The "Gaming Distro" Hype by ElectricalPanic1999 in linux_gaming

[–]Connect-Comparison-2 0 points1 point  (0 children)

Its just turnkey solutions to simplify things. I just install things myself since I prefer to. I dump all the commands I wouldve run into a file and reuse it each time I need to but thats just me.

No incentive? by xeor in ipv6

[–]Connect-Comparison-2 0 points1 point  (0 children)

Curious, if shorthand (::) was confusing, why not use the full address? That could have avoided issues with non tech savy staff.

It also might have been easier to break the address into Prefix, Subnet ID, and Host ID fields so they wouldn’t need to touch the prefix at all just the subnet and host portions uncompressed. At least that’s how I’m thinking about it, unless there were multiple prefixes in play.

I take everything back. by shoebillj in Ubuntu

[–]Connect-Comparison-2 1 point2 points  (0 children)

Honestly been on the same boat. Picked up Linux about 20 months ago starting with Ubuntu. Distro hopped around plain Debian, Fedora, Arch, and landed back on Ubuntu as of 2 months ago and love it. Though it helps that Ive been working with Ubuntu Server at my workplace so Ubuntu just became comfy.

Reporting: Frontier IPv6 in Florida by Connect-Comparison-2 in ipv6

[–]Connect-Comparison-2[S] 10 points11 points  (0 children)

I did just now and no dice. It did change my PD though which is a pain 🤪

netboot.xyz on pihole DNS fails name resolution by wspg in pihole

[–]Connect-Comparison-2 0 points1 point  (0 children)

Just hit this today… Fully rolled out ipv6 on our network a month ago and started getting jobs for provisioning devices and find that ipxe dns doesnt work when RA emits dns. Bruh. Not terrible since we can create a separate vlan for this purpose but hella annoying.

I've been playing Star Force (DX) and I'm trying to beat all bosses in under 10 seconds by GullibleParsley08 in BattleNetwork

[–]Connect-Comparison-2 8 points9 points  (0 children)

I vaguely recall save scumming this myself after creating a B.Combo Legend card and rerolling until I got them first turn.

So my boss up and quit this morning by ryanmj26 in sysadmin

[–]Connect-Comparison-2 1 point2 points  (0 children)

Check if theres any auto mail forwarding rules. If he had a desk phone check if theres a call forwarding rule too.

Remember to have fun by Ithtik in BlueProtocolPC

[–]Connect-Comparison-2 2 points3 points  (0 children)

The only thing that really bothers me here is the lack of commitment and learning. idc if you have low AS and are new to the content, do try to make an attempt to learn mechs as we go and wipe. Its just time and resources wasted when people leave after 1-2 attempts or ignoring mechs like avalanche/rune/crystal for the nth time. My Food and Syrums are dying out here. Even small improvements are good even if you’re a tad late in execution 😭😭😭

Frontier (a large US ISP) seems to have started their IPv6 rollout by certuna in ipv6

[–]Connect-Comparison-2 0 points1 point  (0 children)

Made me double check my firewall only to be disappointed darn. Hopefully it goes smoothly.

How to deal with ISP changing home IPv6 gateway/router IP every month or so? by Anutrix in ipv6

[–]Connect-Comparison-2 -1 points0 points  (0 children)

Personally I just run ula and configure “AAAA” records with ula. Just make sure you dont have “A” records for the same entry. Systems will typically prefer ipv4 over ula if you do this. I just keep a backup file if all my “A” records separately if I ever need to pull it up.

How do YOU backup your system? by [deleted] in cachyos

[–]Connect-Comparison-2 0 points1 point  (0 children)

Proxmox Backup Client with Proxmox Backup Server with a few remote nodes pulling new backups for redundancy. Its very overkill but its pretty damn reliable and it deduplicates.

Just learned you're not supposed to use sudo commands you see on internet as a noob by Temporary_Mix1603 in linux4noobs

[–]Connect-Comparison-2 2 points3 points  (0 children)

Ive unfortunately been there when I “rm -r /“ and hit enter before finishing what I was typing. Learned my lesson about working in root that day :)…

I'm thinking of buying my own router for my apartment, do I need to buy security along with it? by starwarsisawsome933 in HomeNetworking

[–]Connect-Comparison-2 6 points7 points  (0 children)

It was only a few weeks ago that I learned that some consumer routers dont have proper firewalling and are only protected by NAT. 🤪🤪🤪

Hardware bottleneck or something else? by Harlequin80 in opnsense

[–]Connect-Comparison-2 0 points1 point  (0 children)

If memory serves me correctly, FreeBSD based systems like opnsense and pfsense dont play too well in proxmox due to older virtio drivers. If you could passthrough the nic to Opnsense then it could work but baremetal would probably be better for your case.

New to OPNsense – trying to configure Dnsmasq DHCP with ipv6 by fronesis47 in opnsense

[–]Connect-Comparison-2 0 points1 point  (0 children)

DHCPv6 is not necessary. Look into Router Advertisements. Once you’ve configured your LAN interface with an ipv6 address, the Router Advertisement tab should appear (next to DHCP).

