toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

206
active users

#wireguard

3 posts3 participants0 posts today
Kettwachsler<p>Immerhin sind wir inzwischen so weit, freies WLAN in Krankenhäusern zu haben.</p><p><a href="https://sueden.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://sueden.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a></p>
House Panther :verified_paw:<p>I did something dumb on my VPS and had to rebuild the damn thing. Thankfully there isn’t much to it because all it’s doing is giving me a static IP address for my home server. It was just a matter of updating the <a href="https://goblackcat.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> keys to re-establish the VPN tunnel and configuring port forwarding and NAT. Hell, I was too keyed up to sleep after work anyways.</p>
Ivan Todorov<p>Server exposing only what I trust through carefully crafted NAT rules. It's not paranoia if you're actually in control of your digital realm, right? 😅 </p><p>As well, when I realised I can have my own VPN, honestly it was a game changer! I feel at home everywhere now 😆 </p><p><a href="https://mastodon.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosting</span></a> <a href="https://mastodon.social/tags/pfSense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pfSense</span></a> <a href="https://mastodon.social/tags/HomeLab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HomeLab</span></a> <a href="https://mastodon.social/tags/DigitalSovereignty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSovereignty</span></a> <a href="https://mastodon.social/tags/InfraLife" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfraLife</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.social/tags/BuildInPublic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BuildInPublic</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a></p>
Paul Fenwick<p>My country is going through one of its very many fuck-with-the-internet phases.</p><p>I used to use <a href="https://cloudisland.nz/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> for a self-hosted VPN, and it worked pretty well. Is there anything in that landscape that has changed in the last five or so years? ❤️</p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/IPFire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPFire</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> Firewall Now Ships with Support for the <a href="https://fosstodon.org/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://fosstodon.org/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> Protocol </p><p><a href="https://9to5linux.com/ipfire-linux-firewall-now-ships-with-support-for-the-wireguard-vpn-protocol" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">9to5linux.com/ipfire-linux-fir</span><span class="invisible">ewall-now-ships-with-support-for-the-wireguard-vpn-protocol</span></a></p>
Blater<p><span class="h-card" translate="no"><a href="https://mastodon.social/@janvlug" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>janvlug</span></a></span> Hier gelukkig geen last van <a href="https://mastodon.blater.nl/tags/appdwang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appdwang</span></a>. De enige native apps naast de default apps van <a href="https://mastodon.blater.nl/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> zijn <a href="https://mastodon.blater.nl/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a>, <a href="https://mastodon.blater.nl/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> en <a href="https://mastodon.blater.nl/tags/OsmAnd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OsmAnd</span></a>. Kunnen ook vrij gemakkelijk buiten een reguliere appstore om worden binnengehaald. Banken en zelfs de communicatieapp met school (<a href="https://mastodon.blater.nl/tags/Parro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Parro</span></a>) zijn via de browser te gebruiken. Helaas werkt de laatste niet wanneer je bij de eerste benadering gstatic.com hebt geblokkeerd.</p>
0x0<p>Here's the customary <a href="https://hachyderm.io/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a>: i'm into <a href="https://hachyderm.io/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a> and tolerate C++ on a daily basis at work, i've also used others like java, kotlin, python, PHP, etc and am curious about <a href="https://hachyderm.io/tags/COBOL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>COBOL</span></a>, <a href="https://hachyderm.io/tags/AdaLanguage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdaLanguage</span></a> and <a href="https://hachyderm.io/tags/erlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>erlang</span></a>.</p><p>My dislike of jenkins is only surpassed by my hate of githubactions and everything MS-related. AI is not I, only A. I'm interested in <a href="https://hachyderm.io/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> stuff but atm that's a VPS with some sites, which doesn't really count. For now <a href="https://hachyderm.io/tags/syncthing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syncthing</span></a> is quite useful and <a href="https://hachyderm.io/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> is on the horizon once i reformat/reinstall my current <a href="https://hachyderm.io/tags/gentoo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gentoo</span></a> (i'll keep the root <a href="https://hachyderm.io/tags/ZFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFS</span></a> aproach and am on the fence regarding <a href="https://hachyderm.io/tags/XFCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XFCE</span></a> or <a href="https://hachyderm.io/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a>), would be interesting to have a barebones <a href="https://hachyderm.io/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a>/#QEMU running all the stuff and i digress.</p><p>kthxbai\0</p>
