andscape

joined 1 year ago
[–] [email protected] 3 points 2 weeks ago

Look at the very least you should write in the blogpost clearly which parts are generated by LLMs, so your readers can decide whether to trust them.

[–] [email protected] 4 points 2 weeks ago (3 children)

Idk man, it seems pretty irresponsible to me to write a blogpost with stuff that you got from ChatGPT without understanding it. People will assume that if you wrote a blogpost on this then you know what you're doing. ChatGPT gets stuff wrong all the time, and we're talking about firewall configuration here. If it misconfigured some stuff it could leave you and your readers vulnerable to all kinds of shit.

In this case it seems to me that (luckily) there's just a bunch of redundant routing, but the next time it could be leaking your and your readers' torrent traffic out of the VPN tunnel, leaving you vulnerable to legal repercussions for piracy.

Please don't authoritatively post stuff that you got from the automatic bullshit generator without understanding it.

[–] [email protected] 3 points 2 weeks ago (2 children)

Nice, I recently went through the same struggle of setting up this configuration based on that LinuxServer post. My main nitpick on this is that automating the ip route configuration for the qBittorrent container is a pretty important step which is not explained in the post. Leaving any manual steps in any Docker setup is pretty bad practice.

Since you're using LinuxServer's QBT image a good way to do this is to make use of their standard custom init scripts. You can just mount a script with the ip route commands to /custom-cont-init.d/my-routes.sh:ro on the container and it will be run automatically on each startup.

Another nitpick is that the PostDown commands in the wireguard configs are useless since you're running them in Docker.

[–] [email protected] 1 points 1 month ago

Fantastic, thank you

[–] [email protected] 1 points 1 month ago (2 children)

Wow thank you, this is the most useful reply I've received so far!

This means I don't need to mess around with QBT's "proxy" settings? I was pretty confused since the only options available are SOCKS/SOCKS5 and HTTP, but I'm guessing that's a different kind of proxy than what I need...

[–] [email protected] 1 points 1 month ago

I indeed have a domain name pointing to the VPS IP, with Caddy managing TLS. Other apps are exposed this way, and I will do the same for the qBittorrent WebUI as well. I like having Caddy as a single gateway where I can apply security configs and monitor all traffic, I was hoping I would be able to pass torrent traffic through it as well but everybody seems very much against it.

I already have wireguard setup as you describe so I guess I'll just give up on passing torrent traffic through the proxies and just open a localhost port on the qBittorrent container...

[–] [email protected] -1 points 1 month ago (1 children)

Resetting the "time since last being told I don't know shit on the internet" back to 0 once again...

I already have an existing and working setup used for other apps, it's close to the one described in this blogpost. Yes, it's complicated and inefficient, but it has reasons to be. I want to keep my qBittorrent configuration as close to this setup as reasonably possible for consistency. If your point is that it's counterproductive to follow this setup then... fair enough. I can just route traffic from the VPS to an exposed port on the local qBittorrent container over Wireguard, but that wasn't my preferred solution.

Running a torrent client through a proxy doesn’t isolated a process.

I was talking about network isolation, not process isolation.

make sure your traffic is routing there properly

That was pretty much what I was asking for help with.

[–] [email protected] 0 points 1 month ago (1 children)

I have already set up all of that. My setup is similar to the one in this blogpost and it's already working for various apps that only use HTTP. What I'm trying to do is to also route BitTorrent traffic (TCP/UDP) over the same setup without opening up entirely new paths.

[–] [email protected] 2 points 1 month ago (3 children)

Yes I already have that set up with Wireguard, what I'm figuring out is how to route traffic through it.

[–] [email protected] 1 points 1 month ago (3 children)

I'm guessing what you mean is setting up port forwarding in Wireguard...

The thing is ideally I would want all connections in and out of my homeserver's Docker network to go through the local Caddy proxy, so the app containers are isolated. That still means having at least the local Caddy acting as a TCP proxy, even if the VPS Caddy is bypassed. If that's too much of a hassle though I can instead just expose a port on the qBittorrent container directly to the homeserver's localhost, and forward that with wireguard to the VPS.

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago) (4 children)

By "set up wireguard to route through the VPS" you mean having wireguard forward a port from the VPS to a port on the homeserver at its wireguard IP address?

qBittorrent will still need to publish the right IP address to peers though, right? So I will need to configure the proxy VPS's IP address in qBittorrent...

