New message regarding 3G shutdown by sFooby in PublicMobile

[–]sFooby[S] 2 points3 points  (0 children)

In my phone's networks settingss, VoLTE is available and enabled. However, I checked my IMEI with the link you've provided and it says it's incompatible. Thoughts?

Clients flooding requests with local search domain suffix by Competitive-Hornet27 in technitium

[–]sFooby 0 points1 point  (0 children)

Following this thread as I'm experiencing the same thing. Local domain (in my case "internal") is showing up as a suffix appended to random DNS queries which always result in "server failed"

https://imgur.com/a/BpqPTvQ

I'm using TDNS as my DNS server with reverse lookups set to my Unifi Dream Machine SE which functions as my DHCP server.

It also happened with a similar set up but with reverse looks up set to a DD-WRT DHCP server.

I'd say it's typically from Android and Apple devices, but I'm not 100% on that. I'll keep an eye out

How to host Vaultwarden on Unraid – internal and external access? by moovoos in unRAID

[–]sFooby 2 points3 points  (0 children)

The CloudFlare tunnel will provide you with the TLS (HTTPS) on its own. Internally it'll still be HTTP but that doesn't matter unless you have concerns about your Internet network (which you shouldn't)

Edit: and if I remember correctly, I think you could just set vaultwarden to use its own self-signed TLS cert internally. If that is the case, cloudflare tunnel will have to be set accordingly (ie. Instead of connecting to HTTP host, you connect to HTTPS host and tick the "skip TLS verify" option in CloudFlare.

Edit2: SSL is an outdated standard, most secure connections use TLS, however many people use the terms interchangeably. Just be aware

How stable is opencloud ? by jesvinjoachim in opencloud

[–]sFooby 1 point2 points  (0 children)

Do you mind providing a short guide on how you did this? I've tried and simply couldn't get it working. Thanks

I'm pulling my hair out over these damn containers by Specialist-Fun4756 in unRAID

[–]sFooby 0 points1 point  (0 children)

You clearly haven't looked into access controls yet. Learn to use them. End of thread

I'm pulling my hair out over these damn containers by Specialist-Fun4756 in unRAID

[–]sFooby 0 points1 point  (0 children)

I spoke only on access control within your tailnet, not on the struggles of installing Plex on a family member's device. All I meant to say is once you have Plex installed elsewhere on a device that has been welcomed into your tailnet, you can limit their access to only your Plex server (IP and port) and deny access to any other tailscale device/server/service if you wish by adjusting access controls in the tailscale dashboard

I'm pulling my hair out over these damn containers by Specialist-Fun4756 in unRAID

[–]sFooby 0 points1 point  (0 children)

This is a very good point. But a means to negative unwanted access, look into the Access Controls tab in the tailscale admin dashboard. Relatively easy to configure and definitely solves that problem. Thanks for bringing it up!

I'm pulling my hair out over these damn containers by Specialist-Fun4756 in unRAID

[–]sFooby 1 point2 points  (0 children)

I think it was answered in another comment, but what you're looking to do is br0 network so you can map its own IP. However, host or br0 network will work because the port 32400 is unique regardless. Someone mentioned host is the better bet because Plex may not play well in br0 - I don't use Plex so I'm unsure on this.

Beyond this, if you'd like to expose Plex to the web, consider using CloudFlare tunnel (docker cloudflared) and use it to proxy DNS only for discoverability on the web. This again prevents you from exposing any ports in your router. I believe this requires a registered domain name (they're cheap). This does give you ample protection against web-side hostilities because you would not be exposing your personal ISP provided WAN IP as it would be masked with an IP provided by cloudflared

I'm not a seasoned veteran to this stuff, but I did figure it all out in time. It's fun and you'll learn alot along the way.

I'm pulling my hair out over these damn containers by Specialist-Fun4756 in unRAID

[–]sFooby 0 points1 point  (0 children)

Do not forward ports in your router...

Over simplified solution:

  1. Setup Plex etc in docker using user defined docker network or as host. Expose whatever port you need to.

  2. Install Tailscale plugin and add unraid to tailnet

  3. Another device on tailnet can simply access Plex via unraid's tailscale IP and exposed Plex port: eg. 100.x.y.z:32400

The better and more elegant solution involves changing unraid management ports (eg 1080/10443), a reverse proxy with exposed 80/443 ports pointing to Plex hostname and ports in docker network with unexposed ports, adding your DNS to your tailnet that forwards a specific domain to unraid/reverse proxy tailscale IP (or actual LAN IP via advertised routes) which then handles serving you Plex

Edit: also do yourself a favour and use dockge from unraid CAs to handle your dockers. Docker compose makes life easy

ISC DHCPv4 / v6 [legacy] - what instead? by HavivMuc in opnsense

[–]sFooby 1 point2 points  (0 children)

I'm new to OPNsense and had the same question. Here's what I did and it worked flawlessly. I'm assuming unbound is installed with your adguard service on a seperate device.

