Skip Navigation

Posts
8
Comments
155
Joined
2 yr. ago

  • Do you have a modem? You should be able to configure port forwarding in that

  • Interesting. I might be able to go back to hosting on my server for inbound only. Thanks for the tip

  • Yeah that is my current mail provider but the self hosting bug bites deep

  • I’m not a fan of letting a bunch of long dead rich white guys decide what rights people deserve

  • Have they actually built any of these reactors?

  • How can any true independent or even moderate republican look at these goons and think anything other than “HELL NO”???

  • Also cross-dressing Bugs Bunny and the cat that Pepe Le Pew was chasing

  • That’s the closest thing I’ve found to my dear departed Pebble

  • That’s the closest thing I’ve found to my dear departed Pebble

  • nice work! I had given up on getting FF sync running. I used xBrowserSync for a while but that has no iOS support so am currently using Linkding. I will give this a shot :-)

  • Every browser extension and mobile app keeps a copy. Between 2 PC's, 1 Macbook, 1 iPad and 1 iPhone I think I will survive a server crash

  • Has anyone tried the docker variant of pi.alert? I presume that one must be smart enough to filter out docker ‘devices’

  • After adding about 20 MAC addresses I gave up and just moved pi.alert to my secondary dns server (a pi zero) which has no docker

  • Yeah i tried setting my subnet to 192.168.3.0/24 (the one used by my intranet) but they still show up

  • Thanks!

  • I use Nginx Proxy Manager to reverse proxy all my services including Vaultwarden -

    Setup in NPM -

     
            Open Nginx Proxy Manager Admin Portal
        Click Proxy Hosts
        Click Add Proxy Host
        Fill in the details
            Details tab
                Domain Names - vault.your.domain
                Scheme - http
                Forward Hostname/IP - vaultwarden (this should be the name of your vw container)
                Forward Port - 80
                Tick Block Common Exploits
                Tick Websockets Support
                Access List - Publicly Accessible
            Custom locations tab
                Add the following locations
                    location 1
                        location - /notifications/hub
                        Scheme - http
                        Forward Hostname/IP - vaultwarden
                        Forward Port - 3012
                        Click the cog symbol and add the following to the textbox that appears
                            proxy_set_header Upgrade $http_upgrade;
                            proxy_set_header Connection "upgrade";
                            proxy_set_header X-Real-IP $remote_addr;
                    location 2
                        location - /notifications/hub/negotiate
                        Scheme - http
                        Forward Hostname/IP - vaultwarden
                        Forward Port - 80
                        Click the cog symbol and add the following to the textbox that appears
                            proxy_set_header Host $host;
                            proxy_set_header X-Real-IP $remote_addr;
                            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
                            proxy_set_header X-Forwarded-Proto $scheme;
                    location 3
                        location - /
                        Scheme - http
                        Forward Hostname/IP - vaultwarden
                        Forward Port - 80
                        Click the cog symbol and add the following to the textbox that appears
                            proxy_set_header Host $host;
                            proxy_set_header X-Real-IP $remote_addr;
                            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
                            proxy_set_header X-Forwarded-Proto $scheme;
            SSL tab
                SSL Certificate - Request a new SSL Certificate
                tick Use a DNS Challenge (or just expose port 80 if you accept the risk)
                DNS Provider - Dynu (this is my dyndns provider)
                Credentials File Content - replace YOUR_DYNU_AUTH_TOKEN with the API key from https://www.dynu.com/en-US/ControlPanel/APICredentials
                Email Address for Let's Encrypt - your email
                Tick I Agree to the Let's Encrypt Terms of Service
        Click Save
        Vaultwarden should now be accessible via https://vault.your.domain
    
    
      
  • Plenty of free hostname providers. I use Dynu

  • That is better than my NUC and I have no performance issues