Wireguard config already includes “::/0”
Wireguard config already includes “::/0”
That is what I was thinking, yes.
In my case just disable IPv6 in WiFi is enough.
sysctl looks like the most universal way.
net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1
I tried the same setup with Ubuntu 24.04.1 desktop live system and I can replicate this IP leak issue, I guess I will have to disable IPv6.
You setup Wireguard server on the VPS with both IPv4 and IPv6. Then you connect both your computer and IPv6-only server to the Wireguard server. After connection, you can connect to the VPN through IP address assigned by wireguard.
Personally have good experience with https://github.com/Nyr/wireguard-install, there are other script that are available by searching “wireguard setup script github”.
Note: By default Wireguard config generated will route every bit of traffic through Wireguard (which will be slower and probably not wanted in this situation), to change that change AllowedIPs field in Wireguard config, lets say all your machines are assigned 1.2.3.xxx
as IP address, to only access other 1.2.3.xxx
IP through wireguard, change the config to AllowedIPs = 1.2.3.0/24
.
Host a website that needs to be accessible from your own machine or public?
Former situation: Can be solved by setup reverse proxy on the other VPS, or join machines to a VPN server (like tailscale, Zertoier or Wireguard server)
Later situation: Cloudflare or other CDN, setup reverse proxy on the other VPS.
Less accessible option but available for public: Tor or I2P
Great, if you need to SSH into Ipv6 only machine, SSH has -J flag which can be used to specify “jump host” (basically run SSH through SSH)
Pratically no universal way of making Linux boot with ARM processors.
Much more closed source drivers (than x86 ecosystem).
I am born too late to understand what Y2K problem was, this (the result) might be what people thought could happen.
If I can suddenly in coma for a year, wake up and pay my bills, it’s enough.
Humans are doomed, destroy themselves one way or another.
If the firewall just means no incoming connections, your computer can still reach out to the other side (if they open their port)
try ncdu?
sudo ncdu --one-file-system /
I would 100% exploit this (insurance for family).
One thing notable of Sierra Forest is that the CPUs don’t have SMT (only 1 thread per core), so in theory it doesn’t suffer from speculative execution attacks.
Epyc CPUs still provides more PCIE lanes, which is crucial for GPUs.
ASUSTOR has NAS that can have up to 12 NVME SSDs (but speed is very limited by PCIE lanes).
NVME SSDs are still very expensive compares to HDD.
NAS that have many HDD bays are expensive but designed for easy setup and easy management.
Fractal Design Define 7 (XL) can have up to 18 HDDs by design, but then you will need to search for PCIE to SATA cards and PSU that have many SATA connectors (for example RM850x/RM1000x) and Molex to SATA cables.
FSP CMT370 is a much cheaper case with up to 3.5" HDD *9 or 2.5" SSD *10 but it’s not on amazon, it probably doesn’t sell to western world.
SAS drive enclosures (and SAS cards) are also an option, but the cages might be very loud because they are designed for servers that also are very loud.
I once saw an advertisement that is negative towards house building company, links to a news article.
Without the need for versioning, I think rclone fits the description. For backup into USB drive / remote SSH server I would recommend rsync.