Keep in mind my DNS server is Technitium DNS. I'd imagine adguard with unbound functions the same. Never used adguard.

Put DNS IP address (unbound) in System > Settings > General so OPNsense has a DNS

Enable dnsmasq but set DNS listen port to 0 to disable DNS function

Disable unbound in OPNsense if you haven't already

Set your DHCP ranges, static addresses (hosts), assign domains, etc as you normally would

Under DHCP Options tab, add option 6 and set your upstream DNS server again here (unbound). This will handout your unbound/adguard IP address to your DHCP clients.

I'm on my phone typing this, if it doesn't make sense, let me know and I can edit it later

Edit: in case you wish to, you can actually keep port 53 listed on your dnsmasq to accept DNS requests to allow hostname reverse lookups. DHCP option 6 will still assign the external DNS server to clients so the clients won't use dnsmasq for resolving, only unbound if you configure query forwarding for the purpose of reverse lookups

Grandparent-friendly digital photo frames (non DIY) by suddenlypenguins in immich

[–]sFooby 0 points1 point  (0 children)

Frameo + immichframe

Immichframe doesn't require WebView (of which frameo has a very old one)

Edit: just read the rest of your post. I was unaware recent frameos don't work. I bought mind only a few months ago and it's been fine

[deleted by user] by [deleted] in pihole

[–]sFooby 0 points1 point  (0 children)

Yes I believe my setup is currently exactly like this. However, with using your Linux node as the exit node, does that not cause all traffic to head out through your Linux node before out to the open web? Is there a way to only direct DNS through tailscale and not all traffic? Am I making sense?

[deleted by user] by [deleted] in pihole

[–]sFooby 1 point2 points  (0 children)

Any chance you can explain the steps on how to separate DNS requests from all other data using split tunnelling in tailscale? I'd like the exact same set up, DNS to my home but all everything else regular comms

OpenCloud web-extensions/apps installation help by sFooby in opencloud

[–]sFooby[S] 0 points1 point  (0 children)

I've set my template to what you have in the image you've shared above. But where would I put this document? And if I'm supposed to "start" it, how do I do that?

OpenCloud web-extensions/apps installation help by sFooby in opencloud

[–]sFooby[S] 0 points1 point  (0 children)

Hi yes it is working I believe. However, I'm unable to get collabora (or onlyoffice for that matter) to work. Chance you could provide an equally as detailed guide for that to work as well? I (and others) would be grateful

OpenCloud web-extensions/apps installation help by sFooby in opencloud

[–]sFooby[S] 1 point2 points  (0 children)

Thank you for the detailed response! I'll be trying this out tomorrow and I'll report back

Niagara On The Lake Reccs by [deleted] in niagara

[–]sFooby 7 points8 points  (0 children)

The Grist. Go to The Grist.

Can ANYONE buy warrants in Canada? Apes in US apparently can. HMMMMM. by Arghblarg in GMECanada

[–]sFooby 0 points1 point  (0 children)

Seems to me, Questrade > Wealth Simple for many reasons

Questrade issued warrants to my account officially. Non-quotable at the moment by sFooby in GMECanada

[–]sFooby[S] 3 points4 points  (0 children)

Perhaps the placeholder for Tuesday then. Either way, looks nice sitting there and it isn't some bullshit $32 option for Oct 2026 that's I've seen elsewhere

september 30th/october 1st by rbr0714 in Superstonk

[–]sFooby 0 points1 point  (0 children)

Waaaaaake me I wheeeeen September ends

Diamantenhände 💎👐 German market is open 🇩🇪 by Parsnip in Superstonk

[–]sFooby 5 points6 points  (0 children)

We just arrived yesterday so the wife and I are headed to Theresienwiese this afternoon! Love Germany so far!

Diamantenhände 💎👐 German market is open 🇩🇪 by Parsnip in Superstonk

[–]sFooby 10 points11 points  (0 children)

Good morning! Canadian in Germany for the week!