CumBroth

joined 1 year ago
[–] [email protected] 1 points 2 months ago* (last edited 2 months ago)

Gluetun likely doesn't have the proper firewall rules in place to enable this sort of traffic routing, simply because it's made for another use case (using the container's network stack directly with network_mode: "service:gluetun").

Try to first get this setup working with two vanilla Wireguard containers (instead of Wireguard + gluetun). If it does, you'll know that your Wireguard "server" container is properly set up. Then replace the second container that's acting as a VPN client with gluetun and run tcpdump again. You likely need to add a postrouting masquerade rule on the NAT table.

Here's my own working setup for reference.

Wireguard "server" container:

[Interface]
Address = <address>
ListenPort = 51820
PrivateKey = <privateKey>
PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
PostUp = wg set wg0 fwmark 51820
PostUp = ip -4 route add 0.0.0.0/0 via 172.22.0.101 table 51820
PostUp = ip -4 rule add not fwmark 51820 table 51820
PostUp = ip -4 rule add table main suppress_prefixlength 0
PostUp = ip route add 192.168.16.0/24 via 172.22.0.1
PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip route del 192.168.16.0/24 via 172.22.0.1

#peer configurations (clients) go here

and the Wireguard VPN client that I route traffic through:

# Based on my VPN provider's configuration + additional firewall rules to route traffic correctly
[Interface]
PrivateKey = <key>
Address = <address>
DNS = 192.168.16.81 # local Adguard
PostUp = iptables -t nat -A POSTROUTING -o wg+ -j MASQUERADE #Route traffic coming in from outside the container (host/other container)
PreDown = iptables -t nat -D POSTROUTING -o wg+ -j MASQUERADE

[Peer]
PublicKey = <key>
AllowedIPs = 0.0.0.0/0
Endpoint = <endpoint_IP>:51820

Note the NAT MASQUERADE rule.

[–] [email protected] 14 points 5 months ago* (last edited 5 months ago) (2 children)

Among other things: Cooking. They're really helpful in those situations where I have a bunch of ingredients lying around in my pantry but I lack concrete recipes that can make a proper meal out of them.

[–] [email protected] 3 points 5 months ago (1 children)

Not since I've started working from home.

[–] [email protected] 5 points 8 months ago* (last edited 8 months ago) (4 children)

test, spoiler testeueaouaoeuaoeuaoe

The syntax is a bit confusing. You need to leave the first "spoiler" untouched. You can delete the second "spoiler" to set the title, and then replace the three underscores ___ with your text:

"

my-title

my-text

"

Edit: Looks like most apps don't support this and this spoiler markdown only works in the browser.

[–] [email protected] 5 points 8 months ago (1 children)

Is... is this a Raphaël reference?

[–] [email protected] 1 points 8 months ago (1 children)

I set it up manually using this as a guide. It was a lot of work because I had to adapt it to my use case (not using a VPS), so I couldn't just follow the guide, but I learned a lot in the process and it works well.

[–] [email protected] 2 points 8 months ago

I've tried both this and https://github.com/jmorganca/ollama. I liked the latter a lot more; just can't remember why.

GUI for ollama is a separate project: https://github.com/ollama-webui/ollama-webui

[–] [email protected] 11 points 10 months ago* (last edited 10 months ago) (1 children)

I wish they would carry on the momentum and also finally support hardware keyboard shortcuts. This is the one thing that's killing Android tablets for me (I'm not willing to use a Chromium-based browser): https://connect.mozilla.org/t5/ideas/need-more-physical-keyboard-support-for-firefox-mobile-on/idi-p/3836

Issue is being tracked here: https://bugzilla.mozilla.org/show_bug.cgi?id=1794664

view more: next ›