[-] Steamymoomilk@sh.itjust.works 2 points 16 hours ago

I read your username, thats a fucking funny username.

Glad you enjoyed my shitposting :P

[-] Steamymoomilk@sh.itjust.works 24 points 1 day ago

Very self explanatory its for how many CANS OF BEANS YOU HAVE.

PISS EVERYWHERE WITH BEANS

MWHAHAHAHHA

1
infected by the fediverse (sh.itjust.works)
1
3
submitted 2 weeks ago* (last edited 2 weeks ago) by Steamymoomilk@sh.itjust.works to c/selfhosted@lemmy.world

I dont mean to be a bother, but recently i got wiregaurd setup so myself and my friends can access resources such as my server. i have it setup for the client and the server to only allow 192.168.8.170. To be tunneled, so for example my friends can google and resolve DNS just fine and its all in there network, then when they want to access the server it will be at 192.168.8.170 and the docker services will run on ports for example 8080:80. and to be honest it works great for me and friend 1. but for friend 2 DNS doesnt resolve???

he can ping 9.9.9.9 he can acess the services on 192.168.8.170 but he cant resolve DNS when wiregaurded in.

his network has ipv6 and ipv4, my network only has ip4 and friend 1's network is ipv4 only. do you smart people on the internet think ipv6 could be an issue? friend 2 is running linux mint if that matters. I know a little about networking but by no means am an network engineer.

its a slight issue friend 2 really wants to be able to google and play command and conquer pvp at the same time. any help would be greatly appreciated as im kinda stumped!

-edit SOLVED i had a DNS for the client config and i just had to remove it client side.

23
submitted 1 month ago* (last edited 1 month ago) by Steamymoomilk@sh.itjust.works to c/selfhosted@lemmy.world

Hello,

Recently, I've been interested in self-hosting various services after coming across Futo's "How to Self Host Your Life Guide" on their Wiki. They recommend using OpenVPN, but I opted for WireGuard instead as I wanted to learn more about it. After investing many hours into setting up my WireGuard configuration in my Nix config, I planned to replace Tailscale with WireGuard and make the setup declarative.

For context, this computer is located at my residence, and I want to be able to VPN into my home network and access my services. Initially, it was quite straightforward; I forwarded a UDP port on my router to my computer, which responded correctly when using the correct WireGuard keys and established a VPN connection. Everywhere online suggests forwarding only UDP as WireGuard doesn't respond unless the correct key is used.

The Networking Complexity

At first, this setup would be for personal use only, but I soon realized that I had created a Docker stack for me and my friends to play on a Minecraft server running on my LAN using Tailscale as the network host. This allowed them to VPN in and join the server seamlessly. However, I grew tired of having to log in to various accounts (e.g., GitHub, Microsoft, Apple) and dealing with frequent sign-outs due to timeouts or playing around with container stacks.

To manage access to my services, I set up ACLs using Tailscale, allowing only specific IP addresses on my network (192.168.8.170) to access HigherGround, nothing else. Recently, I implemented WireGuard and learned two key things: Firstly, when friends VPN into the server, they have full access to everything, which isn't ideal by no means. not that i dont trust my friends but, i would like to fix that :P. I then tried to set allowed IPs in the WireGuard config to 192.168.8.170, but realized that this means they can only access 192.168.8.170 explicitly, not being able to browse the internet or communicate via Signal until I added their specific IP addresses (10.0.0.2 and 10.0.0.3) to their WireGuard configs.

However, I still face a significant issue: every search they perform goes through my IP address instead of theirs.

The Research

I've researched this problem extensively and believe that split tunneling is the solution: I need to configure the setup so that only 192.168.8.170 gets routed through the VPN, while all other traffic is handled by their local router instead of mine. Ideally, my device should be able to access everything on the LAN and automatically route certain traffic through a VPS (like accessing HigherGround), but when performing general internet tasks (e.g., searching for "how to make a sandwich"), it gets routed from my router to ProtonVPN.

