3/8/2026 at 5:42:20 PM
>Because all of my services share the same IP address, my password manager has trouble distinguishing which login to use for each one.In Bitwarden they allow you to configure the matching algorithm, and switching from the default to "starts with" is what I do when I find that it is matching the wrong entries. So for this case just make sure that the URL for the service includes the port number and switch all items that are matching to "starts with". Though it does pop up a big scary "you probably didn't mean to do this" warning when you switch to "starts with"; would be nice to be able to turn that off.
by linsomniac
3/9/2026 at 12:23:46 AM
Just giving them hostnames is easier.In homelab space you can also make wildcard DNS pretty easily in dnsmasq, assuming you also "own" your router. If not, hosts file works well enough.
There is also option of using mdns for same reason but more setup
by PunchyHamster
3/9/2026 at 12:00:29 PM
> Just giving them hostnames is easierBitwarden annoyingly ignores subdomains by default. Enabling per-sudomain credential matching is a global toggle, which breaks autocomplete on other online service that allow you to login across multiple subdomains.
by overfeed
3/9/2026 at 12:47:11 PM
You can override the matching method on an individual basis though, just using the setting button next to the URL entry field.by danparsonson
3/9/2026 at 12:25:51 PM
Tell me about it... that infinite Ctrl + Shift + L sequence circling through all credentials from all subdomains. Then you brain betrays you making you skip the right credential... ugh, now you'll circle the entire set again. Annoying.by rodolphoarruda
3/9/2026 at 4:54:06 PM
You can set that globally but override at the individual entry.by freeplay
3/9/2026 at 2:25:55 PM
Seriously? That sounds incredibly awful - my keepass setup has dozens of domain customizations, there's no way in hell you could apply any rule across the entire internet.by Groxx
3/9/2026 at 12:54:21 AM
How do I edit the hosts file of an iPhone?by c-hendricks
3/9/2026 at 1:08:29 AM
You don't have to if you use mDNS. Or configure the iPhone to use your own self-hosted DNS server which can just be your router/gateway pointed to 9.9.9.9 / 1.1.1.1 / 8.8.8.8 with a few custom entries. You would need to jailbreak your iPhone to edit the hosts file.by nerdsniper
3/9/2026 at 4:38:14 AM
I have a real domain name for my house. I have a few publicly available services and those are listed in public DNS. For local services, I add them to my local DNS server. For ephemeral and low importance stuff (e.g. printers) mDNS works great.For things like Home Assistant I use the following subdomain structure, so that my password manager does the right thing:
service.myhouse.tld
local.service.myhouse.tld
by simondotau
3/9/2026 at 2:15:50 PM
Exactly, you don't. My qualm was with the "hosts file works well enough" claim of the person I responded to.by c-hendricks
3/9/2026 at 6:46:42 AM
This is what i do.by tehlike
3/9/2026 at 12:06:05 AM
"Because all of my services share the same IP address"DNS. SNI. RLY?
by gerdesj
3/9/2026 at 7:19:43 AM
That's a bit weird to read for me as well. DNS and local DNS were the first services I've been self-hosting since 2005.On Debian/Ubuntu, hosting local DNS service is easy as `apt-get install dnsmasq` and putting a few lines into `/etc/dnsmasq.conf`.
by sv0
3/9/2026 at 7:28:23 AM
These modern-day homelabbers will do anything to avoid DNS, looks like to them it's some kind of black magic where things will inevitably go wrong and all hell will break loose.by merpkz
3/9/2026 at 11:36:14 AM
Not to diminish having names for everything but that just shifts the Bitwarden problem to "All of my services share the same base domain."by tbyehl
3/9/2026 at 2:25:42 AM
One cool trick is having (public) subdomains pointing to the tailscale IP.by predkambrij
3/9/2026 at 6:15:05 AM
This is what I do. Works great! And my caddy setup uses the DNS mode to provision TLS certs (using my domain provider's caddy plugin).by timwis
3/9/2026 at 4:48:33 PM
For my homelab, I setup a Raspberry Pi running PiHole. PiHole includes the ability to set local DNS records if you use it as your DNS resolver.Then, I use Tailscale to connect everything together. Tailscale lets you use a custom DNS, which gets pointed to the PiHole. Phone blocks ads even when im away from the house, and I can even hit any services or projects without exposing them to the general internet.