Also that means binding a port on the qBittorrent container directly to the homeserver localhost. I've managed to keep the app containers isolated so far and it'd be nice to keep that, but if proxying the traffic is too annoying I guess I can just say fuck it and go with it.

 

I'm setting up a self-hosted stack with a bunch of services running on a home device. I'm also tunneling all the traffic through a VPS in order to expose the services without exposing my home IP or opening ports on my local network. Currently all my traffic is HTTP, and its path looks like this:

  • Caddy proxy on remote VPS (HTTPS, :80 & :443)
  • Wireguard tunnel
  • Caddy proxy in Docker on homeserver (HTTP, :80)
  • app containers in separate isolated subnets, shared with Caddy

I want to set up qBittorrent and other torrent apps, and I want all their traffic to pass through the proxies. Proxying traffic to the WebUI is easy, there's plenty of tutorials; what I'm struggling with is proxying the torrent leeching and seeding traffic, which is the most important part since I live in a country that's not cool with piracy.

Unless I'm misunderstanding, BitTorrent traffic is TCP or UDP, so I'd need Caddy to act as a Layer 4 proxy. There's a community-maintained plugin that should support this. How would I configure it though? Do I need both instances to listen on a new port? Or can I open a new port on the VPS only, and forward traffic to the homeserver Caddy over the same port as the HTTP traffic (:80)? Are there nuances in proxying TCP traffic that I should be aware of?

[–] [email protected] 7 points 3 months ago (1 children)

Wild ass comment.

Unless you really really need portability between devices

Who doesn't??? What do you do, copy 20-char randomly generated passwords manually all the time? That's the whole point of password managers...

I use firefox's local, inbuilt manager

Browsers are NOT a secure storage for sensitive data, if you want a local password manager at least please use KeePassXC.

 

I'm involved with an org that needs to set up a public wishlist for supplies for a project. The rough requirements are as follows:

  • Public webpage with a static URL
  • Can be easily edited by non-technical people
  • Editing requires authentication
  • Avoiding corporate services, especially avoiding tracking of both users and admins
  • As cheap as reasonably possible
  • As quick to set up as possible

Nice to have:

  • Hosted under a custom domain
  • Supports users "reserving" items so multiple people don't all supply the same stuff

One option I considered would be running something like wishthis in a VPS under our own domain, but this is kinda expensive, complex, and I don't trust wishthis' auth. A different option could be just having a static page in something like Notion or Github pages, which would be free but relies on corporate services we don't trust.

Is there a middle ground between the two previous options? Or a better solution that fits most of the requirements?

 

With debate raging in the Fedi about Threads' federation, I was having a discussion with another user about the recently implemented instance blocks. They pointed out that, blocking an instance simply hides their content from your feed but doesn't prevent your posts from being sent to them. Firstly, is this correct? Is this how instance blocks are implemented in Lemmy? If not, has this been discussed before? I couldn't find such a discussion in Github issues...

It seems that many people have concerns about Meta's use of their data, and would like to opt out of sharing their content with Threads. Is there any way to do this in Lemmy right now, or any plan to implement such a feature?

 

I'm looking for a way to keep track my recurring subscriptions. I just want a nice overview of recurring payments and where they come from, I don't need a solution to actively go and manage the subscriptions for me. Unfortunately my bank, despite being a trendy digital bank, does not have a good built-in tool for this.

There's a plethora of third party services I found for this (Truebill, TrackMySubs, Hiatus, etc.) but they require you to give them unrestricted access to your bank account activity which seems like a privacy nightmare. I've also found some less invasive apps, such as Subby for Android, but they're basically just nice views over manually entered data. The ones I've found also seem to be single-platform only: even if you can sync your data (not always the case) you can then only view it from the app on the same platform.

Do you have a good solution for this? Something that's a middle ground between giving your entire payment history to some random company and a good-looking local-only spreadsheet?

 

I wrote this post for a friend, I'm sharing it here for anybody it might help. I got asked multiple times how I download cracked music software so I figured it'd be easier to write it down once. It's meant for people with very low technical skills who just want to start torrenting software without major risks, and it includes a bunch of safety tips that are already known in this community.

If you have feedback, let me know and I'll update the post.

view more: next ›