The company behind pfSense is shady as hell:
https://opnsense.org/opnsense-com/
Also the complete and utter clusterfuck of an attempt to bring Wireguard into the FreeBSD kernel:
The company behind pfSense is shady as hell:
https://opnsense.org/opnsense-com/
Also the complete and utter clusterfuck of an attempt to bring Wireguard into the FreeBSD kernel:
Sounds like an election during war time is a pretty fucking bad idea.
The 14th amendment in the US and the 1864 election happened in war time.
On a scale of 0 to 10, how likely were civilian areas to be hit by artillery shells and rockets during the civil war?
Hint: the maximum range of a cannon at that time was barely a mile.
Gnomes built-in RDP should work. There's also RustDesk which offers proper Wayland support.
What kind of ISP are you dealing with?
And maybe PPPoE.
traceroute --mtu 1.1.1.1
Pick the lowest value displayed for F=xxxx
like e.g F=1492
and subtract 80.
For my DSL connection the optimal value is 1412.
nonfree drivers accessible right away
Non-free firmware is included in the Debian installer since Bookworm.
Do you really know how Wireguard works?
Updating without a reboot only works for wireguard-go. The default implementation runs in the kernel. An update to it would require kernel live patching.
Wireguard doesn't answer to unsigned packets. Using obscure ports or even port knocking is rather pointless. It's indistinguishable from a closed port.
I'd rather take Casaos out of the equation and target Ubuntus' Wireguard stack instead.
Protocol ossification is a huge problem. That's one of the reasons why the IETF went with the UDP based QUIC for HTTP/3.
Shelter?
OpenOffice is a zombie at this point.