!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

865 Members
Declaratively manage your switching, routing, wireless, tunneling and more. | Don't rely on `networking.*` use systemd-networkd and NetworkManager instead. | Set `SYSTEMD_LOG_LEVEL=debug` to debug networking issues with networkd | No bad nft puns, please. | Room recommendations: #sysops:nixos.org248 Servers

Load older messages


SenderMessageTime
8 Oct 2025
@haauler:matrix.org@haauler:matrix.org left the room.10:43:45
@felix.schroeter:scs.ems.host@felix.schroeter:scs.ems.host changed their display name from Felix Schröter (🌄 29.09. – 05.10.) to Felix Schröter.13:09:16
9 Oct 2025
@srhb:matrix.orgsrhb set a profile picture.07:08:19
@anton:gersthof.comAnton (he/him) joined the room.16:08:01
10 Oct 2025
@chris_god:trafkin.comm0lokI'm trying to run tailscale inside a nixos container16:51:25
@chris_god:trafkin.comm0lokgm gm16:51:32
@chris_god:trafkin.comm0lokbut for some reason even if I have internet, I get this route ip+net: no such network interface16:51:57
@chris_god:trafkin.comm0lokI'm using a bridge for networking16:52:15
@chris_god:trafkin.comm0lokI had to enable tun :D16:55:35
@chris_god:trafkin.comm0lokmmm for some reason the tailscale on the podman container failed23:04:42
11 Oct 2025
@midischwarz12:libg.somidischwarz12 joined the room.20:34:07
@k900:0upti.meK900Woo new regdb update21:13:41
@k900:0upti.meK900And still no https://lore.kernel.org/wireless-regdb/20250708-russia-320-v1-1-53641e8dd417@0upti.me/T/#u21:13:43
@k900:0upti.meK900Should just email wens directly probably21:14:14
12 Oct 2025
@midischwarz12:libg.somidischwarz12 removed their profile picture.02:45:02
@midischwarz12:libg.somidischwarz12 set a profile picture.02:45:11
@anton:gersthof.comAnton (he/him) changed their display name from Anton to Anton (he/him).13:17:55
@midirhee12:tchncs.de@midirhee12:tchncs.de removed their profile picture.21:27:42
@midirhee12:tchncs.de@midirhee12:tchncs.de removed their display name midirhee12.21:28:17
@midirhee12:tchncs.de@midirhee12:tchncs.de left the room.21:28:28
13 Oct 2025
@kdk12:matrix.orgKDK12 joined the room.11:41:46
@kdk12:matrix.orgKDK12Hi everyone! I'm using fail2ban to secure my server — it works fine, but I'd like to block known bad IP addresses before they can access anything. Currently, I have a small systemd service and timer that download a FireHOL blacklist daily and insert all the IPs into an nftables set. Is there a more idiomatic or less DIY way to achieve this on NixOS?13:21:57
@k900:0upti.meK900Honestly the correct answer is "just don't"13:26:32
@k900:0upti.meK900Address based blocklists are terrible and an adversary that can break ed25519 can do much more damage than pwning your seedbox13:27:05
@k900:0upti.meK900fail2ban may have made sense when people were actually using password auth13:27:48
@k900:0upti.meK900But as long as you're using public key auth, it's basically a non-issue, except for maybe DoS potential, but an attacker trying to DoS you can DoS anything else you're running just as well13:28:22
@kdk12:matrix.orgKDK12Fair point, thanks for the insight!13:53:05
@ewan:gilchrist.scotEwan joined the room.15:28:40
14 Oct 2025
@chrissq:matrix.orgchris joined the room.08:56:02
15 Oct 2025
@denkn:denkn.atDenKn changed their display name from 𝔇𝔢𝔫𝔎𝔫 to DenKn.08:15:36

Show newer messages


Back to Room ListRoom Version: 6