

  • solrize@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    7 months ago

    Tbh I sometimes sshfs mount a vps onto a home machine but doing it the other way around doesn’t seem worthwhile. The idea of a vps is that it’s in a data center, has tons of bandwidth, backup power, you can set up a failover scheme if you need high availability, etc. Stuff like media is on your home server so you can use it locally, and maybe it’s backed up remotely just in case, but doesn’t need to be live mounted. That said, I’m used to home internet being unreliable compared to VPS, so mounting it to a vps sounds flaky.

    If you want more storage on your vps, just get a bigger one, I would say. Or if you want tons of remote storage, get something with better connectivity.

  • istanbullu@lemmy.ml
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    7 months ago

    I have a orangepi at home with a 2tb usb disk. I made it reachable via wireguard, and works very well as a samba server. No need to open any ports.

    • haui@lemmy.giftedmc.comOP
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      7 months ago

      Very cool.

      How exactly did you manage to make it available without forwarding a port? If the server is behind your routers with no way through, a vpn shouldn’t reach it either.

      • BreakDecks@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        7 months ago

        A VPN eliminates the need for port forwarding.

        Edit: Not talking about a “privacy VPN”, but an actual VPN that lives up to the name “Virtual Private Network”, where you are connecting to the private network you wish to access.

        • haui@lemmy.giftedmc.comOP
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          7 months ago

          I totally get that with a vpn that goes from a device within a closed network to a public one but my impression was that the commenter before me meant going from a public device to a device in a protected network which I found hard to believe

          • zooi@feddit.nl
            link
            fedilink
            English
            arrow-up
            2
            ·
            7 months ago

            They said “no need to open any ports” but that is false. The wireguard port obviously has to be opened for the VPN to work.

            • haui@lemmy.giftedmc.comOP
              link
              fedilink
              English
              arrow-up
              2
              ·
              7 months ago

              Thats how I view it as well. I love to learn so I‘m not evasive of the idea that I missed something. But from the downvotes and no meaningful answers except yours I derive that there might be a misunderstanding.

          • BreakDecks@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            ·
            7 months ago

            going from a public device to a device in a protected network

            You mean the literal function of a VPN?

            • haui@lemmy.giftedmc.comOP
              link
              fedilink
              English
              arrow-up
              2
              ·
              7 months ago

              I‘m not sure you understand how a vpn works. It usually connects to the outermost part of a network (the router in my case) and then enters through there. The vpn port is always open and thats why I asked since you said thats not the case. (Incase that comes up: there are setups where another port is used for „knocking“ and opens up the entry port. Still one port has to be open to receive anything)

              Also, you have no reason to talk down to me. We might have had a misunderstanding here, idk. I‘m just asking to find out what you meant.

              • BreakDecks@lemmy.ml
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                7 months ago

                No shit the VPN requires an open port, I never said otherwise, but if your router is the one running the server, you aren’t forwarding the port. The router itself is listening on its WAN interface.

                The VPN prevents you from having to forward any ports, because the router allows you to tunnel in. The only open port will be whatever port the VPN server listens on, and it isn’t a forwarded port.

                Source: I literally work at a VPN company.

                • haui@lemmy.giftedmc.comOP
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  arrow-down
                  1
                  ·
                  7 months ago

                  I hope you dont work in a customer facing position then. You literally have no idea how to talk to someone in a respectful manner.

                  So, my initial take was correct. You do need an open port and if you want your router to manage it, you have to isolate the vpn from the rest of the network.

                  Anyway, since this isnt going anywhere and you keep being irritating, I‘m gonna call it. Good luck with that attitude.

      • istanbullu@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        7 months ago

        You need to have one member in the vpn that has a public ip address.

        Also my internet provider at home gives ip6 addresses that are public.

    • N0x0n@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      Well, you still have to open wireguard’s UDP port to make it reachable outside your LAN.

      Just sayin’ 🤷

      • istanbullu@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        7 months ago

        I also need to plug in the ethernet cable 🤣 I assumed this was a given.

  • Max-P@lemmy.max-p.me
    link
    fedilink
    English
    arrow-up
    4
    ·
    7 months ago

    For the backup scenario in particular, it makes sense to pipe them through right to the destination. Like, tar -zcv somefiles | ssh $homeserver dd of=backup.tar.gz, or mysqldump | gzip -c | ssh $homeserver dd of=backup.sql.gz. Since it’s basically a download from your home server’s perspective it should be pretty fast, and you don’t need temporary space at all on the VPS.

    File caching might be a little tricky. You might be best self host some kind of object storage and put varnish/NGINX/dedicated caching proxy software in front of it on your VPS, so it can cache the responses but will ultimately forward to the home server over VPN if it doesn’t have it cached.

    If you use NextCloud for your photos and videos and stuff, it can use object storage instead of local filesystem, so it would work with that kind of setup.

  • h3ndrik@feddit.de
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    7 months ago

    You could self-host a S3-compatible storage bucket with something like MinIO or Garage.

    S3 backends are available in a lot of software and it’s kinda made for a similar use-case. I don’t know which projects have caching available in a way that aligns with your setup. But I found these two being easy to set up.

  • harsh3466@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 months ago

    Also been thinking about doing something like this. Would love to hear about your experience deploying it.

  • sunstoned@lemmus.org
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 months ago

    My solution is to use Rathole. I rent a wildly cheap (2 core, 4GB memory) VPS and basically just run Traefik there. Then I use Rathole to make some services hosted on my desktop available to Traefik.

    I like this solution better than Wireguard for my application. It reduces attack surface to services you’ve explicitly set up, rather than a full data layer trunk between your machine and a potential malicious actor.

  • Cyclohexane@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 months ago

    I’ve been wanting to do this exact thing. I already have wireguard setup. Please update us if you do this.

  • Jeena@jemmy.jeena.net
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 months ago

    I haven’t done it yet but I plan on doing it. But I never bothered with a VPN and just expose a ssh port. So I plan just to mount a directory with sshfs.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    7 months ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    HTTP Hypertext Transfer Protocol, the Web
    IP Internet Protocol
    UDP User Datagram Protocol, for real-time communications
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)
    nginx Popular HTTP server

    5 acronyms in this thread; the most compressed thread commented on today has 12 acronyms.

    [Thread #701 for this sub, first seen 22nd Apr 2024, 11:05] [FAQ] [Full list] [Contact] [Source code]