sxt

joined 1 year ago
[–] sxt 11 points 4 weeks ago* (last edited 4 weeks ago) (1 children)

Their logos are always great. Took a class on Vulcan in college and managed to snag one of these .

Should probably wear it more often but it was probably too big for me even at the time

[–] sxt 15 points 1 month ago (1 children)

Why is this news

[–] sxt 10 points 1 month ago* (last edited 1 month ago) (1 children)

A good step forward in terms of price but can we please get something smaller than an SUV. I would do strange things for a sub $30k hatchback EV that doesn't look terrible

[–] sxt 55 points 1 month ago* (last edited 1 month ago) (1 children)

Another one I found: Which is just this I think https://medium.com/@azalben/re-can-i-drink-this-delicious-sounding-bleach-8b9db1326f9c

Granted I'm baiting it and it does say not to drink it.

[–] sxt 29 points 1 month ago* (last edited 1 month ago)

I doubt the goal is to produce easily understood bash, otherwise you'd just write bash to begin with. It's probably more similar to a typescript transpiler that takes in a language with different goals and outputs something the interpreter can execute quickly (no comment on how optimized this thing is).

[–] sxt 4 points 1 month ago (5 children)

If the model was trained on csam then it is dependent on abuse

[–] sxt 6 points 1 month ago

/all, top of last 12 hours has been my go-to

[–] sxt 7 points 1 month ago

I believe version 555 of the Nvidia driver is supposed to get the explicit sync patch.

[–] sxt 4 points 1 month ago* (last edited 1 month ago)

Nixos is immutable to force system configuration through the declarative nix configs/build system not to limit tinkering.

[–] sxt 1 points 2 months ago (1 children)

All I had to do was remove one field to do with docker swarm which I don't think I was using anyway.

[–] sxt 25 points 2 months ago (6 children)

The parts from Jupiter Ascending between the start and the end.

[–] sxt 21 points 2 months ago* (last edited 2 months ago) (1 children)
11
submitted 5 months ago* (last edited 5 months ago) by sxt to c/selfhosted
 

I am attempting to follow this https://www.procustodibus.com/blog/2022/09/wireguard-port-forward-from-internet to forward traffic from a few ports on a public oracle vps to other ports on my local server through a wireguard connection. Currently I am doing this using rinetd, but I was looking for a more normal way of forwarding traffic. (Also looking to forward UDP traffic at some point.)

After stopping rinetd, adding these rules to the public server's wg config

# packet forwarding
PreUp = sysctl -w net.ipv4.ip_forward=1

# port forwarding
PreUp = iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 443 -j DNAT --to-destination 10.144.65.2:8443
PostDown = iptables -t nat -D PREROUTING -i ens3 -p tcp --dport 443 -j DNAT --to-destination 10.144.65.2:8443

# packet masquerading
PreUp = iptables -t nat -A POSTROUTING -o wg0 -j MASQUERADE
PostDown = iptables -t nat -D POSTROUTING -o wg0 -j MASQUERADE

and restarting the wg connection, I'm seeing traffic on the ens3 port but none entering wg0 via tcpdump. I feel like I probably have conflicting iptables rules saved https://pastebin.com/0eNwhNKM but I don't really know enough about whats going on there to fix it. I feel like its probably the wireguard-*-rule ones (created by pivpn possibly?) but I'm not sure.

Edit way later: Ended up just using rinetd for the udp connections. Ubuntu doesn't include the latest version here https://github.com/samhocevar/rinetd which is able to do UDP connections. The docker container RxBrad suggested uses that version within the docker container to make the redirections so it will be roughly equivalent.

view more: next ›