photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

246
active users

#proxy

1 post1 participant0 posts today

Working on my new home (davidaugust.ghost.io/ on day 2 of my 124 day trial) for my articles and #blogging, I am realizing that unlike in the past, it might not make sense to use feedburner anymore.

My new home will allow me to have the whole thing served from a domain I own and control, including the feed.

Making a #proxy for the #feed, to preserve #subscribers if I were to change #tech or companies, seem a little superfluous. Am I missing compelling reasons to use #feedburner in 2025?

David AugustDavid AugustStories, serious articles, satire, tech trends, how to guides and ideas from David August. Actor. Writer. Acting coach.

Oh snap! `YARR - Yet Another RSS Reader` has a new version and I missed it in March!
github.com/nkanaev/yarr/releas
YARR is like Feedly or NewsBlur, except more like TinyRSS or FreshRSS - you can self-host.

UNLIKE those, you can tell yarr to run at `<ip:port>`, so you can stick it at port 7666 for your reverse #proxy. And its lightweight, I run my own AND 3 other instances for fam. members on the same host accessed via different subdomains re-proxied by #nginx.

GitHubRelease v2.5 · nkanaev/yarr- (new) Fever API support (thanks to @icefed) - (new) editable feed link (thanks to @adaszko) - (new) switch to feed by clicking the title in the article page (thanks to @tarasglek for suggestion) ...

#Cybercriminals Are Hiding #Malicious Web Traffic in Plain Sight

In an effort to evade detection, cybercriminals are increasingly turning to “residential proxy” services that cover their tracks by making it look like everyday online activity.
#security #privacy #malware #proxy

wired.com/story/cybercriminals

WIRED · Cybercriminals Are Hiding Malicious Web Traffic in Plain SightBy Lily Hay Newman
#Wochenbericht KW19:

- Mo: #3CX Einstellungen, Upgrade von #SmartTime Datenbank. Stromausfall eines #Unifi Netzwerks. Alles wieder gut.
- Di: Installation eine #OauthProxy unter #Debian. Evaluierung des transparenten #Proxy in einer #Watchguard für eine kommende Migration weg von #Sophos
- Mi: Aufbau einer #3CX #Telefonanlage. Einrichtung eines transparenten #Proxy auf einer #OPNSense inkl. #ACME Zertifikatsverwaltung nicht nur für HTTP, sondern auch SMTP und IMAP auf einen #GroupOffice Server
- Do: Bürotag, Kleinigkeiten. Eine #3CX leidete unter einer schlechten #Fortinet Firewall. Reboot tut gut. Entstörung E-Mail Versand in einer Praxis
- Fr: @oliver@lfnt.site installiert die Basis für neander.social . Mal gucken wie weit wir mit #FreeBSD kommen. Sonst #Orga und #Abrechnungen. #Teammeeting

Highlight: @besendorf@chaos.social testet den Umstieg von #gitea auf #forgejo. Sieht gut aus!

Just released: #swad v0.3!

github.com/Zirias/swad/release

swad is the "Simple Web Authentication Daemon", your tiny, efficient and (almost) dependency-free solution to add #cookie + login #form #authentication to whatever your #reverse #proxy offers. It's written in pure #C, portable across #POSIX platforms. It's designed with #nginx' 'auth_request' in mind, example configurations are included.

This release brings a file-based credential checker in addition to the already existing one using #PAM. Also lots of improvements, see details in the release notes.

I finally added complete build instructions to the README.md:

github.com/Zirias/swad

And there's more documentation available: manpages as well as a fully commented example configuration file.

GitHubRelease swad 0.3 · Zirias/swadNew features: New credential checker "file", using a password file with bcrypt hashes New tool "swadpw", for editing password files Improvements: [Performance] Support epoll, kqueue and poll in ...
Replied in thread

@nixCraft actually this screams "#GDPR & #BDSG violation" so loudly that even demanding #PII and espechally an #ID should get them sued by @noybeu and @Bundesverband ....

  • Cuz "#OpenAI" has neither "legitimate interest" nor a mandate to even demand to see an ID, much less to store and process it!

This isn't like a contractual agreement or some finance where one could argue "#KYC" is warranted "to combat #fraud"...

  • The only thing worse I've seen is some obscure company that brokers #bandwith with a hidden #proxy feature in #apps...

did a thing!

Big problem in #selfhosting is making sure you've set things up right: #dns resolution, #ports, rev/ #proxy. _Sometimes_ its helpful to query _from the outside_ of your local network.

`canuseeme` - a single binary #webservice that will query the URI you give it and see if its reachable by randos/services on the internet. A bit like a #webproxy, but can exercise it programmatically, and not limited to HTTP/S ports.

github.com/tezoatlipoca/canuse

GitHubGitHub - tezoatlipoca/canuseeme: CanUSeeMe - a self-hosted auto-responder for remote self-testing local endpoints/websites.CanUSeeMe - a self-hosted auto-responder for remote self-testing local endpoints/websites. - tezoatlipoca/canuseeme
Continued thread

@torproject same with #obfs4 bridges: there is no option to say like ports=80,443 or similar, which makes it cumbersome to get said bridges.

And trying to get places to #DontBlockTor that criminalize the use of #Tor is foolish at best.

This afternoon, I got close to what I wanted to achieve in terms of load-balancing between the two #AI #sabots I have running.

I had originally planned to use #OpenBSD's #OpenHTTPD or #RelayD to do the job, but #HAProxy #PROXY protocol was the limiting factor… so I went #nginx instead.

One thing I haven't worked out yet, is how to pass the client IP by PROXY protocol to a HTTP back-end. Seems I can do it for a generic TCP stream, but not HTTP.

The alternative is to set X-Forwarded-For, and have the back-ends trust it, like they trust PROXY for the gateway's IPv4 address for #sniproxy.

But… it works, you can hit sabot.vk4msl.com/ and you'll either get sabot01 (which uses nepenthes) or sabot02 (which uses iocaine). Since neither cares about the URI, I can bounce the client between them.

This did get me thinking though, if enough of us did it, we could have a #AISabotAsAService for websites to redirect/link to when they think they're being scraped by an AI bot.

We could provide a pool of servers that would provide the link maze. Front-end proxies would just bounce you between all the pool members, feeding your bot nonsense.

#Go Module Mirror served #backdoor to devs for 3+ years

A mirror #proxy #Google runs on behalf of developers of the Go programming language pushed a backdoored package for more than three years until Monday, after researchers who spotted the malicious code petitioned for it to be taken down twice.
#security

arstechnica.com/security/2025/

Ars Technica · Go Module Mirror served backdoor to devs for 3+ yearsBy Dan Goodin

Ich frage mich jetzt schon länger was 2025 die Vor- und Nachteile eines "Secure Web Gateway" sind?

Ein SWG ist ein (Forward) Proxy mit zusätzlichen Sicherheitsfeatures. Darunter z.B.:

- TLS-Interception
- Datei-Zerlegung
- URL Filtering
- AV-Scanning
- MIME Erkennung
- Datenverkehrmanipulation

Ein Download einer schädlichen Datei über einen E2E verschlüsselten Cloud-Anbieter (z.B. MEGA oder Filen) würde das alles aushebeln.

Aber um "Grundrauschen" abzufangen?!