lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

53
active users

#wireguard

0 posts0 participants0 posts today
Robert W. Gehl<p>welp, my latest Fedora KDE update borked my Wireguard installation. No discernable errors. It just... won't connect to its peer. </p><p>Maybe it's time to do something other than Fedora...</p><p><a href="https://aoir.social/tags/fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedora</span></a> <a href="https://aoir.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://aoir.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Michael Jack<p>I've got a OpenBSD VPS with a WireGuard connection to a server on my home network. I can ssh and ping both ways through the WireGuard tunnel.</p><p>Would it be possible to use relayd on the VPS to direct traffic to different services running on the server at home?</p><p>service1.example.com -&gt; server:8443<br>service2.example.com -&gt; server:8090</p><p>It kind of looks that way from:</p><p><a href="https://mutualaid.info/posts/using-relayd-as-a-reverse-proxy-on-openbsd/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mutualaid.info/posts/using-rel</span><span class="invisible">ayd-as-a-reverse-proxy-on-openbsd/</span></a></p><p>I can add DNS records to the domain in question.</p><p>(I'm new to OpenBSD, but not Linux)</p><p><a href="https://hachyderm.io/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> <a href="https://hachyderm.io/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://hachyderm.io/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a></p>
Alec Muffett<p>1995: Story Claims PGP Used to Cloak Net Pedophiles | CNET | banning VPNs would be like pissing against the wind…<br><a href="https://alecmuffett.com/article/113880" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">alecmuffett.com/article/113880</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndToEndEncryption</span></a> <a href="https://mastodon.social/tags/OnlineSafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineSafety</span></a> <a href="https://mastodon.social/tags/OnlineSafetyAct" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineSafetyAct</span></a> <a href="https://mastodon.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://mastodon.social/tags/aws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aws</span></a> <a href="https://mastodon.social/tags/censorship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>censorship</span></a> <a href="https://mastodon.social/tags/ofcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ofcom</span></a> <a href="https://mastodon.social/tags/pgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pgp</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a></p>
Christoffer S.<p>If you've ever been curious about setting up a "good" WireGuard based private network I cannot recommend this article enough:</p><p><a href="https://taggart-tech.com/wireguard/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">taggart-tech.com/wireguard/</span><span class="invisible"></span></a></p><p>Written by <span class="h-card" translate="no"><a href="https://infosec.exchange/@mttaggart" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mttaggart</span></a></span> </p><p>It really does provide all the details, and more, about how to "properly" configure and setup a WG network of hosts and making things work.</p><p><a href="https://swecyb.com/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://swecyb.com/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://swecyb.com/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a></p>
0x0<p>Here's the customary <a href="https://hachyderm.io/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a>: i'm into <a href="https://hachyderm.io/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a> and tolerate C++ on a daily basis at work, i've also used others like java, kotlin, python, PHP, etc and am curious about <a href="https://hachyderm.io/tags/COBOL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>COBOL</span></a>, <a href="https://hachyderm.io/tags/AdaLanguage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdaLanguage</span></a> and <a href="https://hachyderm.io/tags/erlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>erlang</span></a>.</p><p>My dislike of jenkins is only surpassed by my hate of githubactions and everything MS-related. AI is not I, only A. I'm interested in <a href="https://hachyderm.io/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> stuff but atm that's a VPS with some sites, which doesn't really count. For now <a href="https://hachyderm.io/tags/syncthing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syncthing</span></a> is quite useful and <a href="https://hachyderm.io/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> is on the horizon once i reformat/reinstall my current <a href="https://hachyderm.io/tags/gentoo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gentoo</span></a> (i'll keep the root <a href="https://hachyderm.io/tags/ZFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFS</span></a> aproach and am on the fence regarding <a href="https://hachyderm.io/tags/XFCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XFCE</span></a> or <a href="https://hachyderm.io/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a>), would be interesting to have a barebones <a href="https://hachyderm.io/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a>/#QEMU running all the stuff and i digress.</p><p>kthxbai\0</p>
