lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

68
active users

#wireguard

0 posts0 participants0 posts today
Dave Polaschek (he/him)<p>So, if I want to buy a paper book to learn about WireGuard, what's the book to buy? Is it Lin Song's? I also need to learn more about IPv6 at some point, so if there's some book that covers both, maybe that would be better? Or will the upcoming <a href="https://writing.exchange/tags/n4sa2e" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>n4sa2e</span></a> have all the knowledge I'll need, <span class="h-card" translate="no"><a href="https://io.mwl.io/@mwl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mwl</span></a></span> ? <a href="https://writing.exchange/tags/AskFedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AskFedi</span></a> <a href="https://writing.exchange/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://www.biblio.com/9798987508909" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">biblio.com/9798987508909</span><span class="invisible"></span></a></p><p>Edit to add: I also need to learn more about pf, so answers which include that would also be welcome.</p>
a<p>QQ: how low power can I go for a <a class="hashtag" href="https://91268476.xyz/collections/tags/sbc" rel="nofollow noopener" target="_blank">#sbc</a> machine to act as a <a class="hashtag" href="https://91268476.xyz/collections/tags/tailscale" rel="nofollow noopener" target="_blank">#tailscale</a> or <a class="hashtag" href="https://91268476.xyz/collections/tags/wireguard" rel="nofollow noopener" target="_blank">#wireguard</a> client? I guess it is possible to use a <a class="hashtag" href="https://91268476.xyz/collections/tags/raspberrypi" rel="nofollow noopener" target="_blank">#raspberrypi</a> zero w 2</p><p>Additionally: where can I get something like that in <a class="hashtag" href="https://91268476.xyz/collections/tags/london" rel="nofollow noopener" target="_blank">#London</a> ?</p><p>Cc <span class="h-card"><a class="u-url mention" href="https://lemmy.world/c/selfhosted" rel="nofollow noopener" target="_blank">@selfhosted</a></span></p>
Michael Dexter<p>Is there a newer than two-year-old graphical <a href="https://bsd.network/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> client for macOS?</p>
Max<p>Sind hier auch VPN Experten? Ich habe auf einem VServer Wireguard-Easy laufen. Mit einem Router (RUTX50) und einem Client kann ich mich damit verbinden. Mit dem Client komm ich mit 10.8.0.2 auf die Weboberfläche vom Router. Wie komm ich jetzt auf die Geräte (Nas, Kamera,..) hinterm Router? </p><p><a href="https://afterspace.rocks/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> <a href="https://afterspace.rocks/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://afterspace.rocks/tags/Teltonika" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Teltonika</span></a> <a href="https://afterspace.rocks/tags/RUTX50" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RUTX50</span></a></p>
CryptGoat<p>Bevor ich jetzt gleich pennen gehe, muss ich noch die freie <a href="https://fedifreu.de/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a>-App <a href="https://fedifreu.de/tags/WGTunnel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WGTunnel</span></a> highlighten: Damit lässt sich schön steuern, wie und wann ich mich zum meinem Heimnetz per <a href="https://fedifreu.de/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> verbinden will. :awesome: Läuft sogar auf <a href="https://fedifreu.de/tags/AndroidTV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AndroidTV</span></a>. <br><a href="https://wgtunnel.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">wgtunnel.com/</span><span class="invisible"></span></a></p><p>Ist auch via <a href="https://fedifreu.de/tags/FDroid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDroid</span></a> verfügbar: <a href="https://f-droid.org/packages/com.zaneschepke.wireguardautotunnel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">f-droid.org/packages/com.zanes</span><span class="invisible">chepke.wireguardautotunnel/</span></a></p><p><a href="https://fedifreu.de/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://fedifreu.de/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
David Chisnall (*Now with 50% more sarcasm!*)<p>Sigh. Search for information about configuring <a href="https://infosec.exchange/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> on <a href="https://infosec.exchange/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a>. Second result on <a href="https://infosec.exchange/tags/DuckDuckGo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DuckDuckGo</span></a> is a slop web site, which initially looks plausible but then runs a bunch of configuration commands that don't exist on FreeBSD. It does make up plausible output from the FreeBSD equivalents of those commands though!</p><p>I wonder how much of the productivity gains of using GenAI are simply slightly offsetting the productivity loses that come from everyone else using it.</p>
Solène :flan_hacker:<p>Anyone in the room with experience setting up a <a href="https://bsd.network/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> tunnel (with wireguard-go) at boot on a Mac OS arm64 system? :flan_bored: </p><p>I can't get the damn thing to work :flan_on_fire: </p><p>This is for a friend, I do not use a Mac myself :flan_tea: </p><p>I wrote a plist file that start a script invoking wg-quick, I sent the output of `wg` in a log file at this time and the tunnel exists but there is no network, a ping does not work. </p><p>Starting the script again manually makes things ok :flan_shrug:</p><p>EDIT: thanks everyone for your messages, I don't have the system at hand, nor I have the files so I can't reply yet, but I'll come back to you whom replied once I bring with some content :)</p>
