F5F Stay Refreshed Power Users Networks Connect to the VPS and initiate the port creation process.

Connect to the VPS and initiate the port creation process.

Connect to the VPS and initiate the port creation process.

Pages (2): 1 2 Next
S
stevietibbits
Member
55
10-18-2016, 05:08 AM
#1
Hi everyone. For reference, I’m running a simple Linode virtual private server with OpenVPN, Pihole, and Nginx as a reverse proxy. At home on Proxmox, I have an Ubuntu server with Linux, OpenVPN client, and Jellyfin installed. It works well for streaming, but sometimes I need to save data on my phone and connect to free public Wi-Fi. The issue is that public networks often block VPN connections, which is frustrating. My goal is to set up dynamic DNS so my phone always has a consistent domain name. This applies whether I’m using Wi-Fi or mobile data. On the VPS, I need to open a port—like TCP 433—and ensure only traffic from my phone’s domain can access it. I want to block all other connections. I’m considering tools like failtoban for extra security, but I’d appreciate some helpful guidance. Thanks!
S
stevietibbits
10-18-2016, 05:08 AM #1

Hi everyone. For reference, I’m running a simple Linode virtual private server with OpenVPN, Pihole, and Nginx as a reverse proxy. At home on Proxmox, I have an Ubuntu server with Linux, OpenVPN client, and Jellyfin installed. It works well for streaming, but sometimes I need to save data on my phone and connect to free public Wi-Fi. The issue is that public networks often block VPN connections, which is frustrating. My goal is to set up dynamic DNS so my phone always has a consistent domain name. This applies whether I’m using Wi-Fi or mobile data. On the VPS, I need to open a port—like TCP 433—and ensure only traffic from my phone’s domain can access it. I want to block all other connections. I’m considering tools like failtoban for extra security, but I’d appreciate some helpful guidance. Thanks!

S
Steam31
Member
73
10-22-2016, 07:50 PM
#2
Configure a VPN server on the VPS, then employ a VPN client with certificate-based login on the mobile device. This offers the strongest protection available. Registering your phone with a domain name doesn’t add meaningful security benefits. I believe you’re referring to port 443 (HTTPS). That would let your phone connect to a web server on the VPS, but what follows? You could run SSH on port 443, enabling data tunneling that blends in with HTTPS traffic. However, it’s unlikely there’s an SSH client for the phone that supports this method, and most apps probably won’t use it or need the tunnel.
S
Steam31
10-22-2016, 07:50 PM #2

Configure a VPN server on the VPS, then employ a VPN client with certificate-based login on the mobile device. This offers the strongest protection available. Registering your phone with a domain name doesn’t add meaningful security benefits. I believe you’re referring to port 443 (HTTPS). That would let your phone connect to a web server on the VPS, but what follows? You could run SSH on port 443, enabling data tunneling that blends in with HTTPS traffic. However, it’s unlikely there’s an SSH client for the phone that supports this method, and most apps probably won’t use it or need the tunnel.

G
Glqbal
Member
173
10-24-2016, 08:21 PM
#3
Usually a VPS receives a public IP address, which means there’s no need for port forwarding since NAT isn’t required. You can simply configure firewall rules as needed. Setting up a DDNS service on your phone isn’t advisable. Instead, use certificates or similar methods to restrict access to your devices only—this is simpler and more secure. You should be able to host a VPN on port 443, and many firewalls will check for HTTPS traffic on that port and block anything suspicious. It really depends on the firewall configuration.
G
Glqbal
10-24-2016, 08:21 PM #3

Usually a VPS receives a public IP address, which means there’s no need for port forwarding since NAT isn’t required. You can simply configure firewall rules as needed. Setting up a DDNS service on your phone isn’t advisable. Instead, use certificates or similar methods to restrict access to your devices only—this is simpler and more secure. You should be able to host a VPN on port 443, and many firewalls will check for HTTPS traffic on that port and block anything suspicious. It really depends on the firewall configuration.