a<p>QQ: how low power can I go for a <a class="hashtag" href="https://91268476.xyz/collections/tags/sbc" rel="nofollow noopener" target="_blank">#sbc</a> machine to act as a <a class="hashtag" href="https://91268476.xyz/collections/tags/tailscale" rel="nofollow noopener" target="_blank">#tailscale</a> or <a class="hashtag" href="https://91268476.xyz/collections/tags/wireguard" rel="nofollow noopener" target="_blank">#wireguard</a> client? I guess it is possible to use a <a class="hashtag" href="https://91268476.xyz/collections/tags/raspberrypi" rel="nofollow noopener" target="_blank">#raspberrypi</a> zero w 2</p><p>Additionally: where can I get something like that in <a class="hashtag" href="https://91268476.xyz/collections/tags/london" rel="nofollow noopener" target="_blank">#London</a> ?</p><p>Cc <span class="h-card"><a class="u-url mention" href="https://lemmy.world/c/selfhosted" rel="nofollow noopener" target="_blank">@selfhosted</a></span></p>
Michael Dexter<p>Is there a newer than two-year-old graphical <a href="https://bsd.network/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> client for macOS?</p>
Max<p>Sind hier auch VPN Experten? Ich habe auf einem VServer Wireguard-Easy laufen. Mit einem Router (RUTX50) und einem Client kann ich mich damit verbinden. Mit dem Client komm ich mit 10.8.0.2 auf die Weboberfläche vom Router. Wie komm ich jetzt auf die Geräte (Nas, Kamera,..) hinterm Router? </p><p><a href="https://afterspace.rocks/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> <a href="https://afterspace.rocks/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://afterspace.rocks/tags/Teltonika" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Teltonika</span></a> <a href="https://afterspace.rocks/tags/RUTX50" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RUTX50</span></a></p>
CryptGoat<p>Bevor ich jetzt gleich pennen gehe, muss ich noch die freie <a href="https://fedifreu.de/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a>-App <a href="https://fedifreu.de/tags/WGTunnel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WGTunnel</span></a> highlighten: Damit lässt sich schön steuern, wie und wann ich mich zum meinem Heimnetz per <a href="https://fedifreu.de/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> verbinden will. :awesome: Läuft sogar auf <a href="https://fedifreu.de/tags/AndroidTV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AndroidTV</span></a>. <br><a href="https://wgtunnel.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">wgtunnel.com/</span><span class="invisible"></span></a></p><p>Ist auch via <a href="https://fedifreu.de/tags/FDroid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDroid</span></a> verfügbar: <a href="https://f-droid.org/packages/com.zaneschepke.wireguardautotunnel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">f-droid.org/packages/com.zanes</span><span class="invisible">chepke.wireguardautotunnel/</span></a></p><p><a href="https://fedifreu.de/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://fedifreu.de/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
David Chisnall (*Now with 50% more sarcasm!*)<p>Sigh. Search for information about configuring <a href="https://infosec.exchange/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> on <a href="https://infosec.exchange/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a>. Second result on <a href="https://infosec.exchange/tags/DuckDuckGo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DuckDuckGo</span></a> is a slop web site, which initially looks plausible but then runs a bunch of configuration commands that don't exist on FreeBSD. It does make up plausible output from the FreeBSD equivalents of those commands though!</p><p>I wonder how much of the productivity gains of using GenAI are simply slightly offsetting the productivity loses that come from everyone else using it.</p>
Solène :flan_hacker:<p>Anyone in the room with experience setting up a <a href="https://bsd.network/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> tunnel (with wireguard-go) at boot on a Mac OS arm64 system? :flan_bored: </p><p>I can't get the damn thing to work :flan_on_fire: </p><p>This is for a friend, I do not use a Mac myself :flan_tea: </p><p>I wrote a plist file that start a script invoking wg-quick, I sent the output of `wg` in a log file at this time and the tunnel exists but there is no network, a ping does not work. </p><p>Starting the script again manually makes things ok :flan_shrug:</p><p>EDIT: thanks everyone for your messages, I don't have the system at hand, nor I have the files so I can't reply yet, but I'll come back to you whom replied once I bring with some content :)</p>
House Panther :verified_paw:<p><span class="h-card" translate="no"><a href="https://ottawa.place/@Dianora" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Dianora</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@stefano" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>stefano</span></a></span> Thanks! It’s a pretty good workaround. <a href="https://goblackcat.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> makes the entire thing easy as pie!</p>
House Panther :verified_paw:<p>I just have to say that I love <a href="https://goblackcat.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a>. It’s quite possibly the very best protocol out there for site-to-site VPN tunneling. It’s a snap to configure and I’ve found it to be very fast, sometimes close to provisioned bandwidth.</p>
matuzalem<p>I wanted a <a href="https://mastodon.bsd.cafe/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> GUI client for <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> and there wasn't none so I put this QT6 thing together last night.</p>
Mika<p>I need to <i>properly</i> learn what <a href="https://sakurajima.social/tags/Tailscale" rel="nofollow noopener" target="_blank">#Tailscale</a> is, cos I really have no idea why one would use it when <a href="https://sakurajima.social/tags/Wireguard" rel="nofollow noopener" target="_blank">#Wireguard</a> exists - which to my understanding, is also what Tailscale uses/is based on. As far as I'm aware, unlike Wireguard, Tailscale isn't a complete <a href="https://sakurajima.social/tags/FOSS" rel="nofollow noopener" target="_blank">#FOSS</a><span> package that you self-host and own, and it even requires an online account registration to use it.<br><br>I'm pretty sure people use it for free, but I'm not sure if it's not without any paid plans (now or in the future) seeing how you need to create an account with them. Seeing how easy and lightweight it is to deploy Wireguard yourself, and seeing how there's still some fiddling/deployment you need to do yourself on your own hardware to deploy Tailscale, I'm sure I'm missing something here that makes people recommend/use it.</span></p>
thinkberg<p>What could be the reason I get "Packet has unallowed source IP from peer 1" by <a href="https://tetrax.de/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a>? I basically copied the server setup from <a href="https://tetrax.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> to <a href="https://tetrax.de/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> and just used the new server address on the client.</p>
Jonathan Kamens 86 47<p>I use the <a href="https://federate.social/tags/Blokada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blokada</span></a> <a href="https://federate.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://federate.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> on 5 devices: 4 <a href="https://federate.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> boxes and an Android phone.<br>This morning, internet on two of the Linux boxes crapped out when connected to the VPN. TCP connections were taking ridiculously long or hanging completely. For example, I saw "time curl --silent <a href="https://cnn.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cnn.com/</span><span class="invisible"></span></a>" take over a minute with the VPN connected vs. a fraction of a second without. Disconnecting and reconnecting to the VPN didn't help. Neither did rebooting.<br>(continued)</p>
kuijsten<p>I'm looking for a more powerful successor of the APU2. Does anyone have a recommendation? Anyone maybe experience with the devices from protectli.com?</p> <p>It has to run <a class="mention u-url" href="https://honk.netsend.nl/o/openbsd" rel="nofollow noopener" target="_blank">#OpenBSD</a> and a dozen of 100mbit <a class="mention u-url" href="https://honk.netsend.nl/o/wireguard" rel="nofollow noopener" target="_blank">#WireGuard</a> tunnels.</p> <p>/cc <a class="mention u-url" href="https://exquisite.social/users/mischa" rel="nofollow noopener" target="_blank">@mischa</a></p>
Jonathan Kamens 86 47<p>Sysadmin journal: setting up wireguard on all of my Linux&nbsp;desktops</p><p>I had to hack together a few things to use wireguard transparently on my Android phone and all of my Linux laptops and desktop.<br><a href="https://federate.social/tags/ddclient" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddclient</span></a> <a href="https://federate.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://federate.social/tags/NetworkManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkManager</span></a> <a href="https://federate.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://federate.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://federate.social/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a> <a href="https://federate.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a><br><a href="https://blog.kamens.us/2025/05/10/sysadmin-journal-setting-up-wireguard-on-all-of-my-linux-desktops/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.kamens.us/2025/05/10/sysa</span><span class="invisible">dmin-journal-setting-up-wireguard-on-all-of-my-linux-desktops/</span></a></p>
Vereniging NLUUG<p>Veel hotels en events blokken UDP verkeer, waardoor <a href="https://nluug.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> <a href="https://nluug.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> niet werkt. <br><a href="https://nluug.social/tags/Proxyguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxyguard</span></a> is hiervoor wellicht een oplossing. Op de NLUUG voorjaarsconferentie van 22 mei 2025 zal Jeroen Wijenbergh ons vertellen over zijn ervaringen met deze tool.</p><p>Kijk voor het hele programma op <a href="https://cfp.nluug.nl/nluug-voorjaarsconferentie-2025/schedule/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cfp.nluug.nl/nluug-voorjaarsco</span><span class="invisible">nferentie-2025/schedule/</span></a> </p><p><a href="https://nluug.social/tags/NLUUG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NLUUG</span></a> is dé vereniging voor (professionele) gebruikers van UNIX/Linux, <a href="https://nluug.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a>, <a href="https://nluug.social/tags/OpenSystemen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSystemen</span></a> en <a href="https://nluug.social/tags/OpenStandaarden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenStandaarden</span></a> in Nederland. </p><p>Schrijf je in en zie je op de voorjaarsconferentie!</p>