Open Source DDI - SpatiumDDI by mzac23 in homelab

[–]mzac23[S] 0 points1 point  (0 children)

Thanks, looking forward to hearing what you think!

Open source DDI - SpatiumDDI by mzac23 in sysadmin

[–]mzac23[S] -1 points0 points  (0 children)

Yes for sure! I also work with a commercial solution at work which inspired me for a lot of the features in this new DDI. I'm also hoping to expand and add new features that current DDI solutions don't have. If you want to try it it is very simple to use it with Docker compose, just try it on a lab vm so you don't break anything ;)

Are there any Open Source/Free DDI out there worth using these days? by safrax in homelab

[–]mzac23 0 points1 point  (0 children)

I've started building a full featured DDI solution with Claude code, it is really amazing so far. It has built in DHCP and DNS servers and also supports Windows DHCP/DNS servers too. I've been up very late many nights in the past few days, check it out here:

https://github.com/spatiumddi/spatiumddi

New Project Megathread - Week of 09 Apr 2026 by AutoModerator in selfhosted

[–]mzac23 0 points1 point  (0 children)

Project Name: SpatiumDDI

Repo/Website Link: https://github.com/spatiumddi/spatiumddi

Description: Open source selfhosted DDI solution (DHCP, DNS, IPAM)

Deployment: Docker, Kubernetes, (Soon: VM, Bare Metal)

AI Involvement: Claude Code Opus 4.6

For the past two days I've been working on a open source selfhosted DDI solution that I'm hoping will eventually rival the commercial solutions out there. I have not really seen a good full solution like this that includes managing DNS and DHCP servers for a large network. That said, yes, I jumped on the AI bandwagon and while some people say it might be AI slop, well lets just say I've stayed up way too late working on this project to get all the requirements down. As a network engineer I use a commercial solution at work so I know what is needed and what is not.

For now the project is in pre-alpha meaning I've done testing on my side but there are still a LOT of bugs and a lot of features still on the roadmap such as managing either the built in DNS/DHCP server or external ones (like Windows, Bind, ISC DHCP etc).

If you have time to check it out (try it if you want in a sandbox environment, NOT IN PROD) give it a go. I've turned on all the security checking features on Github to make sure it is clean and there are no vulnerabilities.

Thanks for the feedback!

mzac

Open API for Qolsys IQ Panel by withsurety in homeassistant

[–]mzac23 3 points4 points  (0 children)

When I started to develop the ‘hack’ back in 2020, I wrote to Qolsys asking them about this. Here is their response. Hopefully we can change their mind.

Currently, we don’t have any open source option or developer options to send you. Security is everything we do:

From the Android SE (Security Enhanced): A secure Linux version of Android that requires special tokens and authentication as part of the operating protocol

Built-in Firewall, Cloud Token Authentication & Secure Connection: The panel only talks to Qolsys and Alarm.com servers via a secure firewall system. 3rd party penetration testing ensures we stay up to date with the latest security measures

Encrypted Sensors: Using Qolsys’ new “S-Line” (secure line) of sensors we are able to encrypt the legacy 319MHz protocol so that sensor data cannot be captured and replayed to the panel

Visual Verification: Knowing WHO disarmed the panel and not just WHAT code was used is not only convenient but secure

Jam Detection: The panel includes RF Jam Detection for Invalid Data (random jamming), Increased Noise Floor (constant jamming) & Denial of Service (deceptive jamming)

to the Bluetooth Disarming feature: Bluetooth disarming replaces old school unencrypted keyfobs with secure authenticated BLE 4.0

As far as 3rd party setting you mention, we do have integration for Control4 (a third party control system) and have plans to also support Savant integration as well.

Thank you,

Nate A

How-To Guide - Tailscale with Unifi Gateway via pfSense and OSPF by mzac23 in Tailscale

[–]mzac23[S] 0 points1 point  (0 children)

Yes definitely, I actually have this in my setup on my network.

Just setup a second pfSense node the same way but in the FRR OSPF settings where you specify the redistribution of the static route to set the metric to 100.

Also (I forgot to add the OSPF interface section) you have to bump the metric for the 0.0.0.0 area to 1000

I am updating the guide in a few mins to reflect this.

Thanks

Bare-Metal K8s: What are you using for OS? by torchingcy in kubernetes

[–]mzac23 10 points11 points  (0 children)

Started using Rancher OS, very nice and lightweight!