wheresmysurplusvalue

joined 2 years ago
[–] wheresmysurplusvalue@hexbear.net 2 points 2 years ago* (last edited 2 years ago) (1 children)

Ah, yeah I recognize the cert rotation page. That docs page doesn't say it, but they do use a custom certificate, described a little bit here:

Nebula have implemented their own certificate structure. It’s similar to an x509 “TLS Certificate” (like you’d use to access an HTTPS website, or to establish an OpenVPN connection), but has a few custom fields.

I think Let's Encrypt issues certs for validating that you own a (public) domain name, but for my use, these certs aren't associated to a domain name, just a machine not accessible to the public internet. I'll do some research to see if I can self host something that would allow other hosts to request a renewed cert automatically.

That sounds cool, I will definitely do some reading. Thanks!

[–] wheresmysurplusvalue@hexbear.net 2 points 2 years ago (2 children)

During my research I came across ngrok, maybe this could be useful in your situation. I also came across zrok, which seems like an open source version of the same thing based on OpenZiti. Both of them seem like ways to give public portals to your private services. So you could give your friends access that way without them needing to use a VPN.

[–] wheresmysurplusvalue@hexbear.net 3 points 2 years ago* (last edited 2 years ago) (4 children)

Just wrote up my use case here

These certificates are custom certificates generated for Nebula clients, I don't think Let's Encrypt can issue them. In this case I have a trusted machine at home which acts as a CA and signs certificates for all other hosts on the network. The certificate is used to authenticate the host, and also can include custom attributes to be used in firewall rules. So the problem I'd need to solve is keeping track of certificate expiry and renewing the certificates, or issuing new certificates when I add new attributes to a set of hosts.

[–] wheresmysurplusvalue@hexbear.net 3 points 2 years ago* (last edited 2 years ago) (4 children)

Good feedback, thanks. Making sure all my devices are properly firewalled is another concern of mine, since all this NAT traversal stuff is basically a way to bypass firewall rules which are there for a reason. I think most of these solutions have firewalls/ACLs built in. But it does mean that I would rely on their firewall implementation and can't switch it out for something else.

My use case is I'm hosting a number of services on machines inside my home LAN, and also a few services on a VPS. Two family members use a few of the services hosted in the LAN and on the VPS. For things inside the LAN, for now I've given them WireGuard credentials to access them, but this gives them full access to my LAN. On the VPS they can access a http server from the public internet.

I also travel a bit, so I connect via WireGuard to encrypt my traffic and have access to my LAN services at the same time. Tailscale offers "exit node" functionality which seemed to work when I tried it.

So my main goals are:

  1. Encrypt my mobile traffic through a secure tunnel back home, no need to pay for or trust a VPN provider
  2. Ability to give users role-based access to my privately hosted services from anywhere
  3. Close almost all ports on all machines including the VPS, no publicly hosted services at all (maybe not even ssh)
  4. Simplify access to my services in general. Generally just want to be able to e.g. type the same URL and access a service, regardless of whether I'm at home or on a public network. But there are probably other solutions for this point alone.

That is, if "we" are the ones who have the quantum computers

[–] wheresmysurplusvalue@hexbear.net 22 points 2 years ago* (last edited 2 years ago)

the German foreign minister responded, “Are you saying that our doctors in the field in Gaza aren’t telling the truth? Are you saying that the international media is lying?”

heartbreaking

astronaut-2 astronaut-1

[–] wheresmysurplusvalue@hexbear.net 8 points 2 years ago (1 children)

I haven't read it myself yet, but there is some discussion about the book (and Strong herself) in this video by Lady Izdihar

https://youtu.be/cxsDsG6paWE

[–] wheresmysurplusvalue@hexbear.net 15 points 2 years ago (3 children)

This Soviet World by Anna Louise Strong

Nope because in this case our client has to request a budget and justify it, so in this case they asked for too much and have to explain what went wrong

[–] wheresmysurplusvalue@hexbear.net 3 points 2 years ago* (last edited 2 years ago) (1 children)

I bought a N5105 mini pc (Intel, 4 cores) from AliExpress to home-roll my own router, with the idea that I could run a few other services in containers on the same device. I think hardware-wise I'm ok, but since I built it from scratch, it's possible something isn't optimal how I configured the software. But this thing should be able to do gigabit speeds no problem. Maybe I'll try again next weekend. Thanks for the inspiration and glad you were able to resolve the buffer bloat!

[–] wheresmysurplusvalue@hexbear.net 3 points 2 years ago (3 children)

Anyone had success doing this in OpnSense/pfSense? I tried following a guide when I first set up OpnSense, but the changes made my bufferbloat rating worse, so I reversed the changes and haven't tried since.

Btw there is this test you can use to test buffer bloat: https://www.waveform.com/tools/bufferbloat

And you probably want to test it using a wired connection first.

view more: ‹ prev next ›