What do you do for a calendar? New to selfhosting/homelab.
Hey All,
I am just getting started in my journey. Part of my goals is to de-google my life and am looking to start with my calendar. I want to to sync with my laptop and my phone.
I was going to start reading about nextcould because it seems like it would have the stuff I need and more. My question is what does the community use, so that I can read and research about it. No technical questions yet.
Edit: Not sure why I cannot see the replies when signed in (visible when logged out). Will be checking out your suggestions. Thanks Self Hosted community!
This entry was edited (1 month ago)
like this
dan
in reply to InternetCitizen2 • • •psy32nd
in reply to InternetCitizen2 • • •Manmoth
in reply to psy32nd • • •lemmyvore
in reply to Manmoth • • •qdJzXuisAndVQb2
in reply to Manmoth • • •sloppy_diffuser
in reply to InternetCitizen2 • • •I use EteSync to sync my contacts. It can do calendars also and has a self-hosted option. Personally I just use Proton for my calendar at the moment.
I haven't tested any desktop syncing with EteSync, but maybe it will work for you.
I use DavMail to proxy an Exchange account so I don't have to install Outlook on my phone.
GitHub - etesync/server: The Etebase server (so you can run your own)
GitHubPossibly linux
in reply to InternetCitizen2 • • •like this
Anders Rytter Hansen likes this.
lone_faerie
in reply to InternetCitizen2 • • •KairuByte
in reply to lone_faerie • • •lone_faerie
in reply to KairuByte • • •GitHub - franc6/ics_calendar: Provides an ICS (icalendar) platform for the Home Assistant calendar
GitHubrizoid
in reply to InternetCitizen2 • • •ilmagico
in reply to rizoid • • •higgsboson
in reply to ilmagico • • •lemmyvore
in reply to InternetCitizen2 • • •Radicale on the server, exposed publicly on a "secret" subdomain.
InfCloud as a web app.
Calengoo on the phone and it also has clients for desktop (Windows, Linux, Mac).
CalDAV-Sync / CardDAV-Sync to sync on Android (although Calengoo can also connect directly to Radicale).
I tried DAVx5 for Android sync but it had issues with large calendars and would choke sometimes when it lost connectivity.
emhl
in reply to lemmyvore • • •crt.sh | Certificate Search
crt.shlemmyvore
in reply to emhl • • •Not if you get a wildcard certificate, then the CT logs only show *.example.com. The bad guys also can't get subdomains from the DNS server without breaking into it because nowadays DNS servers don't do public zone transfer.
You can also use a wildcard CNAME on the DNS too, just to be extra safe. That way the subdomain names only live in your reverse proxy and on your devices, effectively acting as an additional auth factor (see below though). But it only works if you don't need to define any explicit subdomain; typically clashes with email stuff because a CNAME on *.example.com won't allow you to also have MX on *.example.com or TXT on _dmarc.example.com.
It's true that subdomains are not a super secret auth factor right now because of SNI (Server Name Indication) which transmits them in clear outside TLS connections, so that reverse proxies can do host-based routing. So the subdomain can be intercepted anywhere on routers, by ISP etc. It will also be freely given away to any DNS server you use to resolve them (but you can mitigate that by using DoH
... show moreNot if you get a wildcard certificate, then the CT logs only show *.example.com. The bad guys also can't get subdomains from the DNS server without breaking into it because nowadays DNS servers don't do public zone transfer.
You can also use a wildcard CNAME on the DNS too, just to be extra safe. That way the subdomain names only live in your reverse proxy and on your devices, effectively acting as an additional auth factor (see below though). But it only works if you don't need to define any explicit subdomain; typically clashes with email stuff because a CNAME on *.example.com won't allow you to also have MX on *.example.com or TXT on _dmarc.example.com.
It's true that subdomains are not a super secret auth factor right now because of SNI (Server Name Indication) which transmits them in clear outside TLS connections, so that reverse proxies can do host-based routing. So the subdomain can be intercepted anywhere on routers, by ISP etc. It will also be freely given away to any DNS server you use to resolve them (but you can mitigate that by using DoH or DoT with a privacy-pledged DNS server). You also can't afford to share links to your subdomain with anybody so it's best kept for services used only by a select number of trusted people.
The SNI issue is being worked on btw, we now have Encrypted Hello (ECH) which uses DoH keys to encrypt the domain name outside TLS, but ECH is still being adopted.
thayer
in reply to InternetCitizen2 • • •7uWqKj
in reply to InternetCitizen2 • • •kylian0087
in reply to 7uWqKj • • •Anders Rytter Hansen
in reply to InternetCitizen2 • •Content warning: What do you do for a calendar? New to selfhosting/homelab.
Nextcloud with CalDAV
Jayjo
in reply to Anders Rytter Hansen • • •Content warning: What do you do for a calendar? New to selfhosting/homelab.
https://etesync.com
EteSync - Secure Data Sync
EteSyncAnders Rytter Hansen likes this.
InternetCitizen2
in reply to Anders Rytter Hansen • • •Anders Rytter Hansen likes this.
nomad
in reply to InternetCitizen2 • • •Easy up setup and easy to connect to any phone via foss apps.
InternetCitizen2
in reply to nomad • • •some_guy
in reply to InternetCitizen2 • • •Decronym
in reply to InternetCitizen2 • • •Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:
2 acronyms in this thread; the most compressed thread commented on today has 8 acronyms.
[Thread #655 for this sub, first seen 4th Apr 2024, 09:35]
[FAQ] [Full list] [Contact] [Source code]
Decronym: A simple Reddit bot
Gist