toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

274
active users

#wireguard

4 posts4 participants0 posts today
David Chisnall (*Now with 50% more sarcasm!*)<p>Sigh. Search for information about configuring <a href="https://infosec.exchange/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> on <a href="https://infosec.exchange/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>. Second result on <a href="https://infosec.exchange/tags/DuckDuckGo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DuckDuckGo</span></a> is a slop web site, which initially looks plausible but then runs a bunch of configuration commands that don't exist on FreeBSD. It does make up plausible output from the FreeBSD equivalents of those commands though!</p><p>I wonder how much of the productivity gains of using GenAI are simply slightly offsetting the productivity loses that come from everyone else using it.</p>
Neil Brown<p>WG Tunnel - an Android client for WireGuard, with settings for auto / on-demand WireGuard tunnels - is rather impressive.</p><p>Available via F-Droid: <a href="https://f-droid.org/packages/com.zaneschepke.wireguardautotunnel/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">f-droid.org/packages/com.zanes</span><span class="invisible">chepke.wireguardautotunnel/</span></a></p><p><a href="https://mastodon.neilzone.co.uk/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> <a href="https://mastodon.neilzone.co.uk/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://mastodon.neilzone.co.uk/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a></p>
Solène :flan_hacker:<p>Anyone in the room with experience setting up a <a href="https://bsd.network/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> tunnel (with wireguard-go) at boot on a Mac OS arm64 system? :flan_bored: </p><p>I can't get the damn thing to work :flan_on_fire: </p><p>This is for a friend, I do not use a Mac myself :flan_tea: </p><p>I wrote a plist file that start a script invoking wg-quick, I sent the output of `wg` in a log file at this time and the tunnel exists but there is no network, a ping does not work. </p><p>Starting the script again manually makes things ok :flan_shrug:</p>
ADMIN magazine<p>ADMIN Issue 87: Lightweight Kubernetes is available now! We compare the k0s, K3s, and MicroK8s distributions for environments operating under resource constraints. This month's DVD: <span class="h-card" translate="no"><a href="https://fosstodon.org/@almalinux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>almalinux</span></a></span> 9.5 Minimal<br><a href="https://www.admin-magazine.com/Archive/2025/87?utm_source=mam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/Archive/202</span><span class="invisible">5/87?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubernetes</span></a> <a href="https://hachyderm.io/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://hachyderm.io/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://hachyderm.io/tags/Coroot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Coroot</span></a> <a href="https://hachyderm.io/tags/SystemRescue" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SystemRescue</span></a> <a href="https://hachyderm.io/tags/Netdata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netdata</span></a> <a href="https://hachyderm.io/tags/dockle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dockle</span></a> <a href="https://hachyderm.io/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> <a href="https://hachyderm.io/tags/IVRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IVRE</span></a> <a href="https://hachyderm.io/tags/Ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ansible</span></a> <a href="https://hachyderm.io/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://hachyderm.io/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://hachyderm.io/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://hachyderm.io/tags/AIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIX</span></a></p>
roughnecks<p>I intend to replace <a href="https://cyberplace.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a> (which I have running since a couple weeks at home) with <a href="https://cyberplace.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a> <a href="https://cyberplace.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>. Already did some tests with my VPS's wireguard setup and I was able to netcat "text" over the tunnel towards a termbin service running on the VPS, from a <a href="https://cyberplace.social/tags/WSL2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WSL2</span></a> <a href="https://cyberplace.social/tags/shell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shell</span></a> at home. Running a webserver would be the same exact thing as I'm currently doing with tailscale.. I just need to setup a local <a href="https://cyberplace.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> service first. The only thing is, I might need a second VM to not break existing setup</p>
House Panther :verified_paw:<p><span class="h-card" translate="no"><a href="https://ottawa.place/@Dianora" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Dianora</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@stefano" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>stefano</span></a></span> Thanks! It’s a pretty good workaround. <a href="https://goblackcat.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> makes the entire thing easy as pie!</p>
House Panther :verified_paw:<p>I just have to say that I love <a href="https://goblackcat.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>. It’s quite possibly the very best protocol out there for site-to-site VPN tunneling. It’s a snap to configure and I’ve found it to be very fast, sometimes close to provisioned bandwidth.</p>
matuzalem<p>I wanted a <a href="https://mastodon.bsd.cafe/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> GUI client for <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> and there wasn't none so I put this QT6 thing together last night.</p>
Mika<p>I need to <i>properly</i> learn what <a href="https://sakurajima.social/tags/Tailscale" rel="nofollow noopener noreferrer" target="_blank">#Tailscale</a> is, cos I really have no idea why one would use it when <a href="https://sakurajima.social/tags/Wireguard" rel="nofollow noopener noreferrer" target="_blank">#Wireguard</a> exists - which to my understanding, is also what Tailscale uses/is based on. As far as I'm aware, unlike Wireguard, Tailscale isn't a complete <a href="https://sakurajima.social/tags/FOSS" rel="nofollow noopener noreferrer" target="_blank">#FOSS</a><span> package that you self-host and own, and it even requires an online account registration to use it.<br><br>I'm pretty sure people use it for free, but I'm not sure if it's not without any paid plans (now or in the future) seeing how you need to create an account with them. Seeing how easy and lightweight it is to deploy Wireguard yourself, and seeing how there's still some fiddling/deployment you need to do yourself on your own hardware to deploy Tailscale, I'm sure I'm missing something here that makes people recommend/use it.</span></p>
rvstaveren<p>👀 <a href="https://mastodon.online/tags/FritzBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FritzBox</span></a> update: Internet: Now <a href="https://mastodon.online/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> data can also be transmitted via a <a href="https://mastodon.online/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a>® VPN tunnel</p>
