Hi!

I often read suggestions to use something like Tailscale to create a tunnel between a home server and a VPS because it is allegedly safer than opening a port for WireGuard (WG) or Nginx on my router and connecting to my home network that way.

However, if my VPS is compromised, wouldn’t the attacker still be able to access my local network? How does using an extra layer (the VPS) make it safer?

  • Netrunner@programming.dev
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 month ago

    Wireguard doesn’t send anything back if the key is not correct.

    Because of this, Tailscale port swapping is inconsequential vs wireguard here.

    Tailscale transfers trust of your VPN subnet to a third party, which is a real security concern.

    I agree SSH service will be attacked if they are plainly exposed, out of date and allow login challenges.

    Also agree that under or misconfiguration is a massive cause for security issues.