I’m looking into replacing cloudflare with a VPS running a reverse proxy over a VPN, however, every solution I see so far assumes you’re running Docker, either for the external reverse proxy host or the services you’re self hosting.

The VPS is already virtualized (perhaps actually containerized given how cheap I am) so I don’t want to put Docker on top of that. The stuff I’m self hosting is running in Proxmox containers on a 15 year old laptop, so again, don’t want to make a virtual turducken.

Besides, Docker just seems like a pain to manage. I don’t think it was designed for use as a way to distribute turnkey appliances to end users. It was made for creating reproducible ephemeral development environments. Why else would you have to specify that you want a storage volume to persist across reboots? But I digress.

Anyway, I want to reverse proxy arbitrary IP traffic, not just HTTP/S Is that possible? If so, how?

My initial naive assumption is that you set up a VPN tunnel between the VPS and the various proxmox containers, with the local containers initiating the connection so port forwarding isn’t necessary. You then set up the reverse proxy on the VPS to funnel traffic through the tunnel to the correct self-hosted container based on domain name and/or port.

  • LordKitsuna@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    3 hours ago

    I feel like im missing something here. This is pretty trivial and the comments i see are over complicating the hell outta everything. All you need is your VPN tunnel working. Personally i use wireguard for this. Then you just use nginx as the reverse proxy it talks to services on the other side of the VPN.

    The nginx server config looks like

    server { listen 443 quic; listen [::]:443 quic; listen 443 ssl; listen [::]:443 ssl; server_name my.domain.tld; http2 on; http3 on; quic_gso on; tcp_nodelay on; error_log /var/log/nginx/jellyfin.access.log; ssl_certificate /path/to/ssl/fullchain.pem; ssl_certificate_key /path/to/ssl/privkey.pem; ssl_protocols TLSv1.2 TLSv1.3; add_header Alt-Svc ‘h3=“:$server_port”; ma=86400’; add_header x-quic ‘h3’; add_header Alt-Svc ‘h3-29=“:$server_port”’;

    location / {
        proxy_pass http://10.159.4.12:8096/;
        proxy_set_header Upgrade $http_upgrade;
        proxy_set_header Connection "upgrade";
        proxy_set_header Host $http_host;
        proxy_set_header X-Real-IP $remote_addr;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        proxy_set_header X-Forward-Proto http;
        proxy_set_header X-Nginx-Proxy true;
    }
    

    }

    I have no idea how to do the proper code block i guess so have a paste from my reverse proxy hosted pastebin lol https://paste.kitsuna.net/upload/snail-seal-pig

    • InnerScientist@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 minute ago

      Here:

      server {
          listen 443 quic;
          listen [::]:443 quic;
          listen 443 ssl;
          listen [::]:443 ssl;
          server_name jellyfin.kitsuna.net;
          http2      on;
          http3      on;
          quic_gso   on;
          tcp_nodelay on;
          # You can increase the limit if your need to.
          error_log /var/log/nginx/jellyfin.access.log;
      #    ssl on;
      #    ssl_certificate /etc/nginx/certificate.crt;
      #    ssl_certificate_key /etc/nginx/certificate.key;
      #    ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # don’t use SSLv3 ref: POODLE
              ssl_certificate /etc/letsencrypt/live/kitsuna.net/fullchain.pem;
              ssl_certificate_key /etc/letsencrypt/live/kitsuna.net/privkey.pem;
      #        ssl_certificate_key /etc/letsencrypt/live/kitsuna.net/privkey.pem;
              ssl_protocols TLSv1.2 TLSv1.3;
              add_header Alt-Svc 'h3=":$server_port"; ma=86400';
              add_header x-quic 'h3';
              add_header Alt-Svc 'h3-29=":$server_port"';
          location / {
              proxy_pass http://10.159.4.12:8096/;
      #       proxy_http_version 1.1;
              proxy_set_header Upgrade $http_upgrade;
              proxy_set_header Connection "upgrade";
              proxy_set_header Host $http_host;
              proxy_set_header X-Real-IP $remote_addr;
              proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
              proxy_set_header X-Forward-Proto http;
              proxy_set_header X-Nginx-Proxy true;
          }
      }