photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
🌈 An inclusive place for your photos, silliness, and convos! 🌈

Administered by:

Server stats:

254
active users

#wireguard

2 posts2 participants0 posts today
Bruce Heerssen<p>I think I might try to stand up a temporary mastodon instance on my home server, which is behind a wireguard VPN, and use nginx on a public facing $5 VPS to serve the content via reverse proxy. </p><p>I wonder if that's possible.</p><p><a href="https://darkmoon.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mastodon</span></a> <a href="https://darkmoon.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> <a href="https://darkmoon.social/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> <a href="https://darkmoon.social/tags/SelfHosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosted</span></a></p>
TugaTech 🖥️<p>Mullvad VPN lança nova arma para fintar firewalls e a censura na internet<br>🔗&nbsp;<a href="https://portal.tugatech.com.pt/2025/11/12/mullvad-vpn-lanca-nova-arma-para-fintar-firewalls-e-a-censura-na-internet-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">portal.tugatech.com.pt/2025/11</span><span class="invisible">/12/mullvad-vpn-lanca-nova-arma-para-fintar-firewalls-e-a-censura-na-internet-2/</span></a></p><p><a href="https://masto.pt/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <a href="https://masto.pt/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a> <a href="https://masto.pt/tags/desktop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>desktop</span></a> <a href="https://masto.pt/tags/firewalls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewalls</span></a> <a href="https://masto.pt/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://masto.pt/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> <a href="https://masto.pt/tags/ipad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipad</span></a> <a href="https://masto.pt/tags/iphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iphone</span></a> <a href="https://masto.pt/tags/quic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quic</span></a> <a href="https://masto.pt/tags/tecnologia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tecnologia</span></a> <a href="https://masto.pt/tags/velocidade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>velocidade</span></a> <a href="https://masto.pt/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> <a href="https://masto.pt/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a>&nbsp;</p>
imp >:3<p>Hey can someone give me a breakdown of how i can Wireguard into my homelab while away from home?</p><p>I also don't have a static IP address btw.</p><p>edit: The consensus seems to be Tailscail hahaha<br><a href="https://mastodon.gamedev.place/tags/AskFedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AskFedi</span></a> <a href="https://mastodon.gamedev.place/tags/Homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Homelab</span></a> <a href="https://mastodon.gamedev.place/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a></p>
aqunt<p>Mä pystytin elämäni ensimmäisen <a href="https://piipitin.fi/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://piipitin.fi/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> verkon. Oli kohtuullisen helppoa ja hyvät ohjeet löytyi. Nyt pitäis vaan keksiä miksi tän pystytin, vai teinkö vaan reiän hyökkääjälle josta pääsisi mahdollisesti sisään kotikoneilleni?<br>Olin silleen ovela ettei tein reiät vaan <a href="https://piipitin.fi/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> päälle joten internetin skannerien ei pitäisi ainakaan nii helposti niitä löytää.<br><a href="https://piipitin.fi/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://piipitin.fi/tags/s%C3%A4%C3%A4t%C3%A4minen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>säätäminen</span></a></p>
Tom<p>Has anyone run into an issue in <a href="https://mastodon.bsd.cafe/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> in which the Endpoint is a fully qualified domain name (e.g. vpn.example.org:51820) and the tunnel won't work, but it will work if you put in the IP address (which is IPv4)? I wonder if it has to do with having both IPv4 and IPv6 stacks running and active at the same time on the client and it can't, for some reason our another, establish the tunnel correctly?</p>
jbz<p>wireguard-fpga: Full-throttle, wire-speed hardware implementation of Wireguard VPN, using low-cost Artix7 FPGA with opensource toolchain</p><p><a href="https://github.com/chili-chips-ba/wireguard-fpga" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/chili-chips-ba/wire</span><span class="invisible">guard-fpga</span></a></p><p><a href="https://indieweb.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://indieweb.social/tags/fpga" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fpga</span></a> <a href="https://indieweb.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