Gauff 🇪🇺<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@adingbatponder" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>adingbatponder</span></a></span> If possible, setup <a href="https://piaille.fr/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> yourself, there are some very good guides: <a href="https://docs.pi-hole.net/guides/vpn/wireguard/server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.pi-hole.net/guides/vpn/wi</span><span class="invisible">reguard/server/</span></a></p><p>If you really wish to use <a href="https://piaille.fr/tags/tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tailscale</span></a> , I believe they offer the feature to have a <a href="https://piaille.fr/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> , or <a href="https://piaille.fr/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> ?</p>
9to5Linux<p><a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> Weekly Roundup for June 29th, 2025: <a href="https://floss.social/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> 140 ESR, first look at <a href="https://floss.social/tags/GIMP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GIMP</span></a> 3.2, <a href="https://floss.social/tags/IPFire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPFire</span></a> gets <a href="https://floss.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> support, <a href="https://floss.social/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a> Plasma 6.4's first point release, Firefox 141 to use less memory on Linux, <a href="https://floss.social/tags/qBittorrent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>qBittorrent</span></a> 5.1.1, <a href="https://floss.social/tags/Clonezilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Clonezilla</span></a> Live 3.2.2-15, <a href="https://floss.social/tags/PipeWire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PipeWire</span></a> 1.4.6, <a href="https://floss.social/tags/GStreamer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GStreamer</span></a> 1.26.3, and more <a href="https://9to5linux.com/9to5linux-weekly-roundup-june-29th-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">9to5linux.com/9to5linux-weekly</span><span class="invisible">-roundup-june-29th-2025</span></a></p><p><a href="https://floss.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://floss.social/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
Henning<p><span class="h-card" translate="no"><a href="https://social.heise.de/@heisec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>heisec</span></a></span> </p><p>Für eigene Verbindungen die offizielle <a href="https://berlin.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> app verwenden. Alternativ evtl kleinere Projekte wie <a href="https://berlin.social/tags/WGTunnel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WGTunnel</span></a> <a href="https://github.com/zaneschepke/wgtunnel" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/zaneschepke/wgtunne</span><span class="invisible">l</span></a> oder <a href="https://berlin.social/tags/RethinkDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RethinkDNS</span></a> (was noch viel mehr kann). OpenVPN auch okay.</p><p>Alles andere ist Schwachsinn, Firmen sollen aufhören irgendwelche komischen proprietären Anwendungen zu nutzen.</p><p>Für verbesserte Privatsphäre <a href="https://berlin.social/tags/MullvadVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MullvadVPN</span></a> <a href="https://berlin.social/tags/AirVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AirVPN</span></a> <a href="https://berlin.social/tags/ProtonVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtonVPN</span></a> <a href="https://berlin.social/tags/IVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IVPN</span></a> und erstmal keine weiteren.</p><p>Für Anonymität <a href="https://berlin.social/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a>.</p><p><a href="https://berlin.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a>.s schleusen jeglichen Verkehr durch fremde Server!</p>
Linuxiac<p>IPFire 2.29 Core Update 195 open-source firewall is out, adding long-awaited WireGuard VPN support and easy-to-configure tunneling options.<br><a href="https://linuxiac.com/ipfire-2-29-core-update-195-firewall-brings-native-wireguard-support/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/ipfire-2-29-core-</span><span class="invisible">update-195-firewall-brings-native-wireguard-support/</span></a></p><p><a href="https://mastodon.social/tags/ipfire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipfire</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
Max<p>Sind hier auch VPN Experten? Ich habe auf einem VServer Wireguard-Easy laufen. Mit einem Router (RUTX50) und einem Client kann ich mich damit verbinden. Mit dem Client komm ich mit 10.8.0.2 auf die Weboberfläche vom Router. Wie komm ich jetzt auf die Geräte (Nas, Kamera,..) hinterm Router? </p><p><a href="https://afterspace.rocks/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> <a href="https://afterspace.rocks/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://afterspace.rocks/tags/Teltonika" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Teltonika</span></a> <a href="https://afterspace.rocks/tags/RUTX50" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RUTX50</span></a></p>