Tailscale<p>🕸️ Our “How Tailscale Works” blog lifts the hood on our WireGuard-powered mesh network. It’s a full bottom-to-top tour of Tailscale’s architecture – so you don’t have to build your own (we open-sourced the tough parts!). Dive in: <a href="https://tailscale.com/blog/how-tailscale-works" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tailscale.com/blog/how-tailsca</span><span class="invisible">le-works</span></a> </p><p><a href="https://hachyderm.io/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://hachyderm.io/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> <a href="https://hachyderm.io/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
Jonathan Kamens 86 47<p>I use the <a href="https://federate.social/tags/Blokada" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blokada</span></a> <a href="https://federate.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://federate.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> on 5 devices: 4 <a href="https://federate.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> boxes and an Android phone.<br>This morning, internet on two of the Linux boxes crapped out when connected to the VPN. TCP connections were taking ridiculously long or hanging completely. For example, I saw "time curl --silent <a href="https://cnn.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cnn.com/</span><span class="invisible"></span></a>" take over a minute with the VPN connected vs. a fraction of a second without. Disconnecting and reconnecting to the VPN didn't help. Neither did rebooting.<br>(continued)</p>
Josh<p>Can someone loan me some energy/motivation to set up a Wireguard server?</p><p><a href="https://dotnet.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://dotnet.social/tags/SelfHosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosted</span></a> <a href="https://dotnet.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosting</span></a></p>
David<p><span class="h-card" translate="no"><a href="https://beige.party/@Hedgewizard" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Hedgewizard</span></a></span> Learn to use <a href="https://infosec.exchange/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a>. Set up a Wireguard VPN on <a href="https://infosec.exchange/tags/OPNsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPNsense</span></a> or <a href="https://infosec.exchange/tags/OpenWrt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenWrt</span></a> on a small compatible network appliance (or a repurposed small PC with an extra network interface card) inside your house. Install and set up the Wireguard app on your mobile devices. </p><p>There are some good tutorials on YouTube. Don't rely on the first one; takes notes on a few and compare. If you encounter unfamiliar concepts or vocabulary (such as stuff related to networking or cryptography), take note of where you left off, and find a tutorial playlist on those topics. Then get back to the OPNsense or OpenWrt tutorial, and then the Wireguard tutorial.</p>
udo m. rader ☕ 🇪🇺 🇺🇦 🐧<p>A whole day wasted chasing a ghost</p><p>The image below shows the status of some <a href="https://sigmoid.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> connections in <a href="https://sigmoid.social/tags/OPNsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPNsense</span></a>. Make a guess: what does the red x symbol in the image mean?</p><p>For me, it was an indication that something was wrong with this peer. So I started digging - all to no avail.</p><p>At the end of the day, it turns out that the red x just means that the connection has not yet been established due to a lack of traffic.</p><p>As soon as I generated some traffic, the color changed from red to green ...</p>
Jonathan Kamens 86 47<p>Sysadmin journal: setting up wireguard on all of my Linux&nbsp;desktops</p><p>I had to hack together a few things to use wireguard transparently on my Android phone and all of my Linux laptops and desktop.<br><a href="https://federate.social/tags/ddclient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddclient</span></a> <a href="https://federate.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://federate.social/tags/NetworkManager" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkManager</span></a> <a href="https://federate.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://federate.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://federate.social/tags/Ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ansible</span></a> <a href="https://federate.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a><br><a href="https://blog.kamens.us/2025/05/10/sysadmin-journal-setting-up-wireguard-on-all-of-my-linux-desktops/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.kamens.us/2025/05/10/sysa</span><span class="invisible">dmin-journal-setting-up-wireguard-on-all-of-my-linux-desktops/</span></a></p>
Linux Renaissance<p><strong>How To Configure A Site-To-Site Wireguard Tunnel With OPNsense</strong></p> <p><a href="https://video.fosshq.org/w/6bk9Pe8u2mF4JVrvsn4kyc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">video.fosshq.org/w/6bk9Pe8u2mF</span><span class="invisible">4JVrvsn4kyc</span></a></p>
T_X<p><span class="h-card" translate="no"><a href="https://vt.social/@lina" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lina</span></a></span> we had a 1476 bytes MTU on the PPPoE interface. I would have expected a 1396 bytes MTU on the <a href="https://chaos.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> tunnel interface, but ping's with various sizes showed it had to be 1392 instead. Does that make sense, would the padding explain that?</p>
T_X<p><span class="h-card" translate="no"><a href="https://vt.social/@lina" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lina</span></a></span> oh, wait, that could finally explain why I had to set a different <a href="https://chaos.social/tags/MTU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MTU</span></a> than what I had calculated/expected for <a href="https://chaos.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> tunnel for <a href="https://chaos.social/tags/dn42" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dn42</span></a> behind a PPPoE host...</p>
Adrian Dymorz<p>Ich habe gerade erfolgreich mit <a href="https://mastodon.peaceful.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> ein <a href="https://mastodon.peaceful.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> zwischen zwei Geräten (Mobiler PC mit <a href="https://mastodon.peaceful.social/tags/LinuxMint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxMint</span></a> und <a href="https://mastodon.peaceful.social/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a>) und dem Heim-Netzwerk über eine <a href="https://mastodon.peaceful.social/tags/FritzBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FritzBox</span></a> eingerichtet. Das ganze hat weniger als 15 Minuten gedauert.</p><p>Netzwerkverkehr läuft über <a href="https://mastodon.peaceful.social/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> und <a href="https://mastodon.peaceful.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>.</p><p>Das fühlt sich gerade ein bisschen zu gut an um wahr zu sein.</p>