ohai.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A cozy, fast and secure Mastodon server where everyone is welcome. Run by the folks at ohai.is.

Administered by:

Server stats:

1.8K
active users

#wireguard

9 posts8 participants0 posts today
gyptazy<p>From an idea to a working beta version in just a few hours. <a href="https://mastodon.gyptazy.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> tunnel service with <a href="https://mastodon.gyptazy.com/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> and <a href="https://mastodon.gyptazy.com/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVPN</span></a> support. GRE &amp; SIT follows, OpenVPN PKI backend will be switched to Hashicorp Vault.</p><p>Still several things to do… <a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://mastodon.gyptazy.com/tags/IPv4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv4</span></a> <a href="https://mastodon.gyptazy.com/tags/GRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRE</span></a> <a href="https://mastodon.gyptazy.com/tags/SIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIT</span></a> <a href="https://mastodon.gyptazy.com/tags/Tunnel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tunnel</span></a> <a href="https://mastodon.gyptazy.com/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.gyptazy.com/tags/net" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>net</span></a> <a href="https://mastodon.gyptazy.com/tags/services" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>services</span></a> <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@BoxyBSD" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BoxyBSD</span></a></span></p>
gyptazy<p>Would you be interested into an alternative <a href="https://mastodon.gyptazy.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> Tunnelbroker service? Hosted and located in Germany, offering free IPv6 subnets (not sure about sizes, sth. between /64 - /48) that can be used by <a href="https://mastodon.gyptazy.com/tags/SIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIT</span></a>, <a href="https://mastodon.gyptazy.com/tags/GRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRE</span></a>, <a href="https://mastodon.gyptazy.com/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVPN</span></a> or <a href="https://mastodon.gyptazy.com/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> tunnels. Currently, this is already available but only for <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@BoxyBSD" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BoxyBSD</span></a></span> users.</p>
MicKet<p><span class="h-card" translate="no"><a href="https://troet.cafe/@derbrumme" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>derbrumme</span></a></span> <br>Ich habe aktuell einen urAlten OpenWRT mit LXC dafür im Einsatz der mir demnächst stirbt.<br> <br>Kann man auf Fritzboxen auch zusätzliche Software wie eine PiHole installieren?</p><p>Würde es gerne ersetzen, möchte aber aus Platz und positionierungsgründen so wenig Hardware wie möglich nutzen.</p><p>Ich hätte daher gerne einen neuen Router, der <a href="https://swiss.social/tags/PiHole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PiHole</span></a>, <a href="https://swiss.social/tags/ntfy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ntfy</span></a> und <a href="https://swiss.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> auf einem Gerät vereinen kann.</p>
Matthias Drexel<p>🤞 dass der <a href="https://tyrol.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> Client am <a href="https://tyrol.social/tags/Thinkpad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Thinkpad</span></a> nun korrekt aufgesetzt ist.</p><p>Der Pudding wird morgen gekostet</p>
Freifunk München<p>Interested in an easy to use one-click for users <a href="https://social.ffmuc.net/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> setup?</p><p>We are maintaining an <a href="https://social.ffmuc.net/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> enabled and up-to-date version of <a href="https://social.ffmuc.net/tags/wg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wg</span></a>-access-server.</p><p>Want new features or contribute?</p><p>Go here:<br><a href="https://github.com/freifunkMUC/wg-access-server" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/freifunkMUC/wg-acce</span><span class="invisible">ss-server</span></a></p><p>Our own VPN servers are also running this server.</p><p><a href="https://vpn.ffmuc.net" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vpn.ffmuc.net</span><span class="invisible"></span></a></p><p><a href="https://social.ffmuc.net/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://social.ffmuc.net/tags/Dataprivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dataprivacy</span></a> <a href="https://social.ffmuc.net/tags/eu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eu</span></a></p>
Sophie<p>Finally! Wireguard from laptop and smartphone back home to my NAS! I can now use navidrome and my music collection on the go. Turning off all the lights I forgot while leaving is a bonus! <a href="https://chaos.social/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://chaos.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a></p>
Brian Nicar<p>Apache is interfering with the WireGuard service. Had to do a re-install to figure this out, but that was nothing. Now I know for sure...</p><p><a href="https://metalhead.club/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://metalhead.club/tags/Apache" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apache</span></a> <a href="https://metalhead.club/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://metalhead.club/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a></p>
Slimy9343<p><span class="h-card" translate="no"><a href="https://mastodon.social/@TheMorpheus" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>TheMorpheus</span></a></span> <br>1. <a href="https://mastodon.social/tags/Voratsdatenspeicherung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Voratsdatenspeicherung</span></a> <br>Ich verkaufe meiner Familie einfach eine Verbindung zu meinem <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> Server mit <a href="https://mastodon.social/tags/pihole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pihole</span></a> einfach als super <a href="https://mastodon.social/tags/adblocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adblocker</span></a>.<br>2. <a href="https://mastodon.social/tags/staatstrojaner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>staatstrojaner</span></a> <br>Dagegen kann ich nix machen, außer nur gut gepflegte <a href="https://mastodon.social/tags/opensourcesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensourcesoftware</span></a> zu nutzen und wenn mein System dubiose Pakete von denen bekommt, schicke ich es zurück an den Absender.</p>
Ralf-Peter Kleinert<p>Sicherer Fernzugriff mit pfSense und WireGuard: In meinem Artikel zeige ich dir, wie du Schritt für Schritt einen WireGuard-VPN-Server aufsetzt – inklusive Tunnel-Konfiguration, Peer-Einrichtung und Firewall-Regeln. Ideal für alle, die ihre Netzwerksicherheit erhöhen möchten.</p><p><a href="https://ralf-peter-kleinert.de/linux-server/pfsense-wireguard-vpn.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ralf-peter-kleinert.de/linux-s</span><span class="invisible">erver/pfsense-wireguard-vpn.html</span></a></p><p><a href="https://mastodon.social/tags/pfSense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pfSense</span></a> <a href="https://mastodon.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/Netzwerksicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerksicherheit</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://mastodon.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosting</span></a></p>
Ralf-Peter Kleinert<p>Sicherer Fernzugriff auf dein Heimnetzwerk mit OPNsense und WireGuard? In meinem Artikel zeige ich dir, wie du Schritt für Schritt einen WireGuard-VPN-Server aufsetzt – inklusive Firewall-Regeln, Peer-Konfiguration und Interface-Zuweisung. Ideal für Road Warrior-Setups und maximale Kontrolle über deine Daten.​</p><p><a href="https://ralf-peter-kleinert.de/linux-server/opnsense-wireguard-vpn.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ralf-peter-kleinert.de/linux-s</span><span class="invisible">erver/opnsense-wireguard-vpn.html</span></a></p><p><a href="https://mastodon.social/tags/OPNsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPNsense</span></a> <a href="https://mastodon.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Netzwerksicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerksicherheit</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosting</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
mkj<p><span class="h-card" translate="no"><a href="https://metalhead.club/@wendigo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>wendigo</span></a></span> Double-check that the tunnel configuration including key pair, port numbers and IP address is correct and current. I think Proton makes you re-download those from time to time (quite possibly for key rotation if nothing else).</p><p>That the wg0 tunnel interface shows up is no guarantee that the tunnel itself is working. One of the less nice things about Wireguard; you get no obvious "thing X is wrong" error when bringing the tunnel up if something isn't up to snuff.</p><p><a href="https://social.mkj.earth/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a></p>
mkj<p><span class="h-card" translate="no"><a href="https://metalhead.club/@wendigo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>wendigo</span></a></span> Is your /etc/resolv.conf being updated as you set up and tear down the Wireguard tunnel?</p><p>I don't use Arch btw. 😉 But that's definitely the first thing I would check.</p><p><a href="https://social.mkj.earth/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://social.mkj.earth/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://social.mkj.earth/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://social.mkj.earth/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a></p>
Brian Nicar<p>I forget who the Arch Linux expert out there is, but I can't get wireguard to resolve DNS at all. And my laptop has the exact same setup, and it works fine. I have tried everything I can think of or look up. If anybody out there can help me shed some light on this, I'm using a ProtonVPN config. Thanks! And a boost would be welcome if you're amenable... ;&gt;)</p><p><a href="https://metalhead.club/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://metalhead.club/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://metalhead.club/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://metalhead.club/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a></p>
Michael<p>Lastly, I have <a href="https://mastodon.social/tags/immich" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>immich</span></a> in a <a href="https://mastodon.social/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a> VM as a readonly viewer of the samba share so I can see photos on my phone and other devices. My devices connect to <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> when out of the house so they can still access the server to sync!</p><p>Hope that is helpful to someone, and let me know what I'm doing wrong and can improve!</p><p>🧵 4/4</p>

