sonny, (edited ) to linux
@sonny@floss.social avatar

GNOME is shaping up really nicely for privacy

• Background App indicator
• App permissions
• Device Security Settings
• Mic / Camera* indicators
• Screen Sharing indicator
• Remote Desktop indicator
• Location indicator
• Incrementally better app sandboxing
• VPN (incl Wireguard) support
• Quick Network Toggles

Made possible by and our talented community.

  • Available in the upcoming GNOME 45 release
housepanther, to wireguard

#wireguard is pissing me off. The peers can ping and communicate with the server but not each other. I've got no idea why . #linux

meesj, to RaspberryPi

I'm looking for a router software that offers:

Any recommendations?

abcdw, to wireguard
@abcdw@fosstodon.org avatar

The funny things about really good software projects, that sometimes they are so good and complete already that there is no fuss around them, they just work and do the job done.

Mailing lists are quite, new commits are rare. Sometimes it can even feels that they are unmaintained or dead, but in fact they are more than alive.

https://notmuchmail.org/
https://www.passwordstore.org/
https://www.wireguard.com/

What other cool "almost complete" projects do you know?

Wander, to privacy
@Wander@packmates.org avatar

Federated wireguard network idea
Any feedback welcome.

Let's keep things stupidly simple and simply hash the domain name to get a unique IPv6 ULA prefix.

Then we would need a stupidly simple backend application to automatically fetch pubkeys and endpoints from DNS and make a request to add each others as peers.

Et voilà, you got a worldwide federated wireguard network resolving private ULA addresses. Sort of an internet on top of the internet .

The DNS entries with the public IPv4 / IPv6 addresses could even be delegated to other domains / endpoints which would act as reverse proxy (either routing or nesting tunnels) for further privacy.

Maybe my approach is too naïve and there are flaws I haven't considered, so don't be afraid to comment.

Exact use cases? Idk, but it sounds nifty.

cc: @fediverse

Foxboron, to random
@Foxboron@chaos.social avatar

The Wireguard android app is now Reproducible and distributed with Jasons own signing key.

https://lists.zx2c4.com/pipermail/wireguard/2023-April/008045.html

Pretty cool.

#Wireguard #ReproducibleBuilds

thomas, to android
@thomas@metalhead.club avatar

Is there an Android app that can turn VPNs on and off based on location?

mikael, to wireguard
@mikael@hachyderm.io avatar

does it right: I configured hosted on my for my and my laptops, and it supports and out of the box without issues.

https://oxcrag.net/blog/2024/04/14/Connecting-to-Home-From-Abroad.html

eighty, to wireguard German
@eighty@metalhead.club avatar

Ok, mit android app auf Wireguard auf Proxmox LXC lässt sich zwar verbinden, aber local NAS und so bekomme ich nicht angezeigt.

"NetBIOS" Dingens nope, weil kein Fritzbox Router.

Ulkigerweise wird der LXC auch nicht bei den angeschlossenen Geräten im Router gelistet, hat aber ne IP vom Router bekommen und Port forwarding funzt ja wie gesagt auch.

#wireguard #wireguardvpn #proxmox

retiolus, (edited ) to Help
@retiolus@mamot.fr avatar

Would someone me configure my server to access my home local network?

I've literally been stuck for 6 hours.

https://forum.yunohost.org/t/cant-access-yunohost-local-network-through-wireguard-server/29127/1

@linuxquestions

bram, to wireguard
@bram@gamedev.lgbt avatar

im in a public library, and i think they throttled my wifi, because Apparently, you're not allowed to push Gigabytes worth of data over your own connection :(

qlp, to homelab
@qlp@linh.social avatar

It kind of feels good to finally understand the process of setting up WireGuard on pfSense and on my Linux and FreeBSD servers.

It also feels good to start ripping out Tailscale from my network.

#HomeLab #Networking #WireGuard

leetNightshade, to wireguard

I had a docker ...VPN setup... w/ working for a while, but no matter which image I used for the network bridge the wireguard part connects, but stopped working. Then I switched to OpenVPN, which is sadly a lot slower, but my 2 month broken setup started working!

cjk, to wireguard German
@cjk@chaos.social avatar

Just set up for company VPN, to replace OpenVPN 🥳

kazaii, to wireguard
@kazaii@noc.social avatar
francis, to linux
@francis@babb.no avatar

A wireguard bridge I had between two lan's stopped worked. I tried everything: when it was up, I couldn't access the server. Out of the blue.
Upgraded to the newest ubuntu distro, and it works again.
I hate when things stop working without a clear sign of what is failing. And not better when it is fixed with no trace of what was wrong.

geo, to wireguard
@geo@mastodon.scot avatar

Been digesting the earlier meeting with Scottish Water on CSO activities and what the plan is going forward for the Water of Leith.

