this post was submitted on 30 May 2025
22 points (95.8% liked)
technology
23800 readers
167 users here now
On the road to fully automated luxury gay space communism.
Spreading Linux propaganda since 2020
Rules:
- 1. Obviously abide by the sitewide code of conduct.
Bigotry will be met with an immediate ban
- 2. This community is about technology. Offtopic is permitted as long as it is kept in the comment sections
- 3. Although this is not /c/libre, FOSS related posting is tolerated, and even welcome in the case of effort posts
- 4. We believe technology should be liberating. As such, avoid promoting proprietary and/or bourgeois technology
- 5. Explanatory posts to correct the potential mistakes a comrade made in a post of their own are allowed, as long as they remain respectful
- 6. No crypto (Bitcoin, NFT, etc.) speculation, unless it is purely informative and not too cringe
- 7. Absolutely no tech bro shit. If you have a good opinion of Silicon Valley billionaires please manifest yourself so we can ban you.
founded 4 years ago
MODERATORS
I'm gonna shill it again on here, but Pangolin is actually a really great tunnel manager if you need one. I toss it up on a vps then just spool up the newt containers on an endpoint in any network and it lets you expose ports and reverse proxy services through an admin UI.
It's really just some sugar on top of Traefik and Wireguard, so you could just configure all that yourself, but sometimes I like having an admin pannel.
You can even specify multiple endpoints for an exposed service and it'll load balance for you. Exposing raw TCP/UDP ports through the tunnel drops the internal validation (all services require authentication through Pangolin before you are allowed to access them), but as long as you set up like fail2ban or ssh key only access on the endpoint server you should be fine.
It does let you toggle availability through the admin panel or the config files and that kills the tunnel instantly so I usually just leave them off till I need them.