nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,9 Tsd.
aktive Profile

#WireGuard

6 Beiträge4 Beteiligte0 Beiträge heute
Njumaen<p>Yet another <a href="https://chaos.social/tags/gns3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gns3</span></a> <a href="https://chaos.social/tags/miktotik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>miktotik</span></a> lab setup: How to route anything through <a href="https://chaos.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a></p>
Attractive Nuisance<p>I'm interested in setting up <a href="https://tech.lgbt/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> on my <a href="https://tech.lgbt/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> colo, as a <a href="https://tech.lgbt/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> solution for my phone when I'm on untrusted networks. But the quick start guide being a video is really putting me off, and the examples seem to be purely about ad-hoc peer-to-peer networking rather than a gateway.</p><p>I'm tempted to go back to my comfort zone with <a href="https://tech.lgbt/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenVPN</span></a>, but I'll stick with it. At some point it'll click and I'll write a HOWTO.</p>
Tasse, Tasser, am Tassesten<p><span class="h-card" translate="no"><a href="https://mastodon.social/@reimereien" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>reimereien</span></a></span> das ist ja ne interessante Geschichte. Ich mach das bisher selber mit <a href="https://mastodon.social/tags/stubby" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stubby</span></a>, <a href="https://mastodon.social/tags/dnsmasq" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnsmasq</span></a> und <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> auf nem Rechner vom <a href="https://mastodon.social/tags/Hetzner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hetzner</span></a>. Da würd ich mir Zeit und Aufwand sparen.</p>
asmw<p>Huh, thanks <span class="h-card" translate="no"><a href="https://mastodon.online/@mullvadnet" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mullvadnet</span></a></span>!<br>Created an account and added funds in less than 5 minutes and had <a href="https://infosec.exchange/tags/Ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ipv6</span></a> connectivity.</p><p>I think a <a href="https://infosec.exchange/tags/systemd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systemd</span></a> update broke something with my <a href="https://infosec.exchange/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> tunnels or routing/port forwarding on the proxy server?</p><p>Not in the mood to debug, rebooting fixed the problem.</p>
Hessenhelden<p><span class="h-card" translate="no"><a href="https://nrw.social/@chotemysl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>chotemysl</span></a></span> habe Ich mir tatsächlich überlegt, aber ich möchte mein Tarif ändern und bei dieser Gelegenheit auf eine andere <a href="https://mastodon.social/tags/fritzbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fritzbox</span></a> mit <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> Wechsel. </p><p><a href="https://mastodon.social/tags/Vodafone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vodafone</span></a> <a href="https://mastodon.social/tags/Unitymedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Unitymedia</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a></p>
Hessenhelden<p><span class="h-card" translate="no"><a href="https://mastodon.social/@diwou" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>diwou</span></a></span> meine <a href="https://mastodon.social/tags/Fritzbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fritzbox</span></a> Version ist die #6490 von <a href="https://mastodon.social/tags/Vodafone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vodafone</span></a> (ehemalige <a href="https://mastodon.social/tags/Unitymedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Unitymedia</span></a>). Beim update der Firmware durch den Anbieter wurde <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> rausgepatcht. Ich meinte zu lesen dass es in der offiziellen Firmware von AVM es Bestandteil ist. Naja meine Fritte kann kann es nicht.</p>
Hessenhelden<p>Gerade gelesen. Schade aber ich kann es verstehen. Leider unterstützt meine <a href="https://mastodon.social/tags/fritzbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fritzbox</span></a> kein <a href="https://mastodon.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> ..</p><p><a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/Playstore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Playstore</span></a> <a href="https://mastodon.social/tags/tracking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tracking</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a> <a href="https://mastodon.social/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a></p>
Afra1d 0f F1r3w0rk5<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@kuketzforum" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kuketzforum</span></a></span> interessanter Beitrag. Ich nutze <a href="https://kanoa.de/tags/myfritz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>myfritz</span></a> + <a href="https://kanoa.de/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> intensiv. Da ich Pi-Hole und andere Dienste wie <a href="https://kanoa.de/tags/Jellyfin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jellyfin</span></a> usw. als LXC über <a href="https://kanoa.de/tags/Proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxmox</span></a> laufen lasse, werde ich mich mal damit beschäftigen, auch WG hierüber zu steuern und den Dienst in der <a href="https://kanoa.de/tags/Fritzbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fritzbox</span></a> abzuschalten. Das ganze läuft allerdings seit sehr langer Zeit schon sehr stabil. Bin auf die Diskussion im Forum gespannt.</p>
Abimelech B. 🐧🇩🇪| wörk ™️<p><span class="h-card" translate="no"><a href="https://techhub.social/@bradley" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bradley</span></a></span> I'm NOT exposing my <a href="https://fulda.social/tags/pihole" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pihole</span></a> (s) directly to the internet - I use one at home and another one via <a href="https://fulda.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://fulda.social/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a> whereever I may roam 🙂 Exposed ports for GUI and "healtchecks" are on a "random" highport which keeps logs mostly clear of "noise". Sometimes some scanners like <a href="https://fulda.social/tags/censys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>censys</span></a> (or <a href="https://fulda.social/tags/shodan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodan</span></a> ) might also find these ports, but <a href="https://fulda.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> is very helpful 😉 <br>Feel free to ask my via PM if something is not clear. I like feedback to make my docs better.</p>
Georg Ruß<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@zak" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>zak</span></a></span> I'm running <a href="https://swiss.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a> with exit nodes on my home network, so when I enable it on my phone, I get both ad-blocking DNS (pihole at home) and access to home resources at the same time. Based on <a href="https://swiss.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>.</p>
