What is everyone else using for VPN solutions and what are the trade offs?
I want a VPN to access all my personal devices and use services like Syncthing. I use it on my phone so it can’t use ungodly amounts of idle data.
I looked at Netbird but found the idle data usage almost 1GB per few days using JetBird with Lazy connections. I tried the default app but it makes me SSO login every day or two, it wouldn’t stay connected, and it still used a reasonable amount of idle data.
I looked at Tailscale but I’m not going to lock access to all my devices behind a Google account login or some other third party service login for no reason. It seems like hosting my own auth server is too much additional risk as well. I tried self hosting headscale which worked well except that I have no decent front end to easily add devices. I have to log into a terminal, then execute docker commands which was a huge pain in the ass. I didn’t even touch on any of the firewalling or routing that can be done because it was so much more complex in headscale then in a web interface. I tried hosting two or three headscale front ends but couldn’t get one working that supported most of the available feature set. Usually I was given generic connection errors with no clear way to diagnose or clear troubleshooting steps so after a few hours I moved on.
Wireguard + VPS. Each device connected can choose to route all their internet traffic or only VPN services traffic.
I’m using headscale with headplane as the UI, looks like tailscale, is feature complete (at least it says so on their GitHub readme). Headplane even integrates with an external OIDC provider (I self-host Keycloak for centralized identity management across my services).
Pangolin or netbird on a vps and the rest is easy.
Truenas + wireguard + wg-easy. Quite easy to setup. Official apps that exist on any os you can think of. And stable. Turn it on and forget.
I use Wireguard.
For my phone, I use the “WG Tunnel” app: https://github.com/wgtunnel/android
It’s nice because it’ll automatically enable/disable it as I move between networks.
Before that, though I used the official client and I just kept it on 24/7. It’s not like it uses extra data or battery or anything.
I use Proton’s VPN.
Issues I’ve observed: timeouts and extra (sometimes excessive) “are you human” verifications, extra step on troubleshootings if a site doesn’t load properly or at all, sites load slower, connection may not even work when it’s morning in Russia and China or if the server is in a country being bombarded (e.g. Iran’s former allies) or possibly also going through some natural disaster, some sites may hardcode your VPN region to your account if you stay in a given IP too much (e.g. Crunchyroll), and some sites block VPN IPs they know about (e.g. Nijimiss.moe, part of the fediverse, and GameFAQS).
I have a wireguard server on my opnsense router. My phone and my wifes phone is permanently connected, doesnt matter if we are on home wifi or not, we just leave it on. Very basic, very stable.
I’ve been doing always on for a while. The biggest problem I’m having are reconnection when moving fast. When I’m doing 60 miles an hour through hilly areas, I’m changing cell phone towers every minute. Every time that ip changes it has to renegotiate. It works well if I’m streaming things. But if I’m actually in a meeting or talking to someone directly over IP, the reconnection causes stutters and glitches pretty bad.
Oh, wow! I’ve never encountered that, whatan annoying issue. "Guys I cany drive any faster, my phone won’t keep up xd
Wireguard and their official Android app. My home router acts as the WG server and it does also the daily dynDNS refresh, so I can pretend having a fixed address.
Netbird, it doesn’t use much for data for me, just disable expiry and it’ll stay connected. I would guess the third party app is part of the problem.
Will try disabling expiry and using the default app. Thanks.
NP, you have to do it on the web interface, not in the app. You can also decrease the frequency if you don’t want it to last forever.
I use Wireguard and rather than deal with management constantly I set up 3 times as many peer configurations as initially needed. When a new device is added I just copy a spare configuration to the device and change the name of the config on the server. Tasker is used to connect the WG tunnel on our phones whenever home wifi is not connected.
Everything from my phone is run through WG and it only uses a tiny amount of additional mobile data. Syncthing adds nothing of consequence except when syncing big files. Battery life is fine even with both WG and Syncthing running.
Once set up it’s required zero attention or maintenance.
Sounds like you’re talking about a Mesh VPN.
Syncthing doesn’t need a VPN to function - in fact you’re better off not using a VPN as it’s own rules will see the VPN as a LAN connection and sync data across it when your Syncthing rules exclude using your data connection. Maybe that’s what you saw with Netbird’s data usage. I’d be really surprised if Netbird itself used any significant data.
I have about 20 sync jobs per phone - some are allowed to use cell data (photos), others aren’t. When I enable Tailscale on my phone, Syncthing will try to sync all the jobs because it sees the VPN as a LAN.
I run rooted and use a firewall and block VPN there for Syncthing to prevent this.
I use NordVPN and it’s nifty Meshnet feature for these kinds of things. Once setup, any of my devices that have the NordVPN app running and have Meshnet enabled can access my services, which at the moment is really only Immich and Jellyfin. I could even grant other Nord users access to it without much hassle.
personally I just use headscale with tailscale clients and mullvad vpn via wireguard on the control server. there’s a bit of systemd magic required to make sure wg-quick starts before headscale does. dns is setup via a pihole device and I just point headscale’s config at that device for dns. it’s a pretty simple setup, but I have no issue doing everything via cli so this works well for me.
:P
I hadn’t even considered running not one, but three VPNs and chaining them together for different functionalities.I’m only using 1 vpn provider (mullvad) and using a wireguard config for 1 location. Headscale provides my mesh network controller, and pihole is a dns server. Not sure how you came to that conclusion
How are you using Headscale, with a thirdparty VPN? I can understand Mullvad might have a Wireguard config option?
You register a new device on your tailnet and advertise it as an exit node. When other devices on your tailnet use the exit node all of their traffic goes through that device. If that exit node has a wireguard connection setup, all other devices using it will also use that same connection. The only tricky part was making sure wg-quick’s systemd service starts before tailscaled’s does (mentioned that in my op).
Tailscale offers this as a service but I dont use tailscale directly. I basically set this up manually and use headscale as my control server instead of using tailscale’s control servers.
Okay, now it makes sense. For my purposes, I would only teed the headscale part for inter device communication.
It makes sense though, rather than paying for a VPN for multiple devices (on those that charge per device) I could route traffic via tailscale / wireguard to a single VPN’d device.
If you have a public IP just use wire guard. If you don’t have a public IP, rent a cheap VPS and use that as entry point, setting up one wire guard from home to the vps, and the other from your phone to the vps.
So I have a tinc mesh for my house, VPS and dedicated server. I have started using pangolin for access to things from the internet, I have also used pangolin as a VPN into my networks from my phone