S
Stampycat777
Member
66
10-25-2016, 01:06 PM
#4
VPN already configured and active on the VPS. Combined with pihole, it significantly reduces traffic, tracking, and ads for internet access from your phone. Public Wi-Fi often blocks this traffic, which seems suspicious. Registering a domain name isn’t too complex. I need to stop all traffic to port 433 on the VPS (except from the phone). This is what I’m trying to achieve. How is this accomplished? SSH supports any port you choose, and I’m considering using it with tunneling ports added.
S
Stampycat777
10-25-2016, 01:06 PM #4

VPN already configured and active on the VPS. Combined with pihole, it significantly reduces traffic, tracking, and ads for internet access from your phone. Public Wi-Fi often blocks this traffic, which seems suspicious. Registering a domain name isn’t too complex. I need to stop all traffic to port 433 on the VPS (except from the phone). This is what I’m trying to achieve. How is this accomplished? SSH supports any port you choose, and I’m considering using it with tunneling ports added.

A
Azastias
Member
223
10-25-2016, 05:28 PM
#5
Today's traffic mostly uses HTTPS, which means encryption is in place. This makes it hard to see anything beyond the hostname you connect to without a VPN. You can't simply block traffic by domain names like you might think. Instead, focus on source IP addresses. Combine this with a reverse DNS check to see what domain each IP resolves to. If you're connected to Wi-Fi, your device doesn't have a public IP address, so it can't register a domain name directly. It would need to find the router's public IP (for example, at an internet cafe) and update its DNS settings accordingly. For SSH access, use key-based authentication and skip the reverse DNS process—it doesn't really add security.
A
Azastias
10-25-2016, 05:28 PM #5

Today's traffic mostly uses HTTPS, which means encryption is in place. This makes it hard to see anything beyond the hostname you connect to without a VPN. You can't simply block traffic by domain names like you might think. Instead, focus on source IP addresses. Combine this with a reverse DNS check to see what domain each IP resolves to. If you're connected to Wi-Fi, your device doesn't have a public IP address, so it can't register a domain name directly. It would need to find the router's public IP (for example, at an internet cafe) and update its DNS settings accordingly. For SSH access, use key-based authentication and skip the reverse DNS process—it doesn't really add security.

S
sydneyyyyyy
Senior Member
396
10-27-2016, 04:08 AM
#6
Firewall tools aren't functioning properly. They don't handle host IPs. The firewall only processes IPv4 and IPv6 addresses. Unless your mobile service uses IPv6 exclusively, devices sharing the same public IP (via NAT) should connect if you manage it well.
S
sydneyyyyyy
10-27-2016, 04:08 AM #6

Firewall tools aren't functioning properly. They don't handle host IPs. The firewall only processes IPv4 and IPv6 addresses. Unless your mobile service uses IPv6 exclusively, devices sharing the same public IP (via NAT) should connect if you manage it well.

I
iMetalcrime_PT
Junior Member
15
11-10-2016, 02:42 PM
#7
I
iMetalcrime_PT
11-10-2016, 02:42 PM #7

L
109
11-10-2016, 07:46 PM
#8
Iptables, PF, any Zyxel, Cisco, NetGate, FortiGate, appliance all firewall solutions rely on IP addresses only. DNS data isn't reliable for security management. ufw helps set up iptables configurations.
L
Lopez_Chamalow
11-10-2016, 07:46 PM #8

Iptables, PF, any Zyxel, Cisco, NetGate, FortiGate, appliance all firewall solutions rely on IP addresses only. DNS data isn't reliable for security management. ufw helps set up iptables configurations.

K
Kaisetsu
Senior Member
651
11-12-2016, 04:43 AM
#9
Understand that this setup could affect more than just your device, impacting anyone connected to the same public IP address.
K
Kaisetsu
11-12-2016, 04:43 AM #9

Understand that this setup could affect more than just your device, impacting anyone connected to the same public IP address.

I
iMegaan
Member
162
11-12-2016, 12:16 PM
#10
https://apkpure.com/dynamic-dns-client/ and https://unix.stackexchange.com/questions...ip-address. It looks like I have what I need to achieve my goals. I hope setting this up won't take too long. The aim is to save money on mobile data and use public Wi-Fi with good security.
I
iMegaan
11-12-2016, 12:16 PM #10

https://apkpure.com/dynamic-dns-client/ and https://unix.stackexchange.com/questions...ip-address. It looks like I have what I need to achieve my goals. I hope setting this up won't take too long. The aim is to save money on mobile data and use public Wi-Fi with good security.

Pages (2): 1 2 Next