La vida es tan mierda que reinicias el túnel de #wireguard de tu casa pensando que estás en casa y pierdes el acceso a todo lo de casa.
La vida es tan mierda que reinicias el túnel de #wireguard de tu casa pensando que estás en casa y pierdes el acceso a todo lo de casa.
Would you be interested into an alternative #IPv6 Tunnelbroker service? Hosted and located in Germany, offering free IPv6 subnets (not sure about sizes, sth. between /64 - /48) that can be used by #SIT, #GRE, #OpenVPN or #Wireguard tunnels. Currently, this is already available but only for @BoxyBSD users.
Interested in an easy to use one-click for users #Wireguard setup?
We are maintaining an #IPv6 enabled and up-to-date version of #wg-access-server.
Want new features or contribute?
Go here:
https://github.com/freifunkMUC/wg-access-server
Our own VPN servers are also running this server.
Finally! Wireguard from laptop and smartphone back home to my NAS! I can now use navidrome and my music collection on the go. Turning off all the lights I forgot while leaving is a bonus! #homelab #wireguard
Sicherer Fernzugriff mit pfSense und WireGuard: In meinem Artikel zeige ich dir, wie du Schritt für Schritt einen WireGuard-VPN-Server aufsetzt – inklusive Tunnel-Konfiguration, Peer-Einrichtung und Firewall-Regeln. Ideal für alle, die ihre Netzwerksicherheit erhöhen möchten.
https://ralf-peter-kleinert.de/linux-server/pfsense-wireguard-vpn.html
@wendigo Double-check that the tunnel configuration including key pair, port numbers and IP address is correct and current. I think Proton makes you re-download those from time to time (quite possibly for key rotation if nothing else).
That the wg0 tunnel interface shows up is no guarantee that the tunnel itself is working. One of the less nice things about Wireguard; you get no obvious "thing X is wrong" error when bringing the tunnel up if something isn't up to snuff.
@wendigo Is your /etc/resolv.conf being updated as you set up and tear down the Wireguard tunnel?
I don't use Arch btw. But that's definitely the first thing I would check.
I forget who the Arch Linux expert out there is, but I can't get wireguard to resolve DNS at all. And my laptop has the exact same setup, and it works fine. I have tried everything I can think of or look up. If anybody out there can help me shed some light on this, I'm using a ProtonVPN config. Thanks! And a boost would be welcome if you're amenable... ;>)
Lastly, I have #immich in a #proxmox VM as a readonly viewer of the samba share so I can see photos on my phone and other devices. My devices connect to #wireguard when out of the house so they can still access the server to sync!
Hope that is helpful to someone, and let me know what I'm doing wrong and can improve!
4/4
If you have used and loved #Tailscale, and you still like the product but want a sensible insurance option to reduce your exposure to potential #enshittification, what *hosted* options have you looked at as alternatives?
Part of the appeal of #Tailscale for me at least was that they provided a really thoughtful UX layer over some existing cool OSS tech like #wireguard.
Also, many of us have tried self-hosting and want to minimise what they self host if at all possible.
https://mastodon.social/@JonathanGerlach/114302498688902923
@JessTheUnstill @Pibble
And yes, I treat all devices as insecure and would rather invest the time and effort needed get #TechIlliterates up to speed on the #OfflinePGP method!
Given the cheapness of storage (legitimate 1TB microSD cards exist and they ain't 4-digit items!) I'd legitimately look into #OTP #encryption and (IF I had the €€€€€€ to do so!) would even sponsor implementing it in #OpenVPN, #WireGuard and #OpenSSH (for #SSH-Tunmeling).
I sincerely wish y'all could legitimately call me a tinfoilhat but so far I've been proven right all the time...
How do folks manage roaming/mobile #wireguard clients talking to homelabs that are also behind #CGNAT? I'm not seeing anything #STUN or #NAT related in the iOS wireguard app - how do you get p2p connectivity without hairpinning all traffic through a public/non-NAT node? (I'm fully aware of Tailscale - that's not the answer I'm searching for) #VPN
It's crazy that I could remote into my server in KL all the way from Kedah using only my mobile hotspot and #Wireguard #VPN connection without noticeable lag or delays whatsoever. Though, I also did the same when I was in Osaka, and I suppose that's more impressive lol - anyway, Wireguard (and #Pi-hole) = Big W.
I'm interested in setting up #WireGuard on my #Debian colo, as a #VPN solution for my phone when I'm on untrusted networks. But the quick start guide being a video is really putting me off, and the examples seem to be purely about ad-hoc peer-to-peer networking rather than a gateway.
I'm tempted to go back to my comfort zone with #OpenVPN, but I'll stick with it. At some point it'll click and I'll write a HOWTO.
@zak I'm running #tailscale with exit nodes on my home network, so when I enable it on my phone, I get both ad-blocking DNS (pihole at home) and access to home resources at the same time. Based on #wireguard.
Cross open source collaboration: ConnMan connecting LibreElec and SailfishOS maintainers to get wider testing for the WireGuard changes. More info on https://forum.libreelec.tv/thread/29601-wireguard-experimental-support-for-connecting-via-fqdn-not-ip/
@pepperz It uses #wireguard , but allows you to have a set of your systems talking to each other over VPN without having to manually manage each connection (key pairs, ...) individually. Each system that joins becomes part of a mesh. Much, much easier!
@Edent I use #freedombox which includes #nextcloud. I wonder if this means I can't run #wireguard?
@gaufff is Tailscale an alternative to #wireguard