- 1 Post
- 3 Comments
Joined 10 months ago
Cake day: June 6th, 2025
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
disobey2623@lemmy.dbzer0.comto
Selfhosted@lemmy.world•Reitti v3.1.0: A year of self-hosting my location history (1.1k stars and 46 releases later)English
0·3 months agoI’ve been following this since release and can only say a big thank you for how active you’ve been on this project! It’s great to see a developer take an active part in feedback and ideas and quickly being able to get them into the project. Keep going strong, and thank you!
disobey2623@lemmy.dbzer0.comto
Selfhosted@lemmy.world•Selfhosted alternatives to Discord with screensharing?English
0·4 months agoHuh, it’s been nearly flawless for me as well. Had it randomly hang once a few months ago but I think that may have been due to a lack of resources for that lxc. Other than that it’s been flawless over multiple apps: Linux, Android (element, schildichat next, fluffy), windows, web. All synced and verified.
Many people talking about using subdomains, but that’s only really a thing if you actually have a domain. Just last year the domain .internal was reserved for internal use, so that’s what I’ve set up all my domains to use. E.g. https://pihole.internal/, https://proxmox.internal/.
To make this work I use pihole’s local dns records to rewrite any *.internal domain to point to my reverse proxy Caddy’s ip.
As for the certificates, I created my own CA, which I install on all my and my family’s devices. Then, for each new url I set up, I create a new certificate and sign it with my CA certificate, then have my reverse proxy serve it.
This all sounds like a lot of work, and it is, but using OPNsense for both reverse proxy and certificates makes it well integrated and certificates are trivial to renew. With that said, if you have your own domain, go the let’s encrypt subdomain route instead imo. It saves you a lot of manual labor with setting up your CA on every device you own and creating new certificates for each site.