I've managed to get ProtonVPN working, but still struggle with integrating WireGuard on my phone to work with ProtonVPN on the server. From what I've read, using iptables and creating specific rules might be necessary to allow only certain devices to access 192.168.8.170 (HigherGround) while keeping their local internet traffic separate.

My long-term goal is to configure this setup so that my friends' local traffic remains on their network, but for HigherGround services, it routes through the VPN tunnel or ProtonVPN if necessary.

My nix Config for wiregaurd (please let me know if im being stoopid with somthing networking is HARRRD)

#WIREGAURD connect to higher ground networking.wg-quick.interfaces = { # "wg0" is the network interface name. You can name the interface arbitrarily. caveout0 = { #Goes to ProtonVPN address = [ "10.2.0.2/32" ]; dns = [ "10.2.0.1" ]; privateKeyFile = "/root/wiregaurd/privatekey"; peers = [ { #From HigherGround to Proton publicKey = "magic numbers and letters"; allowedIPs = [ "0.0.0.0/0" "::/0" ]; endpoint = "79.135.104.37:51820"; persistentKeepalive = 25; } ]; };

cavein0 = { # Determines the IP/IPv6 address and subnet of the client's end of the tunnel interface address = [ "10.0.0.1/24" ]; dns = [ "192.168.8.1" "9.9.9.9" ]; # The port that WireGuard listens to - recommended that this be changed from default listenPort = 51820; # Path to the server's private key privateKeyFile = "magic numbers and letters";

  # This allows the wireguard server to route your traffic to the internet and hence be like a VPN
  postUp = ''
    ${pkgs.iptables}/bin/iptables -A FORWARD -i cavein0 -j ACCEPT
    ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -o enp5s0 -j MASQUERADE
  '';

  # Undo the above
  preDown = ''
    ${pkgs.iptables}/bin/iptables -D FORWARD -i cavein0 -j ACCEPT
    ${pkgs.iptables}/bin/iptables -t nat -D POSTROUTING -o enp5s0 -j MASQUERADE
  '';

  peers = [
    { #friend1 
     publicKey = "magic numbers and letters";
     allowedIPs = [ "10.0.0.3/32" "192.168.8.170/24" ];
     endpoint = "magic numbers and letters";
     presharedKey = "magic numbers and letters";
     persistentKeepalive = 25;
    }
    { # My phone
      publicKey = "magic numbers and letters";
      allowedIPs = [ "10.0.0.2/32" ];
      endpoint = "magic numbers and letters";
      presharedKey = "magic numbers and letters";
      persistentKeepalive = 25;
    }
    {# friend 2
      publicKey = "magic numbers and letters";
      allowedIPs = [ "10.0.0.4/32" "192.168.8.170/24" ];
      endpoint = "magic numbers and letters";
      presharedKey = "magic numbers and letters";
      persistentKeepalive = 25;
    }
    {# friend 3
     publicKey = "magic numbers and letters";
     allowedIPs = [ "10.0.0.5/32" ];
     endpoint = "magic numbers and letters";
     presharedKey = "magic numbers and letters";
     persistentKeepalive = 25;
    }
    
    # More peers can be added here.
  ];
};

};

#Enable NAT networking.nat = { enable = true; enableIPv6 = false; externalInterface = "enp5s0"; internalInterfaces = [ "cavein0" ]; };

services.dnsmasq.settings = { enable = true; extraConfig = '' interface=cavein0 ''; };

Any help would be appreciated thanks

References: Futo Wiki: https://wiki.futo.org/index.php/Introduction_to_a_Self_Managed_Life:_a_13_hour_%26_28_minute_presentation_by_FUTO_software

NixOS Wireguard: https://wiki.nixos.org/w/index.php?title=WireGuard&mobileaction=toggle_view_desktop

Just a FYI, the main portion of the paragraph was put into llama3.1 with the prompt "take the following prompt and fix the grammer, spelling and spacing to make it more readable" Because im bad at english and didnt want to pain people with my choppy sentences and poor grammer

