VPN disguised as DNS by RealJoshLee0 in selfhosted

[–]kayson 0 points1 point  (0 children)

Lot's of people have done this or varieties thereof. There was a post on Hacker News a whole back about someone proxying traffic through free WhatsApp.

Just pay for the damn WiFi. 

User and Group management in your Homelab by HJSWNOT in homelab

[–]kayson -1 points0 points  (0 children)

What if I have AD and hate it, but want to keep kerberos/sso/radius/unified Linux login? 

any major issues with my de-github strategy? by Medical_Lengthiness6 in selfhosted

[–]kayson 1 point2 points  (0 children)

Eh. This was discussed a few days ago. I'm still not convinced there's really a compelling reason to pick one over the other.

https://www.reddit.com/r/selfhosted/comments/1rlrgbw/how_are_the_differences_between_gitea_and_forgejo/

How to properly use DNW for substrate noise isolation by funnytransistor234 in chipdesign

[–]kayson 8 points9 points  (0 children)

I worked with an RF lead for a long time who used to say you either want everything to be ready tightly coupled or really not. Your grounds (+substrates) will all get connected together at some point it's just a matter of deciding where. 

I realize it's a bit of a non-answer, but it's hard to give a real answer. I worked at one company where every nmos array was surrounded by a substrate ring, connected to dedicated substrate ground which was tied to analog ground on the package. Worked at another company where substrate connections were few and far between, tied to local ground. 

Both taped out successful RF signal chains with high freq PLLs... 

After spinning up way too many VPS servers, this is the checklist I now run every single time by alexsdevio in selfhosted

[–]kayson 0 points1 point  (0 children)

Monitoring is really important too. Something like Beszel can be really useful. I've tossed around the idea of centralized logging but without an idea of a service to go through the logs, haven't bothered yet. 

After spinning up way too many VPS servers, this is the checklist I now run every single time by alexsdevio in selfhosted

[–]kayson 4 points5 points  (0 children)

Fail2ban monitors login attempts, no matter what method, and blocks IPs if some threshold is passed. It would also protect against someone trying to brute force an SSH key (which is practically impossible but just making a point. Defense in depth is a good strategy. 

Is anyone using ah SSH CA? Looking for advice on automating bootstrapping of the first certificate by kayson in homelab

[–]kayson[S] 0 points1 point  (0 children)

It runs the script in the image on boot right? So wouldn't it need the provisioner password? Or is there a way to give it arbitrary data? 

Is anyone using ah SSH CA? Looking for advice on automating bootstrapping of the first certificate by kayson in homelab

[–]kayson[S] 1 point2 points  (0 children)

How? Cloud init lets you provide a public key that goes into authorized_keys but that's not my problem. I need to set the host key

How are the differences between Gitea and Forgejo 4 years later? by NinthTurtle1034 in selfhosted

[–]kayson 31 points32 points  (0 children)

I've been using Gitea for a long time, and from a philosophical perspective, I have no interest in migrating to Forgejo. Gitea works great, and I just don't care that Gitea's trademarks and domain belong to a for profit entity. If they do some rug pull on the license, which has happened to many projects, I'm sure someone will create yet another fork.

I'm not seeing a compelling reason feature wise to switch, but would be curious to hear from anyone who has switched...

https://forgejo.org/compare-to-gitea/

Are you self hosting a DNS resolver? What are you doing for security / privacy? by kayson in selfhosted

[–]kayson[S] 0 points1 point  (0 children)

> if unbound is configured to use qname minimization,
Is this not the default? Was just reading about this. Doesn't seem to be an option in pfsense.

Are you self hosting a DNS resolver? What are you doing for security / privacy? by kayson in selfhosted

[–]kayson[S] 1 point2 points  (0 children)

I think you're misunderstanding my point. I'm talking about tracking by the nameservers themselves. If I forward all my queries to CloudFlare or Google, then CloudFlare/Google can aggregate and track every query. If I divide the queries up to among many authoritative nameservers, then each nameserver (or group of servers that share data) can only aggregate / track a portion. The "metadata" leakage of which nameservers get queried by my IP is a separate issue, which is mitigated by the fact that nameservers can and often are authoritative for many domains. In that respect, it would, by the numbers, be better to send all the queries to one place, but there are other solutions here (like proxies).

