This of this as just housekeeping tidyup. Disabling dyndns doesn't make you any more or less secure. Dyndns just gives you a DNS name you can remember (and also adjusts when your ISP changes your IP). Yeah, that makes a lot of sense not to expose anything to the internet and use tailscale to provide secure connectivity.ĭisabling forwarding of port 443 is the key bit that cuts off outside access. It doesn't expose any of your native service ports to the internet but the use of automatic name generation does make the DNS name searchable via the certificate ledger. It gives you a VPN protected wrapper to connect to your NAS so that services are only available to VPN authenticated end points. dyndns purely makes a DNS name available on the internet but doesn't make that name searchable and doesn't itself provide any capabilities to secure or protect services on the server end. Here's some examples of how to do that on an IOS deviceĭyndns and tailscale are quite different offerings. Given the certificate hasn't been generated by a trusted certificate authority, you would then need to install the public CA certificate you used to sign your above certificate into your device. If you don't want to use tailscales auto cert generation, you can use any TLS tool to generate and sign your own certs.
0 Comments
Leave a Reply. |