Old Client Config

Solution somewhat found! so i didnt understand what wireguard allowIPS really did, well i did but it was confusing. So what i did before was have 10.0.0.2/32 only, this allowed users of the VPS to have acess to my local network. i swapped it to where there was only 192.168.8.170 only and that made it to where i could ONLY acess the service and no other webpage or dns. the solution was to set on the server side, for peers allowed ip adresses to be "192.168.8.170/24" and "10.0.0.2/32, this allows each user to have there own IP adress within the server. so for example my phone has 10.0.0.2/32 and 192.168.8.170. THE CLIENT SIDE MUST MATCH!!! Which is what i missed before, my guess on why this is important is so your network manager on whatever your client os is running, knows that it can only acess 192.168.8.170 and anything within the 10.0.0.2/32 subnet. The reason why you NEED 10.0.0.2/32 is so the client can have an ip adress to talk to the server internally. at least i think im just a guy who dicks around with pc's in his free time :P.

so having 192.168.8.170/24 and 10.0.0.2/32 on both the wireguard client config and the server enforces that the client cannot acess anything but those adresses and subnets.

i still would like to setup split tunneling, because on my server if i wanna VPN from my server to protonVPN my wiregaurd server doesnt connect. but im glad i got it to this state, thanks for helping out everybody :)

31
Docker Glueton+SearxNG (sh.itjust.works)
submitted 2 months ago* (last edited 2 months ago) by Steamymoomilk@sh.itjust.works to c/privacy@lemmy.ml

I recently learned about a great search engine called SearxNG. it can be self hosted and is a metaseach engine, AKA it uses everyone else's search engine and puts the top results out of all of them in your search results. I instantly loved this because it gave me AD free/ Sponsored free search results, aswell as the added benefit of keeping my search query's on my local machine. However i then realized, it asks other search engines like google and bing for querys. I did not like that, so i setup Gluetun as a network host in docker, which then takes all searx querys and tunnels them through the VPN. making it harder to figure out what im searching compared to my raw IP adress. i have the DockerFile and thought i would share. anything with $$$ needs to be changed.

https://pastebin.com/NfHcUWLs link to dockerfile

-7
submitted 2 months ago* (last edited 2 months ago) by Steamymoomilk@sh.itjust.works to c/privacy@lemmy.ml

Was watching this and thought id share. It is very intreasting. this video topics cover, recommended mobile operating systems. chat apps, smart TV's and modern cars.

all of which like to track and spy on the end user, and what some good alternatives are.

[-] Steamymoomilk@sh.itjust.works 106 points 3 months ago* (last edited 3 months ago)

NO MR HACKER PLEASE. NOT MY KDE DOTFILE!!!!

SOMBODY HELP, HE IS RICING MY DESKTOP ENVIRONMENT!!!

HES POSTING IT ON UNIXPORN THAT SICK FUCK

392
141
Life imitates art (sh.itjust.works)
submitted 4 months ago* (last edited 4 months ago) by Steamymoomilk@sh.itjust.works to c/lemmyshitpost@lemmy.world

its what the crops crave, they crave electrolytes :P

for people that don't get the reference its from the movie "Idiocracy" id highly recommend the flim, be advise some of the language is very outdated and may be offensive to certain groups which kinda sucks.

[-] Steamymoomilk@sh.itjust.works 80 points 5 months ago* (last edited 5 months ago)

True Statement, The new macs have better gaming support on linux than macOS

22

So recently it was brought to my attention about a new(ish) filesystem being created. BcacheFS has some really cool features, some for example are

Copy on write (COW) - like zfs or btrfs
Full data and metadata checksumming
Multiple devices
Replication
Erasure coding (not stable)
Caching, data placement
Compression
Encryption
Snapshots
Nocow mode
Reflink
Extended attributes, ACLs, quotas
Scalable - has been tested to 100+ TB, expected to scale far higher 
High performance, low tail latency
Already working and stable, with a small community of users

