You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use tailscale to connect remote devices back to DoH (adguard home) hosted at home works ok. There have been a few gotchas:
To establish VPN in the first place, tailscale needs to talk to its control plane, which needs DNS resolution.
Looks like the system needs to temporarily disconnect VPN while updating tailscale iOS app. But iOS seems to need to make a few calls during the update process. Sometimes it gets into a weird lock.
When disconnecting from home Wi-Fi, it takes a few seconds for the on-demand VPN to kick in. All queries made during this time will fail. This can be extremely annoying as I am driving out of the garage, when I need internet the most to setup route in navigation app.
Tailscale is just not that reliable. Sometimes I have to re-open the app and re-authenticate to get the connection back on.
The best DoH experience for me would be if the DNS server is reachable from anywhere with internet. There are some concerns indeed, but screw it, this sounds like fun:
only expose DoH (http API) via external ingress. No vanilla UDP path
network policy to prevent compromised AdGuard Home from doing weird stuff:
block AdGuard Home egress to anywhere in homelab.
except for local ptr queries to router
block AdGuard Home egress to internet
except for listed filter URLs and upstream DNS servers
not possible since adguardhome pod can't use cluster DNS(coredns) as upstream. (coredns has home router as upstream, and of course I need the home router to point to adguardhome...)
Use static client IDs in DoH queries. Then put these IDs onto allowed_clients list since I don't want to be a public resolver
This feels like a hack -- basically using client ID as authentication credential, in the format of a URL subpath in an HTTP call. But probably can work.
The allowed_clients also need to have homelab local IP ranges.
This is the fun part: gotta make sure that adguard has correct trusted_proxies configuration so that it can parses source IP header from ingress-nginx, which comes from cloud flare proxied internet request.
The text was updated successfully, but these errors were encountered:
Use tailscale to connect remote devices back to DoH (adguard home) hosted at home works ok. There have been a few gotchas:
The best DoH experience for me would be if the DNS server is reachable from anywhere with internet. There are some concerns indeed, but screw it, this sounds like fun:
block AdGuard Home egress to internetexcept for listed filter URLs and upstream DNS serversallowed_clients
list since I don't want to be a public resolverallowed_clients
also need to have homelab local IP ranges.trusted_proxies
configuration so that it can parses source IP header from ingress-nginx, which comes from cloud flare proxied internet request.The text was updated successfully, but these errors were encountered: