Steamymoomilk
@Steamymoomilk@sh.itjust.works
Linux hobbyist, Machinist and Craftsman
- Comment on Prices are out of control 1 week ago:
Enhanced flavor™
- Comment on Microsoft CEO says up to 30% of the company's code was written by AI | TechCrunch 2 weeks ago:
If this were true there would massive databreaches. AI is really bad at keeping private keys private. Not to even mention the default credentials it would use because it doesnt have commen sense to change them
- Comment on Literal interpretation 2 weeks ago:
How would you rate your shit?
- Comment on Rev up those 3D printers! 3 weeks ago:
THERE PUTTING H2O IN THE WATER GASP THOSE SNEAKY BASTARDS!!!
- Comment on An oldie but a goodie 3 weeks ago:
"IS THIS A WEED? "
- Comment on Elon Musks Grok openly rebels against him 1 month ago:
Be elon musk have 1st child, hates elon have 2nd child, hates elon FUCK IT ill make a LLM love me. have grok grok ousts stupidity and distain for his creator. Elon just stop its just sad…
- Submitted 1 month ago to selfhosted@lemmy.world | 4 comments
- Comment on infected by the fediverse 1 month ago:
theres a meme that got popular on lemmy just shitposting about BEANS and then JEANS. so its playing on that.
- Comment on infected by the fediverse 1 month ago:
I usually name systems after ablums names from music i listen to. Lmao it is an odd name TBH
- Comment on Popular 3D printer vendor has come up with a foldable portable concept that's mindblowing 1 month ago:
Its going to end with the the juicearo and google glass theres no way this concept goes anywhere
- Comment on ive always wanted to do this, with annoying customers 1 month ago:
Go figure i did not know that
- Comment on ive always wanted to do this, with annoying customers 1 month ago:
thank you for sharing i had no idea of this. and its really fucking funny shit! i love this kind of humor!
- Comment on infected by the fediverse 1 month ago:
i might steal that for datasets >:D
- Comment on ive always wanted to do this, with annoying customers 1 month ago:
ADSL filter thats pretty damn funny! its like the blinker fluid equivalent of tech support
- Comment on ive always wanted to do this, with annoying customers 1 month ago:
good story! honestly got a good chuckle out of me
- Submitted 1 month ago to [deleted] | 15 comments
- Submitted 1 month ago to [deleted] | 28 comments
- Comment on Arkham aslume 1 month ago:
The jonkler
- Comment on New MAGA acronym interpretation 2 months ago:
Malice Assholes Grift Again
- Comment on I can not over express how happy I am with having setup my NAS from scratch. 2 months ago:
Grammer is for english class or grammer community’s. Who cares
- Comment on Help with iptables, using nixos setting up a wiregaurd server for friends 2 months ago:
so for example, setting 192.168.8.170 on the clients as the only allowed IP aswell as the server would do what i need? thanks for helping trying to navigate my labyrinth of networking :P
- Comment on Help with iptables, using nixos setting up a wiregaurd server for friends 2 months ago:
neat web app! the drawings kinda suck tho, but thats just a skill issue on my part :P
- Comment on Help with iptables, using nixos setting up a wiregaurd server for friends 2 months ago:
so if i understand this correctly, it runs a docker container to which runs the wireguard server and then you just specify hostname/ip adress for the services, then when sombody tunnels in they have acess to only the services specifide in config file? if so looks pretty useful!, i just question what happens to the rest of the traffic? is it locally routed in my network or client side? im not very familiar with proxys, i know what they are but have never really messed with one. Thanks for sharing
- Comment on Help with iptables, using nixos setting up a wiregaurd server for friends 2 months ago:
ok ill try to explain to the best of my ability and simply it.
i no longer want to use tailscale, because of accounts. i used to use tailscale for the minecraft server i want my friends to be able to acess only 192.168.8.170 on my local network and all other traffic to not be routed through my vpn but my friends to have acess to there internet on there LAN. example, we can play minecraft on the server on my network and we can be in a group call in signal. meaning friend 1 and 2 are using there internet connection locally, and only 192.168.8.170 being routed.
We also had some connectivity issues with tailscale, where friend 1 would be on and friend 2 would lag out of the server randomly. when if we played a game through steam we wouldnt have any connection issues. my friend is also very forgetful and cant log into his tailscale account, which is another reason why i wanna ditch tailscale.
- Comment on Help with iptables, using nixos setting up a wiregaurd server for friends 2 months ago:
so my friends wiregaurd config is
“[Interface] Address = 10.0.0.3/24 ListenPort = 51820 PrivateKey = magic numbers
[Peer] PublicKey = magic numbers PresharedKey = magic numbers AllowedIPs = 0.0.0.0/0, ::/0 Endpoint = magic numbers”
So if i understand the article correctly, i need to change it to
"[Interface] Address = 10.0.0.3/24 ListenPort = 51820 PrivateKey = magic numbers
[Peer] PublicKey = magic numbers PresharedKey = magic numbers AllowedIPs = 0.0.0.0/0, ::/0 Endpoint = magic numbers"
Split tunneling: Exclude certain traffic from the VPN
PostUp = ip rule add from 192.168.50.0/24 table main PostDown = ip rule delete from 192.168.50.0/24 table main
my friends LAN is 192.168.50.0/0 so im assuming were just trying to tell wireguard that anything within my friends subnet doesnt get routed? which means he will still be able to reach HigherGround@192.168.8.170? and all of his other traffic will be local to him and go through his router?
im confused what “table” and “main” are im assuming its apart of iptables rules? im pretty new to IP tables so forgive me for my lack of understanding. i know its basically a linux purest firewall LMAO,
Then on my server i would edit
This allows the wireguard server to route your traffic to the internet and hence be like a VPN
postUp = '' ${pkgs.iptables}/bin/iptables -A FORWARD -i cavein0 -j ACCEPT ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -o enp5s0 -j MASQUERADE ''; # Undo the above preDown = '' ${pkgs.iptables}/bin/iptables -D FORWARD -i cavein0 -j ACCEPT ${pkgs.iptables}/bin/iptables -t nat -D POSTROUTING -o enp5s0 -j MASQUERADE '';
And make it like this?
This allows the wireguard server to route your traffic to the internet and hence be like a VPN
postUp = '' ${pkgs.iptables}/bin/iptables -A FORWARD -i cavein0 -j ACCEPT ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -o enp5s0 -j MASQUERADE ${pkgs.busybox/bin/ip rule add from 192.168.50.0/24 table main ''; # Undo the above preDown = '' ip rule add from 192.168.1.0/24 table main ${pkgs.iptables}/bin/iptables -D FORWARD -i cavein0 -j ACCEPT ${pkgs.iptables}/bin/iptables -t nat -D POSTROUTING -o enp5s0 -j MASQUERADE ${pkgs.busybox/bin/ip rule delete from 192.168.50.0/24 table main '';
Right? or is step 4 on the client still? its not very clear in the article thanks for helping out!
- Comment on Help with iptables, using nixos setting up a wiregaurd server for friends 2 months ago:
Image gronk use ms paint to describe. gronk bad at explaining so he draws pretty pictures :P
- Submitted 2 months ago to selfhosted@lemmy.world | 16 comments
- Comment on RTX On 3 months ago:
1000000495 DEAR GOD THE 9090 RELEASE JENSON PLEASE!
- Comment on Ahahah, it's too late Batman, I've already released an uncountable amount of PFAS into Gotham's water supply! 5 months ago:
Woops Im tired lol
- Comment on You did it. You broken the conditioning. 5 months ago:
Now you gotta tie him to the track and do a kickflip and ollie with the train