Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I have been getting into this too. I caution anybody with self-hosting/tinkering tendencies against starting a tech company because it just makes it so much easier to justify this stuff...

Eventually serving a regular old container doesn't cut it anymore and you find yourself needing to pay these weird newspapers nobody reads to publish your business' alias because it's a requirement for a legal DBA which ASIN needs to let you get your own IPV6 block, which you need to truly own you and your customers' IPs and it's not worth becoming an AS without it, but then you can actually move towards physically become your own ISP and then...

The ingress problem people solve with tailscale is one of the hardest. I'm curious to see if it's possible to implement STUN/TURN [0-1] with a generally good mechanism for exposing the server to the Internet by caching all static files and blocking dynamic access to the backend with a loginwall, which authenticates allowed users with email "magic links" -> nonrenewable access tokens. In theory it should not be excessively difficult, expensive, or risky to do this.

It's just relevant enough to what we're doing with remote development environments for me to justify another rabbit hole

[0] https://en.wikipedia.org/wiki/Traversal_Using_Relays_around_...

[1] https://en.wikipedia.org/wiki/STUN



I have ingress set up with Fly.io.

Simple caching nginx config on the remote end with a Fly Wireguard peer set up as an extra container in the appropriate ingress pod.

It's not free but it's the least expensive way I can find to get anycast ingress and not expose any ports to the internet from my homelab.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: