bless

@bless@lemmy.world
0 Post – 27 Comments
Joined 1 years ago

I would go with wireguard VPN or something like cloudflare tunnels or tailscale. With wireguard you'll need to open up an external port and forward to your VPN host, but wireguard uses UDP so no one can probe it for responses. CF tunnels and tailscale you don't have to open up holes in your firewall which is nice.

You also have the option of using a proxy and opening up 443 publicly on your firewall, but unless you know what you're doing I'd leave that closed until you learn more.

15 more...

Wait till you plug in your cell phone to charge they start calling home like crazy

13 more...

+1 for dst nat on googles dns servers back to my piholes

Mack

"Did you mack her?"

So dumb lol

WordPress?

Who's your DNS provider? I use cloudflare and powershell script and hits their API. Works well

1 more...

I would get a domain name and use ddns to update your rotating IP. Then I would setup wireguard VPN in split tunnel and have your parents network tunnel back to your piholes for dns resolution.

I use cloudflare API for ddns updates but there are plenty of choices for that. If you're using cloudflare for DNS just keep in mind you can't proxy the DNS entry for the ip for your VPN host as CF only forwards traffic over certain ports and they are not configurable (on free plan anyway not sure about paid).

2 more...

Red hat linux

Check out prowlerr over jacket, I found it much better

1 more...

Bitwarden here

We got lasik for my fiance and that was hands down the best money we ever spent. Life changing really.

Same but powershell. Works like a charm runs every 5 minutes

I primarily use dark themes but I do switch to light themes from time to time. To see better, give my eyes a break, or when in a dark room for too long are some examples. Also some apps just don't play nice in dark themes.

Good thing about wireguard is it's really simple. Google should get it done, if you get stuck send me a DM. I started with basic wireguard, I now run firezone in docker as I like the frontend.

4 more...

Hmm do a traceroute and see where it's dying. Can you ping inside IP of the tunnel on the wireguard server? What about outside?

What did you deploy in docker, firezone or basic wireguard?

Does your phone say connected and you see both incoming and outgoing packets? Is there a firewall in place on the wireguard host (ufw maybe)?

If you have nmap available you can also check port status.

2 more...

So I run windows AD and have windows dns inside and cloudflare outside. I also run NPM for the web prox in my DMZ.

On the inside DNS I point the A record for NPMProxy.domain.com to the IP of my npm server. I than setup service1.domain.com inside npm to forward requests to the web server setup for service1. I than setup the CNAME record for service1.domain.com to point to NPMProxy.domain.com. This should complete your inside.

Outside I set the A record on cloudflare for service1.domain.com to my public IP address which will route again to NPM. This will complete the outside connectivity.

Make sure your firewall rules are set and proper ports open and you should be golden.

Ditto

To each their own!

The error is telling you you already have something listening on port 80 so docker is unable to bind to 80 again until that is released. Try disabling nginx and apache as you stated.

You can run

netstat -pln

to show you what's running on what port on your host is you want to verify

Don't get rid of it, install Kodi and/or Plex on it

Looking for a good guide on getting this setup via docker and AD LDAP, any pointers?

Yea I should read better

For infrastructure critical services I recommend reservations on the DHCP server and then set static assignment on the device for the IP reserved in DHCP. This way if the device ever fails over to DHCP for any reason the IP will not change. I'll usually also leave some small address space outside the DHCP scope available for static assignment if needed, usually at the front and usually around 20 IPs max as it's easier to let DHCP do the heavy lifting.

Static IPs are important on infra critical devices if you ever find yourself in a situation where the DHCP services are not available, you don't want them to be a single point of failure.

Just my 2 cents.

Yes

You can bound ufw rules to interfaces, so you can allow in only on the wg0 interface and not eth0 interface.

Glad it's working! I love wireguard!

Bitwarden all day

Better to set the DHCP server to hand out the dns rather then set it device by device

1 more...