You could self host a web client
To clarify off your title, are you saying that Poland, a NATO member state, has troops on ground in Russia engaged in combat against Russia?
Well the internet down scenario has only happened once, and I returned home to no internet, booted up my laptop, and could not connect to any of my services since I couldn’t reach my control server. I haven’t forced the issue to occur by disconnecting my internet and testing connectivity. I just did the lazy thing and connected to the services I wanted via their IPv4 address
you’re almost certainly routing local network traffic over NetBird instead of using local routes
That’s precisely the functionality I want, though. Secure, encrypted, mutually identified traffic should be the only traffic in a zero trust network.
I’m simply trying to create an ingress point into this network for outside access.
Thanks for your response! I’m completely self-taught, so I’ll go ahead and acknowledge knowledge gaps on my end, but how would putting all the nodes in a network cause routing problems or ARP poisoning?
I recognize that what I’m trying to accomplish is a bit overkill for the average home network, and a lot of my reasoning behind my design is purely for learning. My reasoning for putting everything on a mesh network is 2-fold:
I have successfully run this setup previously with the NetBird management console hosted in a VPS, however the issue I ran into was that if internet went down at home, I could no longer access my locally hosted services through the mesh network. I could still access them via IP, since I was on the same LAN, but that defeats my goal of centralized control, mDNS, and a central source of truth that I got via the mesh network.
I have also successfully ran this setup completely local, however I am unable to access it from outside my homelab. For my use case, I think having all components of the mesh network hosted within my homelab is the best design. However now I have to figure out the best way to allow external connections to my management interface. Thus my original question should I use a cloudflare tunnel to my management interface, set up a wireguard tunnel from an externally accessible VPS service pointed to my management interface, or something different?
Ahh gotcha, that makes sense, so like the difference between a self signed SSL certificate and something like LetsEncrypt.
Re 2: I was thinking in the scenario to allow auto discovery of your certificate, so someone who is emailing you for the first time could look up your public key automatically and use it to encrypt their email.
Also, great writeup and thank you!
Any recommendations on a FOSS MDM?
Question 1: What’s the point of using Actalis? Can’t you generate your own certificate?
Question 2: Is there a way to get your email.server to automatically publish your public key?
You have backups?
Just trying to keep abreast of the latest ornithological news
- 1 eggplant, cubed
- 1/2 onion, diced
- garlic, a lot, minced
- mushrooms, various, diced
- bok choy, diced
- kimchee, your favorite brand
- gochujang Korean hot sauce, a lot
- stock (vegetable, chicken, fish, whatever you prefer)
Sauté everything in a big pot until nicely browned, add stock until covered, add in gochujang to taste, and simmer until thick. Serve over rice.
Based off the fuzziness of the video feed as it approaches the helicopter, is it safe to assume the Russians are using some sort of barrage jamming to try to mitigate drone attacks? Although that shouldn’t prevent the drone itself from transmitting video back to the controller.
Paris is Burning is the first queer movie I ever watched, definitely still recommended
The tutorial series by DivRhino was really helpful for me – https://divrhino.com/articles/rest-api-docker-go-fiber-from-scratch – she has several tutorials that build on each other.
Why is there a dunkin donuts app?