𝙹𝚘𝚎𝚕 𝙲𝚊𝚛𝚗𝚊𝚝 ♑ 🤪<p>My daughter left home because University is located towns-away from here. This means she now has to connect her iPad to $HOME in order to watch the movies that are hosted in our local VOD system.</p><p>Yet another <a href="https://gts.tumfatig.net/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> and <a href="https://gts.tumfatig.net/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> user that don’t even know about it. She only knows that she uses a <a href="https://gts.tumfatig.net/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> and that it’s not NordVPN.</p><p>:runbsd: <a href="https://gts.tumfatig.net/tags/runbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RunBSD</span></a></p>
stfn<p>New blog post! In which:</p><ul><li>I compare myself to Intel</li><li>I remove These NATs</li><li>I also say goodbye to Tailscale</li><li>and I can't stop talking about my upcoming new house</li><li>Billy Mays</li></ul><p><a href="https://stfn.pl/blog/83-lean-network-removing-tailscale/" rel="nofollow noopener" target="_blank">https://stfn.pl/blog/83-lean-network-removing-tailscale/</a></p><p><a href="https://fedi.stfn.pl/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a> <a href="https://fedi.stfn.pl/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://fedi.stfn.pl/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://fedi.stfn.pl/tags/tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tailscale</span></a> <a href="https://fedi.stfn.pl/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a></p>
Nikhil 🐧<p>2 minutes of screentime but already 6% battery used while it was in battery saving -.-</p><p><a href="https://social.linux.pizza/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <a href="https://social.linux.pizza/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://social.linux.pizza/tags/molly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>molly</span></a></p>
Marianne Spiller<p>Vor einer Weile habe ich <a href="https://konfigurationsmanufaktur.de/tags/openVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openVPN</span></a> durch <a href="https://konfigurationsmanufaktur.de/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> ersetzt, und ich sag's mal so: das hätte ich auch ruhig schon eher tun können 🥰</p>
Schenkl | 🏳️‍🌈🦄<p>Die FritzBox meiner Mutter ist so alt, die kann kein <a href="https://chaos.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a>.</p><p>Also muss ich jetzt wirklich so einen lahmen <a href="https://chaos.social/tags/IPsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPsec</span></a> Site-to-Site bauen...</p><p>🤢</p>
House Panther :verified_paw:<p>So I know that <a href="https://goblackcat.social/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVPN</span></a> is neither as fast nor as efficient as <a href="https://goblackcat.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> but OpenVPN is really good at obscuring its traffic. If you run it over TCP, it looks identitcal to an https connection. Therefore, OpenVPN will be a master at evading deep packet inspection on firewalls. OpenVPN still has its place, even though it will never match the raw performance of WireGuard.</p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Mullvad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mullvad</span></a>: Introducing <a href="https://mastodon.thenewoil.org/tags/QUIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QUIC</span></a> Obfuscation for <a href="https://mastodon.thenewoil.org/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a></p><p><a href="https://mullvad.net/en/blog/2025/9/9/introducing-quic-obfuscation-for-wireguard" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mullvad.net/en/blog/2025/9/9/i</span><span class="invisible">ntroducing-quic-obfuscation-for-wireguard</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Bruce Heerssen<p>Why yes, HBO, I am using a VPN. I set it up myself and I'm a bit proud of it. Thank you for noticing.</p><p>Also, fine. I'll turn it off for now.</p><p><a href="https://darkmoon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://darkmoon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a></p>
