axzxc1236

joined 1 year ago
[–] axzxc1236@lemm.ee 2 points 2 weeks ago* (last edited 2 weeks ago)

simplest tool to backup to Google drive

Without the need for versioning, I think rclone fits the description. For backup into USB drive / remote SSH server I would recommend rsync.

[–] axzxc1236@lemm.ee 2 points 1 month ago (1 children)

Wireguard config already includes "::/0"

[–] axzxc1236@lemm.ee 2 points 1 month ago

That is what I was thinking, yes.

[–] axzxc1236@lemm.ee 0 points 1 month ago* (last edited 1 month ago)

In my case just disable IPv6 in WiFi is enough.

sysctl looks like the most universal way.

net.ipv6.conf.all.disable_ipv6 = 1 net.ipv6.conf.default.disable_ipv6 = 1

[–] axzxc1236@lemm.ee 3 points 1 month ago (2 children)

I tried the same setup with Ubuntu 24.04.1 desktop live system and I can replicate this IP leak issue, I guess I will have to disable IPv6.

 

I was setting up my laptop for traveling and adding Wireguard VPN configuration.

The Wireguard config generated by router only contains IPv4 address (10.0.5.x), and while testing the VPN to my surprise "what is my ip" websites can find my IPv6 address (I USB tethered mobile connection to my laptop).

It looks like NetworkManager does nothing about IPv6 connection if VPN doesn't have IPv6 settings, which is bad for road warrior type of VPN configuration.

Is there an easy toggle to turn of IPv6 if VPN is connected and otherwise? Or is only option to disable all IPv6 no matter what?

[–] axzxc1236@lemm.ee 2 points 1 month ago

You setup Wireguard server on the VPS with both IPv4 and IPv6. Then you connect both your computer and IPv6-only server to the Wireguard server. After connection, you can connect to the VPN through IP address assigned by wireguard.

[–] axzxc1236@lemm.ee 2 points 1 month ago* (last edited 1 month ago) (2 children)

Personally have good experience with https://github.com/Nyr/wireguard-install, there are other script that are available by searching "wireguard setup script github".

Note: By default Wireguard config generated will route every bit of traffic through Wireguard (which will be slower and probably not wanted in this situation), to change that change AllowedIPs field in Wireguard config, lets say all your machines are assigned 1.2.3.xxx as IP address, to only access other 1.2.3.xxx IP through wireguard, change the config to AllowedIPs = 1.2.3.0/24.

[–] axzxc1236@lemm.ee 3 points 1 month ago* (last edited 1 month ago) (4 children)

Host a website that needs to be accessible from your own machine or public?

Former situation: Can be solved by setup reverse proxy on the other VPS, or join machines to a VPN server (like tailscale,, Zertoier or Wireguard server)

Later situation: Cloudflare or other CDN, setup reverse proxy on the other VPS.

Less accessible option but available for public: Tor or I2P

[–] axzxc1236@lemm.ee 3 points 1 month ago (6 children)

Great, if you need to SSH into Ipv6 only machine, SSH has -J flag which can be used to specify "jump host" (basically run SSH through SSH)

[–] axzxc1236@lemm.ee 3 points 4 months ago

I think that means the access point can only run at up to 80Mhz bandwidth, so not full bandwidth.

[–] axzxc1236@lemm.ee 35 points 4 months ago* (last edited 4 months ago) (12 children)

I am born too late to understand what Y2K problem was, this (the result) might be what people thought could happen.

[–] axzxc1236@lemm.ee 3 points 4 months ago (1 children)

I9 14900k…bad news for you, 13th and 14th gen I9 is unstable, crashes.

Suggestion: Wait for 15th gen or AMD 9000 series CPU to come out.

view more: next ›