I learned about BcacheFS as i am currently going through an Gentoo install and wanted to try out a new filesystem. i originally went for ZFS until i learned there is no active maintainer for OpenZFS on Gentoo as of now. and looked at Btrfs and eventually found BcacheFS. The features look very amazing, however i couldnt find many people daily driving it? i saw a few posts on Arch wiki about trying to get it to work. and i try installing it, as my main FileSystem, but ran into trouble when trying to install grub. its exact complaints was something along the lines of "cant install grub on /dev/sdc3 /dev/sdd ". i was trying to make staggered storage with a 500gb SSD and a 2TB HDD. But eventually gave up after watching a few videos of immolo which he eventually got it working but only thought Unified grub with Systemd. which for my Gentoo systems i really prefer openRC. But enough about me, do any of you fellow linux users use BcacheFS? if so whats your setup and experiences?

also if you have recently looked at lore.kernel.org Mr.Torvald says he regrets merging it into the mainline kernel because of bug fixes. https://lore.kernel.org/lkml/CAHk-=wj1Oo9-g-yuwWuHQZU8v=VAsBceWCRLhWxy7_-QnSa1Ng@mail.gmail.com/ which i thought rather interesting

60
submitted 6 months ago* (last edited 6 months ago) by Steamymoomilk@sh.itjust.works to c/linux@lemmy.world

For about 4-5 years, I have been off the deep end of Gnu/Linux operating systems. During this time period, many things in my life have changed, new social groups, and friends. After the social rebirth and exodus from high school, a few friends stuck around. Granted, this group is smaller than usual but is more closely intertwined. And yes, I know that's already off-topic for a Linux-based community. But when I like to tell a story, I like to paint a full picture. However, I will try to cut out the fluff, but I digress.

So, like many others on this community of Unix-like operating system enthusiasts, I began the plunge from Windows to Linux. First, I originally started with Manjaro because I learned about it from my very first Linux install on a Raspberry Pi model B+. I used that for a few months and eventually used the "AUR". Much like Icarus, I flew too close to the sun, and my naivety of dependencies and the underlying parts of the OS reared its ugly head. To which, my system became irrecoverably broken, and after much mental berating, I switched to Kubuntu for a year, then back to Arch. Then, my home was Nixos and Gentoo on all my machines, using Gentoo has taught me a lot about Linux as a whole.

Now, to the meat and potatoes: myself and two other individuals have done various things to fill our free time. It originally started with heading over to Friend A's house to play on his Xbox. Which became tiresome quickly, as many people know Xbox series S games are expensive, along with the "fast" NVMe-based storage stick for "internal only games". Friend B saved up for a laptop and bought an MSI Cyborg 15, and I cobbled together a LAN rig from Facebook Marketplace. Lovingly named the Ybox, as a joke of not being an Xbox and running Baztite Linux with Steam Big Picture, we had such a great time playing couch co-op games on the Ybox featuring Ultimate Chicken Horse, Unrailed, and speedrunners. But eventually, everybody in the group grew tired of couch co-op as although quite delightful became limiting in screen real estate and three-player genres. So, we started doing LAN parties like many gamers before have done in the days of Pepsi Free and parachute pants. We played many games locally and online together, and it has been great with fairly minor issues involving Steam and spotty internet.

So over this time period, I have been taking online computer classes specifically a Google IT class which is grossly outdated and feels very cobbled together as it was originally released in 2015. But it has still been useful in basic computer concepts like DNS, TCP/IP, and various Windows and Linux utilities. So, we all have played Minecraft since early days and have all played vanilla. So I said, "Screw it," and looked at some guides. Installed it on a spare laptop and recently switched it to run as a Docker container to run on my NAS and looked for help on port forwarding on Lemmy, to which the very kind people of C/Selfhosted pointed out Tailscale and Wireguard. Which has been rock-solid and much better solution got my friends all wired up to my tailnet, and it has been smooth since!