Then I setup NGINX reverse proxy but that might not be necessary honestly
by dpoloncsak
3/8/2026 at 9:59:51 PM
Could also use Cloudflare tunnels. That way:1. your 1password gets a different entry each time for <service>.<yourdomain>.<tld>
2. you get https for free
3. Remote access without Tailscale.
4. Put Cloudflare Access in front of the tunnel, now you have a proper auth via Google or Github.
by brownindian
3/8/2026 at 11:36:09 PM
You can also use cloudflare to create a dns record for each local service (pointed to the local IP) and just mark it as not proxied, then use Wireguard or Tailscale on your router to get VPN access to your whole network. If you set up a reverse proxy like nginx proxy manager, you can easily issue a wildcard cert using DNS validation from your NAS using ACME (LetsEncrypt). This is what I do, and I set my phone to use Wireguard with automatic VPN activation when off my home WiFi network. Then you’re not limited by CF Tunnel’s rules like the upload limits or not being able to use Plex.by lukevp
3/9/2026 at 4:41:58 PM
This is exactly what I do. I have a few operators set up in k8s that handle all of this with just a couple of annotations on the Ingress resource (yeah, I know I need to migrate to Gateway). For services I want to be publicly-facing, I can set up a Cloudflare tunnel using cloudflare-operator.by organsnyder
3/9/2026 at 12:42:13 AM
Yup doing this with Caddy and Nebula, works great!by johnmaguire
3/9/2026 at 3:15:38 PM
This is the wayby sylens
3/8/2026 at 11:26:02 PM
Tunnels go through Cloudflare infrastructure so are subject to bandwidth limits (100MB upload). Streaming Plex over a tunnel is against their ToS.by QGQBGdeZREunxLe
3/8/2026 at 11:54:34 PM
Pangolin is a good solution to this because you can optionally self-host it which means you aren't limited by Cloudflare's TOS / limits.by miloschwartz
3/9/2026 at 3:32:43 PM
Also achievable with Tailscale. All my internal services are on machines with Tailscale. I have an external VPS with Tailscale & Caddy. Caddy is functioning as a reverse proxy to the Tailscale hosts.No open ports on my internal network, Tailscale handles routing the traffic as needed. Confirmed that traffic is going direct between hosts, no middleman needed.
by somehnguy
3/9/2026 at 1:08:55 PM
Another vote for Pangolin! Been using it for a month or so to replace my Cloudflare tunnels and it's been perfect.by arvid-lind
3/8/2026 at 10:47:19 PM
Yeesh, the last thing I want is remote access to my homelab.by mvdtnz
3/8/2026 at 9:23:45 PM
Setup AdGuard-Home for both blocking ads and internal/split DNS, plus Caddy or another reverse proxy and buy (or recycle/reuse) a domain name so you can get SSL certificates through LetsEncrypt.You don't need to have any real/public DNS records on that domain, just own the domain so LetsEncrypt can verify and give you SSL certificate(s).
You setup local DNS rewrites in AdGuard - and point all the services/subdomains to your home servers IP, Caddy (or similar) on that server points it to the correct port/container.
With TailScale or similar - you can also configure that all TailScale clients use your AdGuard as DNS - so this can work even outside your home.
Thats how I have e.g.: https://portainer.myhome.top https://jellyfin.myhome.top ...etc...
by techcode
3/8/2026 at 6:19:36 PM
This is always annoying me with 1Password, before that I just always added subdomains but now I'm usually hosting everything behind Tailscale which makes this problem even worse as the differentiation is only the port.by dewey
3/8/2026 at 7:09:41 PM
You can use tailscale services to do this now:https://tailscale.com/docs/features/tailscale-services
Then you can access stuff on your tailnet by going to http://service instead of http://ip:port
It works well! Only thing missing now is TLS
by domh
3/8/2026 at 8:17:32 PM
This would be perfect with TLS. The docs don't make this clear...> tailscale serve --service=svc:web-server --https=443 127.0.0.1:8080
> http://web-server.<tailnet-name>.ts.net:443/ > |-- proxy http://127.0.0.1:8080
> When you use the tailscale serve command with the HTTPS protocol, Tailscale automatically provisions a TLS certificate for your unique tailnet DNS name.