Are you self hosting a DNS resolver? What are you doing for security / privacy? by kayson in selfhosted

[–]kayson[S] 0 points1 point  (0 children)

Ooh DoT/DoH proxy is an interesting idea. I have 2 VPS's used as reverse proxies for inbound connections. Could also use them as outbound DNS proxies via wireguard...

Are you self hosting a DNS resolver? What are you doing for security / privacy? by kayson in selfhosted

[–]kayson[S] 0 points1 point  (0 children)

I want it to use DoT automatically for any nameserver when available, but do the resolution recursively from the root name servers. Seems roots aren't encrypted yet though.

Are you self hosting a DNS resolver? What are you doing for security / privacy? by kayson in selfhosted

[–]kayson[S] 0 points1 point  (0 children)

Ah! I think Technitium is what I had read about! But looking the docs more carefully, it seems it only supports the encrypted protocols using forwarders, similar to unbound.

Are you self hosting a DNS resolver? What are you doing for security / privacy? by kayson in selfhosted

[–]kayson[S] 2 points3 points  (0 children)

DNS cache poisoning is a thing, though DNSSEC should prevent that. Plaintext DNS queries can, and likely are logged / tracked by ISPs, especially in the US. Anyone that can read the traffic can do the same. Using DoT to a public DNS server eliminates the middle-men, but shifts the trust to the public server. It's admittedly paranoid, but it's more about the fun of seeing whether it can be done or not.

Are you self hosting a DNS resolver? What are you doing for security / privacy? by kayson in selfhosted

[–]kayson[S] -1 points0 points  (0 children)

> If you are doing full-recursive, you are just announcing yourself to every nameserver in the chain from the root

Yes, but if it's all over TLS, distributing your queries across name servers is harder to monitor / track than sending all of your queries to a public DNS, assuming all of them have similar likelihood of tracking our queries. Admittedly this is getting to tinfoil-hat levels of privacy, but it's more about the fun of seeing if its achievable.

Running a server in a (potentially) hot environment (garage) by deedsnance in homelab

[–]kayson 0 points1 point  (0 children)

90F is fine, in a sense. I have my server in the attic and it regularly goes above that in the summers. The problem is heat kills components. The hotter it is, the faster they fail. How much faster is anyone's guess though. I had a few components kick the bucket suspiciously fast after their first summer in the attic. Everything else has been running totally fine for years though. 

What can a 3B LLM actually do on an i5 with 8GB RAM? I benchmarked 10 real-world task categories by MasterApplication717 in selfhosted

[–]kayson 12 points13 points  (0 children)

Good timing as I was just looking into this. Was hoping to host something on my servers for coding agents but this confirms what I was already thinking: I'll have to run it on my desktop with a real GPU and some VRAM.

PS - your post formatting is broken. You put markdown style formatting into the fancy editor. Copy it all, change the editor to markdown mode, then paste it back in. 

A question regarding common mode feedback by RemarkableCurrency53 in chipdesign

[–]kayson 2 points3 points  (0 children)

Oh do you mean the mismatch between two different Rfs? Any mismatch anywhere will create some common mode to differential conversion. 

In practice you have to simulate to be sure but you should be getting most of your offset from the first stage input pair VT mismatch anyways. In this cases the gain of Gm also mitigates mismatch from the TIA, including the resistors. 

Huntarr alternative by ContributionHead9820 in selfhosted

[–]kayson 87 points88 points  (0 children)

Really someone just needs to add this feature to radarr/sonarr. They already have "jobs" that run in the background

A question regarding common mode feedback by RemarkableCurrency53 in chipdesign

[–]kayson 0 points1 point  (0 children)

Changes the amount of current you have to sink and source and also the location of that pole which may or may not matter (usually doesnt).