House Panther :verified:<p><span class="h-card" translate="no"><a href="https://ottawa.place/@Dianora" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Dianora</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@stefano" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>stefano</span></a></span> Thanks! It’s a pretty good workaround. <a href="https://goblackcat.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> makes the entire thing easy as pie!</p>
House Panther :verified:<p>I just have to say that I love <a href="https://goblackcat.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a>. It’s quite possibly the very best protocol out there for site-to-site VPN tunneling. It’s a snap to configure and I’ve found it to be very fast, sometimes close to provisioned bandwidth.</p>
matuzalem<p>I wanted a <a href="https://mastodon.bsd.cafe/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> GUI client for <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> and there wasn't none so I put this QT6 thing together last night.</p>
Mika<p>I need to <i>properly</i> learn what <a href="https://sakurajima.social/tags/Tailscale" rel="nofollow noopener" target="_blank">#Tailscale</a> is, cos I really have no idea why one would use it when <a href="https://sakurajima.social/tags/Wireguard" rel="nofollow noopener" target="_blank">#Wireguard</a> exists - which to my understanding, is also what Tailscale uses/is based on. As far as I'm aware, unlike Wireguard, Tailscale isn't a complete <a href="https://sakurajima.social/tags/FOSS" rel="nofollow noopener" target="_blank">#FOSS</a><span> package that you self-host and own, and it even requires an online account registration to use it.<br><br>I'm pretty sure people use it for free, but I'm not sure if it's not without any paid plans (now or in the future) seeing how you need to create an account with them. Seeing how easy and lightweight it is to deploy Wireguard yourself, and seeing how there's still some fiddling/deployment you need to do yourself on your own hardware to deploy Tailscale, I'm sure I'm missing something here that makes people recommend/use it.</span></p>
thinkberg<p>What could be the reason I get "Packet has unallowed source IP from peer 1" by <a href="https://tetrax.de/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a>? I basically copied the server setup from <a href="https://tetrax.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> to <a href="https://tetrax.de/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> and just used the new server address on the client.</p>
Jonathan Kamens 86 47<p>I use the <a href="https://federate.social/tags/Blokada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blokada</span></a> <a href="https://federate.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://federate.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> on 5 devices: 4 <a href="https://federate.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> boxes and an Android phone.<br>This morning, internet on two of the Linux boxes crapped out when connected to the VPN. TCP connections were taking ridiculously long or hanging completely. For example, I saw "time curl --silent <a href="https://cnn.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cnn.com/</span><span class="invisible"></span></a>" take over a minute with the VPN connected vs. a fraction of a second without. Disconnecting and reconnecting to the VPN didn't help. Neither did rebooting.<br>(continued)</p>
kuijsten<p>I'm looking for a more powerful successor of the APU2. Does anyone have a recommendation? Anyone maybe experience with the devices from protectli.com?</p> <p>It has to run <a class="mention u-url" href="https://honk.netsend.nl/o/openbsd" rel="nofollow noopener" target="_blank">#OpenBSD</a> and a dozen of 100mbit <a class="mention u-url" href="https://honk.netsend.nl/o/wireguard" rel="nofollow noopener" target="_blank">#WireGuard</a> tunnels.</p> <p>/cc <a class="mention u-url" href="https://exquisite.social/users/mischa" rel="nofollow noopener" target="_blank">@mischa</a></p>
Jonathan Kamens 86 47<p>Sysadmin journal: setting up wireguard on all of my Linux&nbsp;desktops</p><p>I had to hack together a few things to use wireguard transparently on my Android phone and all of my Linux laptops and desktop.<br><a href="https://federate.social/tags/ddclient" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddclient</span></a> <a href="https://federate.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://federate.social/tags/NetworkManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkManager</span></a> <a href="https://federate.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://federate.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://federate.social/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a> <a href="https://federate.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a><br><a href="https://blog.kamens.us/2025/05/10/sysadmin-journal-setting-up-wireguard-on-all-of-my-linux-desktops/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.kamens.us/2025/05/10/sysa</span><span class="invisible">dmin-journal-setting-up-wireguard-on-all-of-my-linux-desktops/</span></a></p>