David Chisnall (*Now with 50% more sarcasm!*)<p>Sigh. Search for information about configuring <a href="https://infosec.exchange/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> on <a href="https://infosec.exchange/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a>. Second result on <a href="https://infosec.exchange/tags/DuckDuckGo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DuckDuckGo</span></a> is a slop web site, which initially looks plausible but then runs a bunch of configuration commands that don't exist on FreeBSD. It does make up plausible output from the FreeBSD equivalents of those commands though!</p><p>I wonder how much of the productivity gains of using GenAI are simply slightly offsetting the productivity loses that come from everyone else using it.</p>
Solène :flan_hacker:<p>Anyone in the room with experience setting up a <a href="https://bsd.network/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> tunnel (with wireguard-go) at boot on a Mac OS arm64 system? :flan_bored: </p><p>I can't get the damn thing to work :flan_on_fire: </p><p>This is for a friend, I do not use a Mac myself :flan_tea: </p><p>I wrote a plist file that start a script invoking wg-quick, I sent the output of `wg` in a log file at this time and the tunnel exists but there is no network, a ping does not work. </p><p>Starting the script again manually makes things ok :flan_shrug:</p>
ADMIN magazine<p>ADMIN Issue 87: Lightweight Kubernetes is available now! We compare the k0s, K3s, and MicroK8s distributions for environments operating under resource constraints. This month's DVD: <span class="h-card" translate="no"><a href="https://fosstodon.org/@almalinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>almalinux</span></a></span> 9.5 Minimal<br><a href="https://www.admin-magazine.com/Archive/2025/87?utm_source=mam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/Archive/202</span><span class="invisible">5/87?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kubernetes</span></a> <a href="https://hachyderm.io/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://hachyderm.io/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://hachyderm.io/tags/Coroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Coroot</span></a> <a href="https://hachyderm.io/tags/SystemRescue" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemRescue</span></a> <a href="https://hachyderm.io/tags/Netdata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netdata</span></a> <a href="https://hachyderm.io/tags/dockle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dockle</span></a> <a href="https://hachyderm.io/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://hachyderm.io/tags/IVRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IVRE</span></a> <a href="https://hachyderm.io/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a> <a href="https://hachyderm.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://hachyderm.io/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://hachyderm.io/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://hachyderm.io/tags/AIX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIX</span></a></p>
House Panther :verified_paw:<p><span class="h-card" translate="no"><a href="https://ottawa.place/@Dianora" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Dianora</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@stefano" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>stefano</span></a></span> Thanks! It’s a pretty good workaround. <a href="https://goblackcat.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> makes the entire thing easy as pie!</p>
House Panther :verified_paw:<p>I just have to say that I love <a href="https://goblackcat.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a>. It’s quite possibly the very best protocol out there for site-to-site VPN tunneling. It’s a snap to configure and I’ve found it to be very fast, sometimes close to provisioned bandwidth.</p>
matuzalem<p>I wanted a <a href="https://mastodon.bsd.cafe/tags/Wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireguard</span></a> GUI client for <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> and there wasn't none so I put this QT6 thing together last night.</p>
Mika<p>I need to <i>properly</i> learn what <a href="https://sakurajima.social/tags/Tailscale" rel="nofollow noopener" target="_blank">#Tailscale</a> is, cos I really have no idea why one would use it when <a href="https://sakurajima.social/tags/Wireguard" rel="nofollow noopener" target="_blank">#Wireguard</a> exists - which to my understanding, is also what Tailscale uses/is based on. As far as I'm aware, unlike Wireguard, Tailscale isn't a complete <a href="https://sakurajima.social/tags/FOSS" rel="nofollow noopener" target="_blank">#FOSS</a><span> package that you self-host and own, and it even requires an online account registration to use it.<br><br>I'm pretty sure people use it for free, but I'm not sure if it's not without any paid plans (now or in the future) seeing how you need to create an account with them. Seeing how easy and lightweight it is to deploy Wireguard yourself, and seeing how there's still some fiddling/deployment you need to do yourself on your own hardware to deploy Tailscale, I'm sure I'm missing something here that makes people recommend/use it.</span></p>
rvstaveren<p>👀 <a href="https://mastodon.online/tags/FritzBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FritzBox</span></a> update: Internet: Now <a href="https://mastodon.online/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> data can also be transmitted via a <a href="https://mastodon.online/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a>® VPN tunnel</p>