So is the certificate not valid? The 'Limitations' section doesn't mention anything about TLS either:
https://tailscale.com/docs/features/tailscale-services#limit...
by avtar
3/9/2026 at 10:00:52 AM
I think maybe TLS would work if you were to go to https://service.yourts.net domain, but I've not tried that.by domh
3/9/2026 at 11:22:14 AM
It works, I’m using tailscale services with httpsby nickdichev
3/9/2026 at 3:19:07 PM
Thanks for clarifying :) I'll try it out this weekend.by avtar
3/9/2026 at 6:29:42 AM
In the 1Password entry go to the "website" item. To right right there's an "autofill behavior" button. Change it to "Only fill on this exact host" and it will no longer show up unless the full host matches exactlyby altano
3/9/2026 at 3:22:36 PM
Is this a per-item behaviour or can this be set as a global default?I'm guessing this is 1Password 8 only, as I can't see this option in 1Password 7.
by oarsinsync
3/9/2026 at 3:55:51 PM
I've looked in the settings on 1p8, and didn't find a setting for a global default.by vladvasiliu
3/9/2026 at 1:54:39 PM
Not entirely true. It can't seem to distinguish between ports..by jorvi
3/9/2026 at 3:24:26 PM
because ports don't indicate a different host.by mhurron
3/9/2026 at 2:06:52 PM
Omg thank you, I had no idea they added this feature!by karlshea
3/8/2026 at 11:53:45 PM
Pangolin handles this nicely. You can define alias addresses for internal resources and keep the fully private and off the public internet. Also based on WireGuard like Tailscale.by miloschwartz
3/8/2026 at 6:46:01 PM
You can still have subdomains with Tailscale. Point them at the tailscale IP address and run a reverse proxy in front of your servicesby wrxd
3/8/2026 at 7:14:57 PM
Good point, but for simplicity i'd still like 1Password to use the full hostname + port a the primary key and not the hostname.by dewey
3/8/2026 at 7:48:28 PM
tailscale serve 4000 --BGProblem solved ;)
by zackify
3/9/2026 at 4:39:27 AM
or just use the same password for everything. ;)by m463
3/9/2026 at 7:48:09 AM
If it is like 12 characters non dictionary and PW you use only in your homelab - seems like perfectly fine.If you expose something by mistake still should be fine.
Big problem with PW reuse is using the same for very different systems that have different operators who you cannot trust about not keeping your PW in plaintext or getting hacked.
by ozim
3/8/2026 at 6:30:56 PM
I wonder why each service doesn’t have a different subdomain.by lloydatkinson
3/8/2026 at 10:10:57 PM
That's what I do, but you still have to change the default Bitwarden behavior to match on host rather than base domain.Matching on base domain as the default was surprising to me when I started using Bitwarden... treating subdomains as the same seems dangerous.
by cortesoft
3/9/2026 at 1:34:54 AM
It's probably a convenience feature. Tons of sites out there that start on www then bounce you to secure2.bank.com then to auth. and now you're on www2.bank.com and for some inexplicable reason need to type your login again.Actually it's mostly financial institutions that I've seen this happen with. Have to wonder if they all share the same web auth library that runs on the Z mainframe, or there's some arcane page of the SOC2 guide that mandates a minimum of 3 redirects to confuse the man in the middle.
by akersten
3/8/2026 at 7:26:23 PM
This is the way. You can even do it with mDNS.by tylerflick
3/8/2026 at 9:22:27 PM
Ah nice! Didn’t know that. I’ll try that out next time.by photon_collider
3/9/2026 at 2:11:12 PM
not really a solution (as others have pointed out already) but it also tells me you are missing a central identity provider (think Microsoft account login). You can try deploying Kanidm for a really simple and lightweight one :)by harrygeez