Before I write about that, I’m going to mention here that I had an ace evening reading about home networking, , and .

My PiHole has been running super well filtering out good stuff. Just got a VPN setup through it too - and it worked on the first try.

Feeling rather accomplished today, it gonna lie.

mav, to wireguard

Thought I might register wireguard.sucks and put up a wiki or something of all the stuff I've learned while working on wireguard, but friggin .sucks domains cost $330, which is way too much for a dumb joke.

wireguard.works is only 37 bucks but that seems like an overstatement if I'm honest

whynothugo, to wireguard
@whynothugo@fosstodon.org avatar

I’m having some difficulty with #wireguard. It runs and indicates that it is adding routes. But ip a doesn’t show these routes, and traffic doesn’t seem to flow through the tunnel.

Here’s my config file and logs: https://paste.sr.ht/blob/d3023ac942e92461d67a8092f3ec03e85cde40b9

Any guidance is appreciated.

arda, to wireguard
@arda@micro.arda.pw avatar
saustrup, to linux
@saustrup@mstdn.dk avatar

I'm a geek and a security enthusiast. Also, I'm a cheapskate. Last time our family was out and about, the hotel offered paid wifi, priced per device and I wasn't having it. Cue the TP-Link RE650 - a "range extender" capable of running the router firmware. Performance and stability was crap when doing wifi-to-wifi bridging and the device didn't have enough juice to run , which is the way I connect safely to my home rack. A couple of weeks ago, I discovered the AX () travel router from GL-iNet. Same concept, but half the size, a lot more juice, USB-C powered, SD slot and USB connector and so far rock solid and powerful enough to run WireGuard with cycles to spare. I'm a very happy customer! 🙂

https://www.gl-inet.com/products/gl-axt1800/

cybersmog, to wireguard
@cybersmog@phpc.social avatar

Versuche gerade, #WireGuard #VPN zu meiner FRITZ!Box einzurichten. Der WireGuard Client am Mac und auch am iPhone sagen jeweils, dass die Verbindung aktiv ist aber dann funktionieren jeweils keinerlei ausgehende Verbindungen mehr. Währenddessen wird in der FRITZ!Box auch nicht angezeigt, dass eine VPN Verbindung aktiv wäre.
Wo fange ich da an zu suchen?

vazub, to MullvadVPN
@vazub@mastodon.online avatar

To my German friends. If you use a combination of #FritzBox router, #Vodafone ISP and #MullvadVPN - meaning you are trying to set up #Wireguard on the router itself - be wary, that this setup is known to leak your IPv6 address. On the other hand, if you use Mullvad VPN App on your OS, everything works fine. Not sure who to blame here specifically, but this has been a disturbing revelation to me. Be careful.

abcdw, to guix
@abcdw@fosstodon.org avatar

A quick and practical WireGuard in Guix stream:

https://youtu.be/d02Ysd8bNso

tek_dmn, to selfhosted
@tek_dmn@mastodon.tekdmn.me avatar

Okay nerds, it's #selfhosted #authentication #askFedi time.

I'm about to move a few parts of my network off-site. Anyone have any input for getting LDAP-based authentication to work across locations?

Like, LDAP+TLS with mutual certificate authentication is just fine, but I don't like the idea of exposing an LDAP port. Though a firewall rule to only allow the other side's IP to access it would probably be okay.

Given that this side still needs to access some internal services, it also makes sense just to #WireGuard it or something, that gives me everything in a manner that I believe is secure, I've yet to hear of any breaks on its encryption... just that if the remote host is compromised I have quite a wide open attack surface.

Any ideas?

#askFediverse #networking #networkSecurity

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • everett
  • osvaldo12
  • magazineikmin
  • thenastyranch
  • rosin
  • tester
  • Youngstown
  • Durango
  • slotface
  • ngwrru68w68
  • kavyap
  • DreamBathrooms
  • provamag3
  • InstantRegret
  • ethstaker
  • GTA5RPClips
  • tacticalgear
  • normalnudes
  • Leos
  • modclub
  • khanakhh
  • cubers
  • cisconetworking
  • megavids
  • anitta
  • lostlight
  • All magazines