I just lost ¾ of a really good blog post by typing :q! without thinking and I’m having a really hard time rewriting it.

⤋ Read More

Wordle DS 835 6/6
⬜️⬜️🟩⬜️⬜️
⬜️⬜️🟩🟨⬜️
⬜️🟩🟩🟨⬜️
🟩🟩🟩⬜️⬜️
🟩🟩🟩⬜️🟩
🟩🟩🟩🟩🟩

⤋ Read More
In-reply-to » I'll shut down this instance soon, I want to say thanks to all of you, especially @prologic . It's been fun here, but I do not spend much time here anymore - cutting down on the things I host and use \ spend time on etc.

@stigatle@yarn.stigatle.no Gonna miss your lovely ocean scenery, but we’ll do something about that soon™ 😅 I believe I do still intend to build an external fully supported Twtxt<->ActivityPub bridge, so ya never know, you might just be back and ya’d never know 😅

⤋ Read More
In-reply-to » Hmm when I said "Wireguard is kind of cool" in this twt now I'm not so sure 😢 I can't get "stable tunnels" to freak'n stay up, survive reboots, survive random disconnections, etc. This is nuts 🤦‍♂️

@movq@www.uninformativ.de I think I misunderstood some aspects of Wireguard as mentioned here, not 100% sure, but so far things are much happier now with assigning /32(s) as Tunnel IP(s) for Peers and being a bit more thoughtful about the AllowedIPs 🤞 I’m only playing around with 3 devices right now, my core router (RouterOS), an Ubuntu 22.04 VM over at Vultr and my iPhone.

⤋ Read More
In-reply-to » Hmm when I said "Wireguard is kind of cool" in this twt now I'm not so sure 😢 I can't get "stable tunnels" to freak'n stay up, survive reboots, survive random disconnections, etc. This is nuts 🤦‍♂️

@prologic@twtxt.net Nothing special, really. 🤔 We have “site-to-site” (a pair of servers) and “point-to-site” (one server, many clients) setups, pretty much the same as described here:

https://wiki.archlinux.org/title/WireGuard#Usage

Which operating system(s) are you using?

⤋ Read More
In-reply-to » Hmm when I said "Wireguard is kind of cool" in this twt now I'm not so sure 😢 I can't get "stable tunnels" to freak'n stay up, survive reboots, survive random disconnections, etc. This is nuts 🤦‍♂️

I think this is what I was missing in my understanding:

In other words, when sending packets, the list of allowed IPs behaves as a sort of routing table, and when > receiving packets, the list of allowed IPs behaves as a sort of access control list.

This is what we call a Cryptokey Routing Table: the simple association of public keys and allowed IPs.

⤋ Read More