🇨🇦

  • 1 Post
  • 22 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle

  • ? That’s a bizarre response.

    No one here is trying to fleece you. People are suggesting ways to run your own instance as that’s the major difference between Reddit and Lemmy; you’re not obligated to use someone else’s hardware or be subject to their rules, you can setup your own systems and have a bit more freedom. Reddit doesn’t give you that option.

    Your account is subject to the rules of the instance it was created on, as well as the rules of each community you’re interacting with. If you run afoul of the admins for your instance, you can be banned, losing access to that account completely.

    If you were to run your own instance; no single admin could ban your entire account if you pissed them off. You can still be blocked from communities or entire instances if you don’t play nicely with others, but you won’t lose the account so you can still use it in other instances/communities.

    For most people this isn’t really necessary; but lemmy also has a pretty large number of tech nerds that like to self-host our own services, so you’ll get quite a bit of ‘heres how you can do it yourself’ type responses.

    Unlike reddit, you can just setup your own space on your own hardware completely under your own control, if you don’t like what’s available.














  • I wonder why so many people had issues with the v6 pihole update.

    I pulled the new docker container and it ran overtop the previous version just fine. The only issue I had was I had the admin password set to empty via an env variable and that variable name changed. Took like 10 min to find and fix. The rest migrated perfectly.

    Now I’m just waiting on orbital-sync to add v6 support, but that’s just around the corner and not that critical.


  • 95% of things I just don’t expose to the net; so I don’t worry about them.

    Most of what I do expose doesn’t really have access to any sensitive info; at most an attacker could delete some replaceable media. Big whoop.

    The only thing I expose that has the potential for massive damage is OpenVPN, and there’s enough of a community and money invested in that protocol/project that I trust issues will be found and fixed promptly.

    Overall I have very little available to attack, and a pretty low public presence. I don’t really host any services for public use, so there’s very little reason to even find my domain/ip, let alone attack it.


  • Looking at openspeedtests github page, this immediately sticks out to me:

    Warning! If you run it behind a Reverse Proxy, you should increase the post-body content length to 35 megabytes.

    Follow our NGINX config

    /edit;

    Decided to spin up this container and play with it a bit myself.

    I just used my standard nginx proxy config which enables websockets and https, but I didn’t explicitly set the max_body_size like their example does. I don’t really notice a difference in speed, switching between the proxy and a direct connection.

    So, That may be a bit of a red herring.



  • This part always confuses me, so I won’t be able to give specifics; just a general direction. Most guides explain how to route traffic from a vpn client to the lan of the vpn host. You need to route traffic from the vpn host/lan to a client of the vpn.

    You need to change the routing table on the VPS, adding a static route to route traffic heading for your VPNs subnet to the VPN host instead of out the default gateway.

    How exactly to do that I’ll have to leave to someone else unfortunately. Network config confuses the hell out of me.