So we are now at the present where the previous night I was on call with Friend A, and he was honestly confused when there was a GUI installer and buttons. He was used to watching me use SwayWM and Kitty on the Ybox. I guess he thought Linux is for hackers and command-line only. The install went without a hitch; he booted into KDE and felt instantly at home! I showed him how to use the KDE store, in his words, "it's like the Microsoft Store?" and the touchscreen worked out of the box, and man it was PURE BLISS.

Honestly, shoutout to this great community and the very talented people behind Linux and its many, many distributions.

40
submitted 6 months ago* (last edited 6 months ago) by Steamymoomilk@sh.itjust.works to c/linux@lemmy.ml

So i recently learned about a distro that has popped up called venom linux. It's a sourced based distro using the package manager called "scratch"

I am very familiar with gentoo linux and this seems like it has heavy inspiration from the gentoo project. Its very cool to see another source based distro come into the picture. The unique part is it has 2 init systems currently, which are neither systemd or openrc?!?!

They are S6 and sysv Which i have never heard of until now. The install looks via similar to gentoo/classic distro install. Which consists of creating partition schemes and filesystems then extracting a archive of the base file.

Some of the main taking points are

"Minimal as possible

Customizable

No systemd (elogind or any part from it)

Centered Around smaller software

That means the lack of huge software like Gnome"

I thought this was a pretty neat project and wonder what other gentoo users think aswell as binary distro users

69

So i've been hosting a modded Minecraft server for my friends and me on weekends. While it's been a blast, I've noticed that our current setup using LAN has its limitations. My friends have been eagerly waiting for their next "fix" (i.e., when they can get back online), and I've been replying with a consistent answer: this Friday.

However, exploring cloud providers to spin up a replica of my beloved "Dog Town" Server was a costly endeavor, at least for a setup that's close to my current configuration. As a result, I've turned my attention to self-hosting a Minecraft server on my local network and configuring port forwarding.

To harden my server, I've implemented the following measures:

  1. Added ufw (Uncomplicated Firewall) for enhanced security.
  2. Blocked all SSH connections except for the IP addresses of my main PC and LAN rig.
  3. Enabled SSH public key authentication only.
  4. Rebuilt all packages using a hardened GCC compiler.
  5. Disabled root access via /etc/passwd.
  6. Created two users: one with sudo privileges, allowing full access; the other with limited permissions to run a specific script (./run.sh) for starting the server.

Additionally, I've set up a fcron job (a job scheduler) as disabled root, which synchronizes my Minecraft server with four folders at the following intervals: 1 hour, 30 minutes, 10 minutes, and 1 day. This ensures that any mods we use are properly synced in case of issues.

any suggestions of making the computer any more secure, aswell as backup solutions? thanks!

--added note, what hostnames do you guys call your servers? I used my favorite band albums and singles for hostnames.

[-] Steamymoomilk@sh.itjust.works 129 points 7 months ago

Fire hazard speed run

[-] Steamymoomilk@sh.itjust.works 143 points 8 months ago

1000016598 Instant prison Bye bye :D

[-] Steamymoomilk@sh.itjust.works 80 points 8 months ago

Bf doged a fuckin tankshell

[-] Steamymoomilk@sh.itjust.works 81 points 9 months ago

1000016226

Its this man He lives in this thing called "The Cloud"

[-] Steamymoomilk@sh.itjust.works 92 points 1 year ago

Its toooo much bloat. There must be malware XD linux users at there peak!

[-] Steamymoomilk@sh.itjust.works 90 points 1 year ago

Tommy should have fucked with him for longer. Been like “message my employer here" -guy texts employer to try to get Tommy in trouble. Boss-“thanks for letting me know, ill make sure to give him a promotion and vacation days. At our company we care about honesty and integrity and twitter is a shithole. Also fuck off I'm my own boss"

[-] Steamymoomilk@sh.itjust.works 119 points 2 years ago

That's very wholesome

view more: next ›

Steamymoomilk

joined 2 years ago