jolla<p>Cross open source collaboration: ConnMan connecting LibreElec and SailfishOS maintainers to get wider testing for the WireGuard changes. More info on <a href="https://forum.libreelec.tv/thread/29601-wireguard-experimental-support-for-connecting-via-fqdn-not-ip/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.libreelec.tv/thread/2960</span><span class="invisible">1-wireguard-experimental-support-for-connecting-via-fqdn-not-ip/</span></a></p><p><a href="https://techhub.social/tags/LibreELEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreELEC</span></a> <a href="https://techhub.social/tags/SailfishOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SailfishOS</span></a> <a href="https://techhub.social/tags/ConnMan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnMan</span></a> <a href="https://techhub.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a></p>
Ken Walker :caflag:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Edent" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Edent</span></a></span> I use <a href="https://cosocial.ca/tags/freedombox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freedombox</span></a> which includes <a href="https://cosocial.ca/tags/nextcloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nextcloud</span></a>. I wonder if this means I can't run <a href="https://cosocial.ca/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>?</p>
Terence Eden<p>FFS! A server can't run both <a href="https://mastodon.social/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> *and* <a href="https://mastodon.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> on <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>.</p><p>Docker creates a "bridge" network interface which, apparently, interferes with WireGuard.</p><p>That was a depressing evening of eliminating the impossible. Completely stopping Docker allowed my VPN to connect.</p><p>And there's no way to actually run a Docker container without the network bridge (any documentation that says otherwise is lying).</p>
Astian, Inc<p>First look Midori Browser with browsing VPN.</p><p>Midori Browser with VPN.... coming soon.</p><p>Behind all this there is <span class="h-card" translate="no"><a href="https://fosstodon.org/@opensuse" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>opensuse</span></a></span> being the best distro :-)</p><p><a href="https://mastodon.social/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://mastodon.social/tags/macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macos</span></a> <a href="https://mastodon.social/tags/midoribrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midoribrowser</span></a> <a href="https://mastodon.social/tags/midori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midori</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a></p>
Benny<p>Ob ich heute meine drei <a href="https://mastodon.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a>-Tunnel in einem Umbaue?</p>
awlnx<p>Here is a homebrew tap to install the proxyguard-client for <a href="https://social.ffmuc.net/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> on <a href="https://social.ffmuc.net/tags/MacOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacOS</span></a>.</p><p>It also provides a little wrapper to setup the correct routes etc</p><p><a href="https://github.com/freifunkMUC/homebrew-proxyguard-client" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/freifunkMUC/homebre</span><span class="invisible">w-proxyguard-client</span></a></p><p>This way you can easily use Wireguard over HTTP/HTTPs.</p>
Stanislav Ochotnický<p>Wonder if someone has a good suggestion for udp port that's not commonly blocked on public wifi at airports and the like. DNS is out, so is NTP. Maybe Ike (500)? Something else ? This might be futile of course ...</p><p><a href="https://cyberplace.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a></p>
Rince<p>Kennt jemand eine Open Source-Variante von <a href="https://chaos.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a>? <a href="https://chaos.social/tags/WIreguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WIreguard</span></a> ist einfach, aber das zentral zu managen finde ich angenehm, mit einem <a href="https://chaos.social/tags/Zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zero</span></a>-Trust-Ansatz ist das hübsch....</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://zeroes.ca/@StaceyCornelius" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>StaceyCornelius</span></a></span> In the past I did configure seperate systems for clients so they can travel without fuss regardless if <em>"P.R."</em> <a href="https://infosec.space/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> or <a href="https://infosec.space/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> or the <a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> or <a href="https://infosec.space/tags/KSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KSA</span></a>...</p><ul><li>The trick is to never have anything on your device and have a dedicaded burner!</li></ul><p>Using <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> / <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a> and <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and when that's not an option, a <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunnel / <a href="https://infosec.space/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenVPN</span></a> or <a href="https://infosec.space/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a>-<a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> to be able to <a href="https://infosec.space/tags/VNC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VNC</span></a> into a machine.</p><ul><li>Remember: They can only extract data that was saved on a machine!</li></ul><p>CONSIDER THE <a href="https://infosec.space/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> ENEMY TERRITORY AS IN <em>"If you wouldn't enter <a href="https://infosec.space/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a>, then why would you enter the USA?"</em></p><p><a href="https://infosec.space/tags/Cyberfacism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberfacism</span></a> <a href="https://infosec.space/tags/USpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USpol</span></a> <a href="https://infosec.space/tags/Facism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Facism</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a></p>
aiyion<p>Der neue OpenWrt One spricht Freifunk.<br>Und da das LeineLab über einen hervorragenden Laser verfügt, haben wir die Skyline Hannovers verstetigt.</p><p>Richtig gutes Gerät übrigens. WireGuard Speedtest Nutztraffic 330Mbit/s down, 230Mbit/s up.</p><p><a href="https://infosec.exchange/tags/freifunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freifunk</span></a> <a href="https://infosec.exchange/tags/gluon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gluon</span></a> <a href="https://infosec.exchange/tags/openwrt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openwrt</span></a> <a href="https://infosec.exchange/tags/leinelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leinelab</span></a> <a href="https://infosec.exchange/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <span class="h-card" translate="no"><a href="https://friendica.me/profile/freifunkh" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>freifunkh</span></a></span></p>