Vereniging NLUUG<p>Veel hotels en events blokken UDP verkeer, waardoor <a href="https://nluug.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> <a href="https://nluug.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> niet werkt. <br><a href="https://nluug.social/tags/Proxyguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxyguard</span></a> is hiervoor wellicht een oplossing. Op de NLUUG voorjaarsconferentie van 22 mei 2025 zal Jeroen Wijenbergh ons vertellen over zijn ervaringen met deze tool.</p><p>Kijk voor het hele programma op <a href="https://cfp.nluug.nl/nluug-voorjaarsconferentie-2025/schedule/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cfp.nluug.nl/nluug-voorjaarsco</span><span class="invisible">nferentie-2025/schedule/</span></a> </p><p><a href="https://nluug.social/tags/NLUUG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NLUUG</span></a> is dé vereniging voor (professionele) gebruikers van UNIX/Linux, <a href="https://nluug.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a>, <a href="https://nluug.social/tags/OpenSystemen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSystemen</span></a> en <a href="https://nluug.social/tags/OpenStandaarden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenStandaarden</span></a> in Nederland. </p><p>Schrijf je in en zie je op de voorjaarsconferentie!</p>
Adrian Dymorz<p>Ich habe gerade erfolgreich mit <a href="https://mastodon.peaceful.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> ein <a href="https://mastodon.peaceful.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> zwischen zwei Geräten (Mobiler PC mit <a href="https://mastodon.peaceful.social/tags/LinuxMint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxMint</span></a> und <a href="https://mastodon.peaceful.social/tags/iPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iPhone</span></a>) und dem Heim-Netzwerk über eine <a href="https://mastodon.peaceful.social/tags/FritzBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FritzBox</span></a> eingerichtet. Das ganze hat weniger als 15 Minuten gedauert.</p><p>Netzwerkverkehr läuft über <a href="https://mastodon.peaceful.social/tags/IPv4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv4</span></a> und <a href="https://mastodon.peaceful.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a>.</p><p>Das fühlt sich gerade ein bisschen zu gut an um wahr zu sein.</p>
gyptazy<p>From an idea to a working beta version in just a few hours. <a href="https://mastodon.gyptazy.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> tunnel service with <a href="https://mastodon.gyptazy.com/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> and <a href="https://mastodon.gyptazy.com/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVPN</span></a> support. GRE &amp; SIT follows, OpenVPN PKI backend will be switched to Hashicorp Vault.</p><p>Still several things to do… <a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://mastodon.gyptazy.com/tags/IPv4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv4</span></a> <a href="https://mastodon.gyptazy.com/tags/GRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRE</span></a> <a href="https://mastodon.gyptazy.com/tags/SIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIT</span></a> <a href="https://mastodon.gyptazy.com/tags/Tunnel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tunnel</span></a> <a href="https://mastodon.gyptazy.com/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.gyptazy.com/tags/net" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>net</span></a> <a href="https://mastodon.gyptazy.com/tags/services" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>services</span></a> <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@BoxyBSD" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BoxyBSD</span></a></span></p>
gyptazy<p>Would you be interested into an alternative <a href="https://mastodon.gyptazy.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> Tunnelbroker service? Hosted and located in Germany, offering free IPv6 subnets (not sure about sizes, sth. between /64 - /48) that can be used by <a href="https://mastodon.gyptazy.com/tags/SIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIT</span></a>, <a href="https://mastodon.gyptazy.com/tags/GRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRE</span></a>, <a href="https://mastodon.gyptazy.com/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVPN</span></a> or <a href="https://mastodon.gyptazy.com/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> tunnels. Currently, this is already available but only for <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@BoxyBSD" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BoxyBSD</span></a></span> users.</p>
Chris Adams<p>If you have used and loved <a href="https://mastodon.social/tags/Tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailscale</span></a>, and you still like the product but want a sensible insurance option to reduce your exposure to potential <a href="https://mastodon.social/tags/enshittification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enshittification</span></a>, what *hosted* options have you looked at as alternatives?</p><p>Part of the appeal of <a href="https://mastodon.social/tags/Tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailscale</span></a> for me at least was that they provided a really thoughtful UX layer over some existing cool OSS tech like <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a>.</p><p>Also, many of us have tried self-hosting and want to minimise what they self host if at all possible.<br><a href="https://mastodon.social/@JonathanGerlach/114302498688902923" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@JonathanGerla</span><span class="invisible">ch/114302498688902923</span></a></p>