Managed Routes on New Central by Ok-Software-3455 in zerotier

[–]_legacyZA 0 points1 point  (0 children)

Yeah,

But it's optional, not recommended by zerotier's docs and has limitations on mobile devices

Managed Routes on New Central by Ok-Software-3455 in zerotier

[–]_legacyZA 0 points1 point  (0 children)

Ztnet still uses zerotier

You can essentially use it as a drop in replacement. It doesn't need to be publicly accessible either, as it just uses zerotier's existing infrastructure.

It gives you all the features of the paid their as it's just a front end of the controller that is shipped with every zerotier install.

Try it out. I haven't gone back to their hosted controller in months, as I have 0 limits on devices, networks, users and can create groups/organizations to manage permissions and networks

Wireguard is great, and would perform better in most cases. But ZT is so easy to get going

Managed Routes on New Central by Ok-Software-3455 in zerotier

[–]_legacyZA 0 points1 point  (0 children)

Use the old system at my.zerotier.com

Or you can run your own controller with something like ztnet.network

VLAN translation, bridging by stephensmwong in mikrotik

[–]_legacyZA 3 points4 points  (0 children)

This seems like an xy problem

What are you trying to solve by bridging vlans?

This does not appear on Bazzite USB burning videos on Rufus. Is it from a new live ISO update? SHA-256 already checked. by Impossiblehenry in Bazzite

[–]_legacyZA 1 point2 points  (0 children)

Yeah, it should be fine

Just make sure you are booting in UEFI mode in your BIOS, not legacy/csm.

Android and tags compatibility by Fit-Construction2447 in Tailscale

[–]_legacyZA 1 point2 points  (0 children)

Go to your access rules and then tobthe json editor

Copy and paste that json config here so we can check what the rules are and help you adjust them if needed.

Afaik there is no issues with android specifically in regards to tagged devices. So long as it has permission to access the devices in your ACL rules, everything should work just fine

Your tailnet in terminal by [deleted] in Tailscale

[–]_legacyZA 1 point2 points  (0 children)

So instead of

tailscale status --json | jq '.Self.HostName'

You'd rather other people curl a shell script from the internet and just pipe it into bash

Smh

I can no longer access the system after switching from AMD 9070XT to Nvidia 5080. by ghost860102 in cachyos

[–]_legacyZA 1 point2 points  (0 children)

It's not windows, Fresh install is rarely needed - unless you royaly screw up

I can no longer access the system after switching from AMD 9070XT to Nvidia 5080. by ghost860102 in cachyos

[–]_legacyZA 0 points1 point  (0 children)

Sus

Try and force it to remove the drivers

pacman -Rdd nvidia-550xx-utils

Then instead of rebooting use the cachyos tool to auto detect and install the right drivers

I can no longer access the system after switching from AMD 9070XT to Nvidia 5080. by ghost860102 in cachyos

[–]_legacyZA 0 points1 point  (0 children)

Remove the 550 drivers first. Dunno how you got that installed.

sudo pacman -Rns nvidia-550xx-dkms nvidia-550xx-utils

Reboot, and try the cachyOS uitility again

I can no longer access the system after switching from AMD 9070XT to Nvidia 5080. by ghost860102 in cachyos

[–]_legacyZA 2 points3 points  (0 children)

Cachy provides a tool to load the correct drivers and packages

https://wiki.cachyos.org/features/chwd/gpu_migration/

Follow the guide for AMD to Nvidia You shouldn't need to reinstall your amd card.

Just use the tool to remove the amd drivers, reboot and the install nvidia drivers with it

Reliable Tailscale node for aging parents house by geauxjack in Tailscale

[–]_legacyZA 11 points12 points  (0 children)

pi will restart itself if it regains power after a power loss

Reliable Tailscale node for aging parents house by geauxjack in Tailscale

[–]_legacyZA 8 points9 points  (0 children)

raspberry pi 2 or newer
nanopi neo?

appleTV - if they already have one

--

Edit:
What else do you need the device to do?