ij<p>Dear <a href="https://nerdculture.de/tags/followerpower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>followerpower</span></a>, </p><p>when I want to setup a fully <a href="https://nerdculture.de/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://nerdculture.de/tags/Netbird" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netbird</span></a> overlay <a href="https://nerdculture.de/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> to replace my manual <a href="https://nerdculture.de/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> VPN network, where would be the best location for the proxy/relay/etc servers when I have 3 <a href="https://nerdculture.de/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> nodes and a <a href="https://nerdculture.de/tags/Pfsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pfsense</span></a> HA cluster? </p><p>Having the central control servers behind pfsense seems no good solution. Having them on the Proxmox cluster somehow neither. <br>So, maybe it's best to locate these services onto a other VPS server outside of my own /26 network outside of the Proxmox cluster?</p><p>The desired network would consist of<br>- 3 node Proxmox cluster with /26 IPv6 &amp; /48 IPv6<br>- 1 VPS with IPv4 &amp; IPv6 connectivity<br>- 1 VPS with IPv4 only<br>- 1 DSL dialup site<br>- 1 Fibre dialup site with pfsense firewall<br>- maybe 2 or 3 more DSL dialup sites as well</p><p>Any recommendations?</p>
TechNadu<p>Mullvad VPN introduces QUIC obfuscation for WireGuard. 🚀<br>➡️ Tunnels VPN traffic via HTTP<br>➡️ Much harder to block<br>➡️ Live on desktop v2025.9, mobile updates soon</p><p>More here: <a href="https://www.technadu.com/mullvad-vpn-launches-quic-obfuscation-for-wireguard-to-help-users-beat-internet-blocks/608963/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">technadu.com/mullvad-vpn-launc</span><span class="invisible">hes-quic-obfuscation-for-wireguard-to-help-users-beat-internet-blocks/608963/</span></a></p><p><a href="https://infosec.exchange/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://infosec.exchange/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://infosec.exchange/tags/MullvadVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MullvadVPN</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a></p>
Bruce Heerssen<p>Woohoo! Finally.</p><p><a href="https://darkmoon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a></p>
fatuus<p>Des idées d'outils qui peuvent être utilisés pour contourner les blocages en <a href="https://mstdn.fr/tags/Russie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russie</span></a> ? </p><p>P.S.: <a href="https://mstdn.fr/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> &amp; <a href="https://mstdn.fr/tags/Shadowsocks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shadowsocks</span></a> ne passent pas. </p><p><a href="https://mstdn.fr/tags/autohebergement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autohebergement</span></a></p>
Larvitz :fedora: :redhat:<p>And since I now have the shiny OPNsense running at home:</p><p>RoadWarrior wireguard tunnel with a dedicated IPv6 /64 from my Telekom /56 allocation :-) </p><p>IPv6 for when I'm in legacy networks (Looking at you, Deutsche Bahn and German Hotels...)</p><p><a href="https://burningboard.net/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> <a href="https://burningboard.net/tags/ipv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipv6</span></a> <a href="https://burningboard.net/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://burningboard.net/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://burningboard.net/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a></p>
ADMIN magazine<p>Last chance to get your SysAdmin Day gift: Don't miss the latest installment of 10 Terrific Tools for the Busy Admin! You get articles about open source tools and utilities for your admin toolbox from us and our partner <span class="h-card" translate="no"><a href="https://mastodon.hetzner.social/@hetzner" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hetzner</span></a></span> </p><p>Download your copy before it's gone on August 31st!<br><a href="https://mailchi.mp/admin-magazine.com/sysadmin-day-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailchi.mp/admin-magazine.com/</span><span class="invisible">sysadmin-day-2025</span></a><br><a href="https://hachyderm.io/tags/SysAdminDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdminDay</span></a> <a href="https://hachyderm.io/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://hachyderm.io/tags/tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tools</span></a> <a href="https://hachyderm.io/tags/utilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>utilities</span></a> <a href="https://hachyderm.io/tags/Snap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Snap</span></a> <a href="https://hachyderm.io/tags/Flatpak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flatpak</span></a> <a href="https://hachyderm.io/tags/DiffPDF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DiffPDF</span></a> <a href="https://hachyderm.io/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://hachyderm.io/tags/electerm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electerm</span></a> <a href="https://hachyderm.io/tags/zoxide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zoxide</span></a> <a href="https://hachyderm.io/tags/tasksel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tasksel</span></a> <a href="https://hachyderm.io/tags/PackageManger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PackageManger</span></a></p>