digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

818
active users

#wireguard

4 posts4 participants2 posts today
Marianne Spiller<p>Vor einer Weile habe ich <a href="https://konfigurationsmanufaktur.de/tags/openVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openVPN</span></a> durch <a href="https://konfigurationsmanufaktur.de/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> ersetzt, und ich sag's mal so: das hätte ich auch ruhig schon eher tun können 🥰</p>
:trone: Shalien<p>Compiling <a href="https://mastodon.projetretro.io/tags/lemmy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lemmy</span></a> on an <a href="https://mastodon.projetretro.io/tags/alpine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>alpine</span></a> <a href="https://mastodon.projetretro.io/tags/lxc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lxc</span></a> container running in my <a href="https://mastodon.projetretro.io/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.projetretro.io/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a> over my <a href="https://mastodon.projetretro.io/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> tunnel while waiting for my fast food order is clearly a new level of whatever it is .</p>
ALT43 :microblog:<p>Nueva entrada en el Blog-&gt;</p><p>Comparativa en el uso diario de openVPN vs Wireguard</p><p><a href="https://alt43.es/comparativa-protocolos-vpn-openvpn-vs-wireguard/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alt43.es/comparativa-protocolo</span><span class="invisible">s-vpn-openvpn-vs-wireguard/</span></a></p><p><a href="https://mastodon.social/tags/openvpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openvpn</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a></p>

Ah, the thrilling saga of #VPNs and moose conspiracies! 🤔🔍 Because when "Wireguard" isn't exotic enough, you dive into the abyss of the "shaitanmachine"—obviously the go-to for when your standard VPN is banned by some mysterious geopolitical overlord. 🌍🛡️ Let's face it, the real challenge here is finding a VPN that isn't more of a mystery than the plot of a soap opera! 📺😂
blog.nommy.moe/blog/exotic-mes #mooseconspiracies #Wireguard #shaitanmachine #cybersecurity #HackerNews #ngated

blog.nommy.moeJust Nommy

So I know that #OpenVPN is neither as fast nor as efficient as #WireGuard but OpenVPN is really good at obscuring its traffic. If you run it over TCP, it looks identitcal to an https connection. Therefore, OpenVPN will be a master at evading deep packet inspection on firewalls. OpenVPN still has its place, even though it will never match the raw performance of WireGuard.

Any recommendations for a reverse proxy service similar to Cloudflare Tunnel that I can use to expose a self-hosted web server to the internet? Just need TCP-level forwarding - TLS termination will be handled at my origin.

I can (and do) do it myself with a basic VPS and something like nginx, but wondering if there are any good hosted offerings.

Biggest release yet: 11 major features and nearly 100 bugfixes!

📲 Mobile Clients with Internal MFA (TOTP/Biometry) and External SSOs.

💫 Desktop Client adds External SSO/IdP MFA.

🫆 New: MFA on Desktop via Mobile Biometry 🔐

🤝 As an open company, we’ve launched public processes like the Architecture Decision Record and a page with pentesting findings & fixes (unique in VPNs, as far as we know).

Release notes: defguard.net/blog/defguard-15-

defguardRelease 1.5 with Mobile apps, External SSO MFA, MFA with Biometry | Defguard BlogThis is the biggest, most feature packed release we have ever done! We’ve introduced 11 major features and nearly 100 bugfixes.

So I've got an LXC container with Pi-Hole running for our LAN now. Next up I'm gonna look at setting up Wireguard in a way where I first hop from my phone to our LAN, and then hop to Mullvad from there. I need to somehow configure the Mullvad jump to be only applied to my phone and computers, while leaving my wife's computer and phone out of it.

Re-learning Ansible too. Need to share config between containers some way.

Ok the Parent's Fileserver (PFS) needs to be reachable over protocols that should not be port forwarded. My options are:

1. Site-to-Site wireguard (Mikrotik <-> Unifi)
2. Connect PFS as a client to the Mikrotik via wireguard
3. Place my entire k8s cluster and the PFS on tailscale

The PFS will be on tailscale anyway, since it needs to be reachable by my Dad's laptop.

So I guess the real question is, is it worthwhile to bother with tailscale on the cluster, or is a site-to-site a better or more useful option?

I think I am leaning towards the site-to-site to keep complexity lower.
#HomeLab #Networking #Kubernetes #Tailscale #Wireguard

Dear #followerpower,

when I want to setup a fully #selfhosted #Netbird overlay #VPN to replace my manual #wireguard VPN network, where would be the best location for the proxy/relay/etc servers when I have 3 #Proxmox nodes and a #Pfsense HA cluster?

Having the central control servers behind pfsense seems no good solution. Having them on the Proxmox cluster somehow neither.
So, maybe it's best to locate these services onto a other VPS server outside of my own /26 network outside of the Proxmox cluster?

The desired network would consist of
- 3 node Proxmox cluster with /26 IPv6 & /48 IPv6
- 1 VPS with IPv4 & IPv6 connectivity
- 1 VPS with IPv4 only
- 1 DSL dialup site
- 1 Fibre dialup site with pfsense firewall
- maybe 2 or 3 more DSL dialup sites as well

Any recommendations?

🚀 Mullvad VPN rolls out QUIC obfuscation for WireGuard on all desktop platforms! This new feature disguises VPN traffic as regular web browsing 🌐, helping users evade censorship & firewall blocks seamlessly. Available in v2025.9, coming soon to mobile! 🔒✨ #VPN #Privacy #Censorship #WireGuard #newz

Read more: cyberinsider.com/mullvad-adds-

CyberInsider · Mullvad Adds QUIC Obfuscation for WireGuard to Evade CensorshipMullvad VPN has introduced QUIC obfuscation support for WireGuardto assist users in circumventing censorship and firewall-based blocking.