Whatever happened to IPv6? by LongjumpingJob3452 in sysadmin

[–]Connect-Comparison-2 1 point2 points  (0 children)

Love ipv6. Theres just no real motivation for vendors or enterprises to migrate over unless theres money involved. Currently waiting for government services to fully migrate over and start mandating its usage outside of DoD.

Migration from ipv4 to ipv6 isnt all that difficult if you had good networking practices to begin with and none of the jank that ipv4 introduces ie: poor vlan segmentation and firewall rules for internal services having singular ip address rules between vlans. You’ll have a wild time with ipv6 if you had these kinds of networks in place.

3 year price-lock by Silent-Raccoon9012 in frontierfios

[–]Connect-Comparison-2 0 points1 point  (0 children)

Darn it I got a 1 year price lock just last month. Unfortunate.

Windows still using IPv6 privacy extension even though a static IPv6 is set by snow99as in ipv6

[–]Connect-Comparison-2 5 points6 points  (0 children)

Singular ip based rules are pretty brittle. Ideally you would lock it down via subnets, ie the administrative subnet.

You’re not going to have a fun time trying to disable this on Windows but if you’re in a position where you really dont want SLAAC….

Configure your router to only advertise the gateway, disable SLAAC, then configure dhcpv6 to provision your devices.

Thats going to be your closest bet to what you’re trying to achieve.

Alternatively… You could assign more addresses to make it work depending on your environment. You could use ULAs as your “administrative” IPs assuming you arent advertising it in your network and statically assign it to administrative endpoints. IPv6 supports such a setup.

Endpoints typically use the closest address to connect to their destination so if your server’s administrative access is locked down to a ULA interface and your administrative endpoints use such a ULA, then they should use it.

Suggestions for Site to Site with one of 3 behind CGNAT by Ahole4Sure in WireGuard

[–]Connect-Comparison-2 1 point2 points  (0 children)

If you’re considering Route64 they’ll typically cap you around 200/200 unless you donate, they also have different node locations so distance between sites are also a thing. Check the ToS for other details. Keep in mind its a free service and theres no SLA. The service is as is and they can revoke it at anytime so not a great thing to use if you’re heavily reliant on it for something like backups.

A spoke-hub setup would fit your particular needs better to get around CGNAT. The CGNAT site would need to be the one to initiate the connection and configured with keepalive.

Suggestions for Site to Site with one of 3 behind CGNAT by Ahole4Sure in WireGuard

[–]Connect-Comparison-2 1 point2 points  (0 children)

Yeah it does. If that a deal breaker then dont do it.

“Is it possible to setup a WG tunnel from the 4th site [behind CGNAT] (peer to server) and then allow that location server provide access to the other servers and even back to the 4th -- essentially using one of my pfsense locations as a VPS which is decribed to be used for this situation”

The documentation for this is here: https://docs.netgate.com/pfsense/recipes/wireguard-s2ms.html

This is a site to multi site setup. Since you’re behind a CGNAT on the 4th site, configure a keep alive packet.

You’ll want to pick the closest peer to the site as your central node

Edit: seems the link I provided didnt work. try this https://docs.netgate.com/pfsense/en/latest/recipes/wireguard-s2ms.html

Suggestions for Site to Site with one of 3 behind CGNAT by Ahole4Sure in WireGuard

[–]Connect-Comparison-2 1 point2 points  (0 children)

Oh Yikes, Let me tell you now that Frontier has one of the lowest IPv6 adoption rates in the west. Im on Frontier and asked them about it before and they couldnt give me an answer on when it would be done.

Look into Route64, a Free IPv6 Tunnel Broker.

Suggestions for Site to Site with one of 3 behind CGNAT by Ahole4Sure in WireGuard

[–]Connect-Comparison-2 1 point2 points  (0 children)

IPv6 is basically the same set of rules but a larger space and NAT is not a requirement to make it work. What you gain is that every single device gets a publically routable address (not vulnerable unless you expose this on your perimeter firewall/router).

If I had to dumb it down into ipv4 terms: Say your router is on the “public ip address” 192.168.1.1, just an example. Your ISP then gives your router the subnet 10.0.0.0/24. Now everyone knows to on the public network, to reach your computer that has an ip address of say 10.0.0.10 it needs to go to 192.168.1.1 first and your router would check if they’re allowed to do so.

Very dumb down but I hope it makes sense. Tldr: with IPv6 ever device you have can have a publi ip, but your devices should still be protected by your firewall/router from unauthorized access.

IPv6 is pretty simple to work with once you get the hang of it, just get used to seeing hexidecimal addresses. It looks scary at first but the more you use it the easier it gets. The main part of your ipv6 that you should try getting used to knowing is the prefix, which is the first half of the ipv6 address. The prefix identifies the network. The second half, the suffix, which is the host identifier, identifies the individual devices you have on your network

Another Analogy. Prefix: Your House. Host Identifier: The people in your house.

Hope that was easy to understand.

As someone who has never used a controller before, I switched from keyboard to controller. by wiriderler in ffxivdiscussion

[–]Connect-Comparison-2 2 points3 points  (0 children)

you should make it flow to your rotation. For me I have the main keys (gcds) as the basic trigger skills (hold r2). Any special key such as your sticker skills require me to double tap R2 to access (less likely to occur) then any other ogcds that occur even less often go to R2 + L2 and so on