mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.8K
active users

#wireguard

6 posts6 participants0 posts today

I'm interested in setting up #WireGuard on my #Debian colo, as a #VPN solution for my phone when I'm on untrusted networks. But the quick start guide being a video is really putting me off, and the examples seem to be purely about ad-hoc peer-to-peer networking rather than a gateway.

I'm tempted to go back to my comfort zone with #OpenVPN, but I'll stick with it. At some point it'll click and I'll write a HOWTO.

Continued thread

right right right, when not using the host IP, the source IP comes from the cluster, despite cilium egress gateway being enabled

so I had to add the pod network range to AllowedIPs on the cloud side, and that is indeed different on the new cluster.

this of course is not ideal, because if I wanted to join multiple, I could, but I'd have to modify the talos wireguard config, with the node's
podCIDR which is known only after joining the cluster.... bleh

There should be some masquarading going on with the egress gateway, right?

Anyhow this is exactly the issue I was facing a while ago when I lost momentum on the blog the last time so it has gone full circle

#Homelab #Kubernetes #Wireguard #Networking

Replied in thread

@bradley I'm NOT exposing my #pihole (s) directly to the internet - I use one at home and another one via #wireguard #vpn whereever I may roam 🙂 Exposed ports for GUI and "healtchecks" are on a "random" highport which keeps logs mostly clear of "noise". Sometimes some scanners like #censys (or #shodan ) might also find these ports, but #iptables is very helpful 😉
Feel free to ask my via PM if something is not clear. I like feedback to make my docs better.

Replied in thread

@StaceyCornelius In the past I did configure seperate systems for clients so they can travel without fuss regardless if "P.R." #China or #Russia or the #USA or #KSA...

  • The trick is to never have anything on your device and have a dedicaded burner!

Using @tails_live / @tails / #Tails and @torproject / #TorBrowser and when that's not an option, a #SSH-Tunnel / #OpenVPN or #WireGuard-#VPN to be able to #VNC into a machine.

  • Remember: They can only extract data that was saved on a machine!

CONSIDER THE #US ENEMY TERRITORY AS IN "If you wouldn't enter #NorthKorea, then why would you enter the USA?"

Ok ##wireguard and #homelab heads. I'm having a hard time figuring this out. I have a service that I'm hosting that I'm currently routing all of it's outbound traffic through a VPN provider and wiregaurd. However, when I do that I lose all connectivity to the service because.. All traffic is moving through wiregaurd. I have tried AllowedIPs= that didn't seem to work. I tried a bunch of Preup and PostUP stuff and that didn't seem to work.

Replied in thread

@ceresbzns You'd probably hate it, as it involves using short-lived nfs mounts through #wireguard tunnels. The hosts in the LAN copy the certs they need in this way. Systemd timers automate this "pulling". I only had to write 10 lines of bash code, in the way of actual programming.

I wanted to set up VPN with ad-blocking for laptop and mobile, for when away from home, so I installed FreeBSD 14.2 on a Raspberry Pi 4, because why not?

Followed:

1) zenarmor.com/docs/network-secu

2) it-notes.dragas.net/2023/09/23

(only using IPv4)

Seems to work as intended, but I'm not sure if ~500 ms ping times are normal for 5G mobile connection through VPN.

Replied in thread

@floe

Through a #wireguard tunnel ssh works in both directions.

With wireguard use PersistentKeepAlive on the "forgetting" side of NAT. Usually a home modem does NAT, so the computer that is not at home needs PersistentKeepAlive, and the home modem ideally has a fixed IP address or a DNS host name.

Wow, #ChatGPT actually helped me debug a networking issue I had. My #Wireguard tunnel did not work as expected, most traffic was tunnelled just fine, but some websites I tried to access through it did not want to load and just timed out, even though curl showed me that DNS worked and that it could connect.
The culprit: MTU. Setting it slightly lower to 1410 seemed to fix it for me. Probably due to PPPoE..
#homelab #itsnotalwaysDNS