Perhyte

joined 1 year ago
[–] Perhyte@lemmy.world 8 points 2 months ago (1 children)

No idea about the Lemmy hosting bit, but I highly doubt that .com you got will renew at $1 going forward. Judging by this list it'll most likely be $9+ after the first year.

At $1/year, the registrar you used is taking a loss because they pay more than that to the registry for it. They might be fine with that for the first year to get you in the door, but they'd presumably prefer to be profitable in the long term.

[–] Perhyte@lemmy.world 19 points 4 months ago

If you don't mind using a gibberish .xyz domain, why not an 1.111B class? ([6-9 digits].xyz for $0.99/year)

[–] Perhyte@lemmy.world 2 points 4 months ago

Any chance you've defined the new networks as "internal"? (using docker network create --internal on the CLI or internal: true in your docker-compose.yaml).

Because the symptoms you're describing (no connectivity to stuff outside the new network, including the wider Internet) sound exactly like you did, but didn't realize what that option does...

[–] Perhyte@lemmy.world 2 points 4 months ago* (last edited 4 months ago) (1 children)

It also means that ALL traffic incoming on a specific port of that VPS can only go to exactly ONE private wireguard peer. You could avoid both of these issues by having the reverse proxy on the VPS (which is why cloudflare works the way it does), but I prefer my https endpoint to be on my own trusted hardware.

For TLS-based protocols like HTTPS you can run a reverse proxy on the VPS that only looks at the SNI (server name indication) which does not require the private key to be present on the VPS. That way you can run all your HTTPS endpoints on the same port without issue even if the backend server depends on the host name.

This StackOverflow thread shows how to set that up for a few different reverse proxies.

[–] Perhyte@lemmy.world 2 points 6 months ago

If there happens to be some mental TLS handshake RCE that comes up, chances are they are all using the same underlying TLS library so all will be susceptible…

Among common reverse proxies, I know of at least two underlying TLS stacks being used:

  • Nginx uses OpenSSL.
    • This is probably the one you thought everyone was using, as it's essentially considered to be the "default" TLS stack.
  • Caddy uses crypto/tls from the Go standard library (which has its own implementation, it's not just a wrapper around OpenSSL).
    • This is in all likelihood also the case for Traefik (and any other Go-based reverse proxies), though I did not check.
[–] Perhyte@lemmy.world 2 points 8 months ago (1 children)

Have you considered putting alias htop=btop (or equivalent) in your shell profile?

[–] Perhyte@lemmy.world 2 points 9 months ago (1 children)

It's nice in theory, but I've had very little luck using it for the last few days.

I wouldn't be surprised if whatever instances it picks to send people to are soon afterwards rate limited because demand is too high relative to supply.

[–] Perhyte@lemmy.world 7 points 9 months ago

If this is something you run into often, it's likely still only for a limited number of servers? ssh and scp both respect .ssh/config, and I suspect (but haven't tested) that sftp does too. If you add something like this to that file:

Host host1 host2
  Port 8080

then SSH connections to hosts named in that first line will use port 8080 by default and you can leave off the -p/-P when contacting those hosts. You can add multiple such sections if you have other hosts that require different ports, of course.

[–] Perhyte@lemmy.world 2 points 9 months ago

Aurora is no longer maintained, but it still works just fine. It's a Windows app, so not web-accessible or anything, but it's free. It only contains the SRD content by default (probably for legal reasons), but there's at least one publicly-accessible elements repository for it that you can find using your favorite search engine.

[–] Perhyte@lemmy.world 18 points 9 months ago (3 children)

Assuming they went to signed 64-bit time, it should be about 3:28:32 pm UTC on Sunday, December 4, 292277026596. Yes, that last number is a year.

[–] Perhyte@lemmy.world 5 points 9 months ago* (last edited 9 months ago)

If they have the root access typically needed to reboot a server^1^ they could also just wipe the logs without rebooting.

^1^: GUIs typically have a way to reboot without such privileges, but those are typically not installed on machines just used as servers.

[–] Perhyte@lemmy.world 9 points 10 months ago (2 children)

!distrohopping@lemmy.world - no posts yet though.

view more: next ›