Pangolin Proxy Protocol
This post shows you how to set up a fully encrypted pangolin proxy that does not get decrypted in the VPS. There are some pros and cons so choose wisely!
This post shows you how to set up a fully encrypted pangolin proxy that does not get decrypted in the VPS. There are some pros and cons so choose wisely!
This post will guide you to setting up your own Jellyfin *arr stack with VPN. That means an automated pipeline and the privacy of proton vpn. If you want the full Proton experience, check out Proton Pass.
This post is all about requiring mTLS through a CloudFlare proxy. It's actually not very difficult to set up and is a great alternative to using zero trust.
Having CrowdSec installed on your local reverse proxy is vital for security. But if you have just having repeated attempts after repeated attempts through a tunnel such as CloudFlare tunnel, you're still going to get all of that traffic to your reverse proxy and see all of the 403 forbiddens in your logs. We can fix that with a CloudFlare Worker Bouncer.
A couple of people expressed concerns about Oracle snooping in on their unecrypted traffic between SSL termination on pangolin and the Gerbil tunnel to their home server. In this post I will explore the prox and cons of using a Raw TCP tunnel to pass encrypted traffic through the tunnel without decrypting it.
In this post I will detail the setup instructions for SWAG, Crowdsec, MaxMind's GeoIP2, and the SWAG Dashboard. This is truly nginx on steroids because SWAG makes everything so easy to set up.
I know everyone hates on Oracle but they certainly have the best free tier out there for virtual private servers (VPS). I'm setting up a VPS to create my own reverse proxy tunnel outside of my home network with Pangolin. This allows me to expose home lab applications indirectly, without exposing my public IP and opening ports. It's like we're setting up our own Cloudflare Tunnel, just without the benefit of its CDN and DDoS protections.
Some docker containers create files that have read access to the public. I want to change that. Here's how with access control limits (acls).