Announcement
Collapse
No announcement yet.
LMS remote access: safe, secure and free with Tailscale (mesh VPN)
Collapse
X
-
Navigating to Server Settings via the LMS Tailscale IP Address works for me. Recalling what I had to do, (it has been a while now,) was to set a user name and password first by accessing settings using the server's LAN IP Address. Then it worked in all browsers, Android APK, and more recently the Melodeon app. -
I had the same problem with settings page and Squeezelite-x so I gave up and returned to Zerotier.Leave a comment:
-
I have Block Incoming Connections set to Do not block (I also tried it set to Block with same results.)
Allowed IP Addresses includes a comma separated list of full IP address for the server device (local and Tailscale) and 127.0.0.1 and the Tailscale IP for the remote computer I am attempting to use to connect to the server.
I get the the error message: "403 Forbidden: settings/server/basic.html" when I navigate to Server settings. Unfortunately, the error message is almost invisible. It is black letters on an almost black background when using Material Skin. On the original web interface (not Material Skin) the error message is "403 Forbidden: settings/index.html" with black letters on white background.Last edited by RTally; 2023-03-08, 05:10.Leave a comment:
-
All the best... 😎👍 2Leave a comment:
-
This is the first time I've logged in here for quite a while. Glad to see this thread. I've been using Tailscale on my RAID server since September and it is pretty awesome. Not only can I securely access my files that I need when away from my home but one of the first things I did was set up LMS as I've wanted to have secure access to LMS away from home, as if I'm still in my local network, and it works flawlessly. It was almost too easy to set up, too (I'm not too experienced with VPNs).👍 1Leave a comment:
-
anyone happened to have found out yet how to access LMS' settings page with this set up? i'm getting a 403 with
Code:Access to settings pages is restricted to the local network or localhost: 100.76.230.123 -> 192.168.1.54 (settings/index.html)
tia.
​My solution was to install NoMachine on my Inovato Quadra. Using Tailscale, NoMachine gives me access to a graphical interface on my LMS server. Using the GUI, I run Firefox to access LMS, including the settings pages. Works like a charm.Leave a comment:
-
anyone happened to have found out yet how to access LMS' settings page with this set up? i'm getting a 403 with
Code:Access to settings pages is restricted to the local network or localhost: 100.76.230.123 -> 192.168.1.54 (settings/index.html)
tia.
Leave a comment:
-
anyone happened to have found out yet how to access LMS' settings page with this set up? i'm getting a 403 with
Code:Access to settings pages is restricted to the local network or localhost: 100.76.230.123 -> 192.168.1.54 (settings/index.html)
tia.Leave a comment:
-
My usage case would be different. I have done a subnet router elsewhere and it works great. However, this server is standalone on a university network and I don't need to have another machine running there or to make part of the university network part of the subnet, unless of course I would limit the subnet to a single machine (I'm a bit of a neophyte in more complex networking). Thanks in advanceLeave a comment:
-
A related question. From what I can tell there is not a way of installing tailscale directly on a picore server. Does anyone have any ideas? There is a tailscale client for the pi https://tailscale.com/kb/1114/pi-hole/ for example, but will this survive a reboot?
I'll experiment more, but wanted to check if anyone has ideas from this helpful community.
Eric
RobertLeave a comment:
-
A related question. From what I can tell there is not a way of installing tailscale directly on a picore server. Does anyone have any ideas? There is a tailscale client for the pi https://tailscale.com/kb/1114/pi-hole/ for example, but will this survive a reboot?
I'll experiment more, but wanted to check if anyone has ideas from this helpful community.
EricLeave a comment:
-
I am using a cloud-based exit node for a couple of reasons: I wanted my phone and laptop to have access to my home server running LMS. When traveling I wanted my phone to be able to use a VPN service to provide privacy/anonymity when moving through hotels, cafes, WiFi-equipped tour buses, etc. I would like more anonymity than using my home server as the exit node when traveling and having all my traffic routed back through my ISP when browsing the web. I also wanted to control DNS filtering myself. Additionally, mobile phones only support the use of one VPN at any one time, so a full-mesh VPN service was required. I settled on using Tailscale with a cloud-based exit node also serving as a DNS proxy. Using a cloud-based VPS (an amazing invention actually,) I can create (and later remove) an exit node to the web almost anywhere.Leave a comment:
-
Exit node...
The comment above about enabling an exit node is well taken; to this end I created a virtual machine hosted on a remotely located Oracle OCI server for this roll. I installed AdGuard-Home as a DNS proxy on the VM. Setting Tailscale's global DNS option to this exit node and using AdGuad's DNS over HTTPs (DoH) ability, DNS queries are now protected as well.Leave a comment:
-
Check out https://tailscale.com/kb/1019/subnets/ to learn how.Leave a comment:
-
As for your question, it's not something that I've explored. However, I ran across the following which might to useful:
All the best... 😎Leave a comment:
Leave a comment: