!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

871 Members
Declaratively manage your switching, routing, wireless, tunneling and more. | Don't rely on `networking.*` use systemd-networkd and NetworkManager instead. | Set `SYSTEMD_LOG_LEVEL=debug` to debug networking issues with networkd | No bad nft puns, please. | Room recommendations: #sysops:nixos.org249 Servers

Load older messages


SenderMessageTime
8 Oct 2025
@k900:0upti.meK900It will be used first, but that's generally not an issue, and you can always SSH into your VM even if DNS is broken08:12:55
@magic_rb:matrix.redalder.orgmagic_rb resloved will try the hardconfigured DNS first, but you can get it to ignore DHCP DNS entries completely. Or specify that you want to only use those for certain domains. I do that on my laptop, .lan is configured to go to my home router, everything else goes to my DoT proxy on my home server 08:16:28
@haauler:matrix.org@haauler:matrix.org left the room.10:43:45
@felix.schroeter:scs.ems.host@felix.schroeter:scs.ems.host changed their display name from Felix Schröter (🌄 29.09. – 05.10.) to Felix Schröter.13:09:16
9 Oct 2025
@srhb:matrix.orgsrhb set a profile picture.07:08:19
@anton:gersthof.comAnton (he/him) joined the room.16:08:01
10 Oct 2025
@chris_god:trafkin.comm0lokI'm trying to run tailscale inside a nixos container16:51:25
@chris_god:trafkin.comm0lokgm gm16:51:32
@chris_god:trafkin.comm0lokbut for some reason even if I have internet, I get this route ip+net: no such network interface16:51:57
@chris_god:trafkin.comm0lokI'm using a bridge for networking16:52:15
@chris_god:trafkin.comm0lokI had to enable tun :D16:55:35
@chris_god:trafkin.comm0lokmmm for some reason the tailscale on the podman container failed23:04:42
11 Oct 2025
@midischwarz12:libg.somidischwarz12 joined the room.20:34:07
@k900:0upti.meK900Woo new regdb update21:13:41
@k900:0upti.meK900And still no https://lore.kernel.org/wireless-regdb/20250708-russia-320-v1-1-53641e8dd417@0upti.me/T/#u21:13:43
@k900:0upti.meK900Should just email wens directly probably21:14:14
12 Oct 2025
@midischwarz12:libg.somidischwarz12 removed their profile picture.02:45:02
@midischwarz12:libg.somidischwarz12 set a profile picture.02:45:11
@anton:gersthof.comAnton (he/him) changed their display name from Anton to Anton (he/him).13:17:55
@midirhee12:tchncs.de@midirhee12:tchncs.de removed their profile picture.21:27:42
@midirhee12:tchncs.de@midirhee12:tchncs.de removed their display name midirhee12.21:28:17
@midirhee12:tchncs.de@midirhee12:tchncs.de left the room.21:28:28
13 Oct 2025
@kdk12:matrix.orgKDK12 joined the room.11:41:46
@kdk12:matrix.orgKDK12Hi everyone! I'm using fail2ban to secure my server — it works fine, but I'd like to block known bad IP addresses before they can access anything. Currently, I have a small systemd service and timer that download a FireHOL blacklist daily and insert all the IPs into an nftables set. Is there a more idiomatic or less DIY way to achieve this on NixOS?13:21:57
@k900:0upti.meK900Honestly the correct answer is "just don't"13:26:32
@k900:0upti.meK900Address based blocklists are terrible and an adversary that can break ed25519 can do much more damage than pwning your seedbox13:27:05
@k900:0upti.meK900fail2ban may have made sense when people were actually using password auth13:27:48
@k900:0upti.meK900But as long as you're using public key auth, it's basically a non-issue, except for maybe DoS potential, but an attacker trying to DoS you can DoS anything else you're running just as well13:28:22
@kdk12:matrix.orgKDK12Fair point, thanks for the insight!13:53:05
@ewan:gilchrist.scotEwan joined the room.15:28:40

Show newer messages


Back to Room ListRoom Version: 6