Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
docker_notes:vpn [2024-12-07 Sat wk49 10:11] baumkpdocker_notes:vpn [2024-12-07 Sat wk49 19:15] (current) – [Privatebin] baumkp
Line 1: Line 1:
 +{{tag>linux docker wireguard openvpn}}
 ======Private LAN VPN Access====== ======Private LAN VPN Access======
 +The scope here concerns use of VPN (Virtual Private Network) to gain secure access from the public network to a local private network.  It relates to private secure access and use from the public network.  It does not consider public VPNs setup for public use.
  
 +There have been considered 3 different levels of access as described by the applications used:
 +  * Nextcloud - a full privately hosted publicly accessible file shareing application, with many additional features
 +  * Privatebin - An encrypted file publicly accessible file sharing server
 +  * Syncthing - A files synchronising system
 +  * Wireguard - A VPN server
 +
 +These applications and their scope are described further below.
 +
 +=====Nextcloud=====
 +Nextcloud is an open source content collaboration platform.  At its core is file-sharing, but it has many other core functions as well as extensibility with additional installed applications.  While Nextcloud can securely share files it is not focused as a **simple**, public, and secure file-sharing platform.
 +
 +I have been using Nextcloud and before that Owncloud from which Nextcloud was forked since circa 2013.  My server setup is described here:
 +  *kptree  [[https://wiki.kptree.net/doku.php?id=docker_notes:docker-nextcloud|nextcloud]] is Docker based setup, that I currently use, since 2022.
 +  *kptree [[https://wiki.kptree.net/doku.php?id=home_server:web_server_setup#nextcloud_setup|nextcloud]] is a VM setup previously I used.
 +
 +=====Privatebin=====
 +
 +  *[[https://privatebin.info/|PrivateBin]]
 +  *[[https://github.com/PrivateBin|Github Privatebin]]
 +  *[[https://github.com/JamesTurland/JimsGarage/blob/main/PrivateBin/docker-compose.yaml|Jims Garage PrivateBin/docker-compose.yaml]]
 +=====Syncthing=====
 +
 +  *[[https://syncthing.net/|Syncthing]]
 +    *[[https://docs.syncthing.net/intro/getting-started.html|getting started]]
 +  *[[https://docs.syncthing.net/intro/getting-started.html|Syncthing Getting  Started]]
 +
 +=====Unison=====
 +
 +  *The Linux Code [[https://thelinuxcode.com/unison-file-synchronization-between-two-servers/|How to Use Unison for Seamless File Synchronization Between Servers]]
 +  *Arch Linux [[https://man.archlinux.org/man/unison.1.en|Unison manual]]
 +  *[[https://www.cyberciti.biz/faq/unison-file-synchronizer-tool/|UNIX / Linux: HowTo Use unison File Synchronizer]]
 +  *[[https://github.com/bcpierce00/unison/blob/master/README.md|GIT Unison]]
 +  *[[https://www.cis.upenn.edu/~bcpierce/unison/|Unison Website]] superseded
 +
 +=====inotify=====
 +
 +  *[[https://www.cyberciti.biz/faq/linux-inotify-examples-to-replicate-directories/|Linux incrond inotify Monitor Directories For Changes And Take Action]]
 +  *
 +
 +=====Wireguard=====
 +I previously successfully setup [[https://wiki.kptree.net/doku.php?id=linux_router:wireguard|wireguard]] on my router.  This was installed on "bare metal" as was the nftable based router firewall. I later installed Bind9 DNS and Kea DHCP programs in Docker containers.  I always run Docker in a VM to prevent Docker's packet filtering from affecting the bare metal firewall rules.  I did not move Wireguard to a Docker container as I did not have the need at the time.
  
 ---- ----
  
 <- docker_notes:docker-dhcp|Back ^ docker_notes:index|Start page ^ docker_notes:fileshare|Next -> <- docker_notes:docker-dhcp|Back ^ docker_notes:index|Start page ^ docker_notes:fileshare|Next ->