If you have used and loved #Tailscale, and you still like the product but want a sensible insurance option to reduce your exposure to potential #enshittification, what *hosted* options have you looked at as alternatives?

Part of the appeal of #Tailscale for me at least was that they provided a really thoughtful UX layer over some existing cool OSS tech like #wireguard.

Also, many of us have tried self-hosting and want to minimise what they self host if at all possible.
mastodon.social/@JonathanGerla

MastodonJonathan Gerlach (@JonathanGerlach@mastodon.social)I've been really liking Tailscale, but they just took $160 million in funding and I have a weird feeling that the lenders will want to make that money back plus a profit.
Replied in thread

@JessTheUnstill @Pibble

And yes, I treat all devices as insecure and would rather invest the time and effort needed get #TechIlliterates up to speed on the #OfflinePGP method!

Given the cheapness of storage (legitimate 1TB microSD cards exist and they ain't 4-digit items!) I'd legitimately look into #OTP #encryption and (IF I had the €€€€€€ to do so!) would even sponsor implementing it in #OpenVPN, #WireGuard and #OpenSSH (for #SSH-Tunmeling).

  • The #US is a #RogueNation with a Rogue Government! The sooner we accept this reality the sooner we can not only adjust to it but act accordingly…

I sincerely wish y'all could legitimately call me a tinfoilhat but so far I've been proven right all the time...