axzxc1236

joined 1 year ago
[–] [email protected] 1 points 1 day ago* (last edited 1 day ago)

simplest tool to backup to Google drive

Without the need for versioning, I think rclone fits the description. For backup into USB drive / remote SSH server I would recommend rsync.

[–] [email protected] 2 points 4 weeks ago (1 children)

Wireguard config already includes "::/0"

[–] [email protected] 2 points 4 weeks ago

That is what I was thinking, yes.

[–] [email protected] 0 points 4 weeks ago* (last edited 4 weeks ago)

In my case just disable IPv6 in WiFi is enough.

sysctl looks like the most universal way.

net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1

[–] [email protected] 3 points 4 weeks ago (2 children)

I tried the same setup with Ubuntu 24.04.1 desktop live system and I can replicate this IP leak issue, I guess I will have to disable IPv6.

 

I was setting up my laptop for traveling and adding Wireguard VPN configuration.

The Wireguard config generated by router only contains IPv4 address (10.0.5.x), and while testing the VPN to my surprise "what is my ip" websites can find my IPv6 address (I USB tethered mobile connection to my laptop).

It looks like NetworkManager does nothing about IPv6 connection if VPN doesn't have IPv6 settings, which is bad for road warrior type of VPN configuration.

Is there an easy toggle to turn of IPv6 if VPN is connected and otherwise? Or is only option to disable all IPv6 no matter what?

[–] [email protected] 2 points 1 month ago

You setup Wireguard server on the VPS with both IPv4 and IPv6. Then you connect both your computer and IPv6-only server to the Wireguard server. After connection, you can connect to the VPN through IP address assigned by wireguard.

[–] [email protected] 2 points 1 month ago* (last edited 1 month ago) (2 children)

Personally have good experience with https://github.com/Nyr/wireguard-install, there are other script that are available by searching "wireguard setup script github".

Note: By default Wireguard config generated will route every bit of traffic through Wireguard (which will be slower and probably not wanted in this situation), to change that change AllowedIPs field in Wireguard config, lets say all your machines are assigned 1.2.3.xxx as IP address, to only access other 1.2.3.xxx IP through wireguard, change the config to AllowedIPs = 1.2.3.0/24.

[–] [email protected] 3 points 1 month ago* (last edited 1 month ago) (4 children)

Host a website that needs to be accessible from your own machine or public?

Former situation: Can be solved by setup reverse proxy on the other VPS, or join machines to a VPN server (like tailscale,, Zertoier or Wireguard server)

Later situation: Cloudflare or other CDN, setup reverse proxy on the other VPS.

Less accessible option but available for public: Tor or I2P

[–] [email protected] 3 points 1 month ago (6 children)

Great, if you need to SSH into Ipv6 only machine, SSH has -J flag which can be used to specify "jump host" (basically run SSH through SSH)

[–] [email protected] 10 points 1 month ago* (last edited 1 month ago) (1 children)

Pratically no universal way of making Linux boot with ARM processors.

Much more closed source drivers (than x86 ecosystem).

[–] [email protected] 3 points 3 months ago

I think that means the access point can only run at up to 80Mhz bandwidth, so not full bandwidth.

[–] [email protected] 36 points 3 months ago* (last edited 3 months ago) (12 children)

I am born too late to understand what Y2K problem was, this (the result) might be what people thought could happen.

 

This speedrun video is insane I have to share it somewhere

view more: next ›