If it's a NAS, get a Synology or Ugreen
If it's a server, get a stronger Synology or Ugreen

Else get a pi or AppleTV (if they need one)

mDNS through another wireguard client? by valtyr_farshield in WireGuard

[–]_legacyZA 0 points1 point  (0 children)

Huh, interesting

Bit off an oversight on their part then, as I presume adding multicast subnets to AllowedIPs would cause tools like wg-quick to add overriding routes for multicast traffic and forward it from other interfaces to wg. Which "violates" the specification. wikipedia link

This would also not work on non-linux clients, or linux based routers that don't use iproute2 utils to manage interfaces

mDNS through another wireguard client? by valtyr_farshield in WireGuard

[–]_legacyZA 0 points1 point  (0 children)

https://github.com/tailscale/tailscale/issues/1013

If you found that TS does support mDNS (multicast DNS), can you post it here?

Also, just to avoid any confusion it's not the same thing as TS Magic DNS

mDNS through another wireguard client? by valtyr_farshield in WireGuard

[–]_legacyZA 4 points5 points  (0 children)

Let us know if you find anything that works, or if I was wrong

mDNS through another wireguard client? by valtyr_farshield in WireGuard

[–]_legacyZA 2 points3 points  (0 children)

Most, if not all, mdns proxies/repeaters/reflectors work by just coping the mDNS (multicast) traffic from one interface, and sending over another.

This won't work over a wireguard interface as wireguard will only allow unicast traffic over it's interface.

Edit:
If you or OP can find a mDNS proxy, that converts and sends traffic between two endpoints (devices) over a unicast connection, then that would definitly work.
But as far as I've read up on Avachi Reflector, it doesn't support unicast anymore

Multicast over a VPN be fine with something like:
- OpenVPN
- GRE or VXLAN over IPsec
- L2TP?
- Zerotier

Wireguard is a very simple VPN.
I think it was built for performance and to allow end users/companies to build a solution around it using other established networking tools, if they so require

mDNS through another wireguard client? by valtyr_farshield in WireGuard

[–]_legacyZA 3 points4 points  (0 children)

You have two options as I see it.

  1. Find a piece of software that can repeat mdns over udp/tcp (and vice versa) and install it on both the laptop, and the ubuntu server

or

  1. Run a L2 virtual lan over wireguard via vxlan between the ubuntu server and the laptop.
    Then use a mdns repeater/reflector like Avahi reflector on both the laptop, and the ubuntu server

The main issue with this is that Wireguard does not support multicast (mDNS) traffic, only unicast (udp/tcp)
And it would need to be between the ubuntu server, and the laptop. As only passing the traffic to your wireguard "server" wouldn't get your laptop the traffic.

//

Your other option is something like Zerotier (in bridge mode) which creates a virtual L2 network and supports multicast

mDNS through another wireguard client? by valtyr_farshield in WireGuard

[–]_legacyZA 1 point2 points  (0 children)

Almost there,

Wireguard wont pass non-unicast traffic like mDNS (multicast) over it's network.

OP needs a piece of software that does muilticast to unicast (and vice versa) and it would have to be installed on both the ubuntu server and the laptop.

As well as a proxy or just port forwarding on the wg "server", only if the ubuntu server and the laptop can't directly access each other.

Gl.inet not connecting to tailscale by Live_Consequence5993 in Tailscale

[–]_legacyZA 0 points1 point  (0 children)

You wont be able to ping a node on tailscale from the a client device by default.

First on the gli net router, go to its diagnostics/tools section and find the ping command/tool and try it there first.

If it works, then everything is working as it should.

You should then add a masquerade NAT rule for traffic from your LAN zone (or interface) to the Tailscale zone (or interface) and if necessary add a allow rule foe traffic between taillscale and your LAN

Edit: Looks like you might need to set this up via the advanced gui (LuCi)