!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

883 Members
Declaratively manage your switching, routing, wireless, tunneling and more. | Don't rely on `networking.*` for interface and routing setup, use systemd-networkd, ifstate or NetworkManager instead. | Set `SYSTEMD_LOG_LEVEL=debug` to debug networking issues with networkd | No bad nft puns, please. | Room recommendations: #sysops:nixos.org252 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
8 Oct 2025
@magic_rb:matrix.redalder.orgmagic_rb resloved will try the hardconfigured DNS first, but you can get it to ignore DHCP DNS entries completely. Or specify that you want to only use those for certain domains. I do that on my laptop, .lan is configured to go to my home router, everything else goes to my DoT proxy on my home server 08:16:28
@haauler:matrix.org@haauler:matrix.org left the room.10:43:45
@felix.schroeter:scs.ems.host@felix.schroeter:scs.ems.host changed their display name from Felix Schröter (🌄 29.09. – 05.10.) to Felix Schröter.13:09:16
9 Oct 2025
@srhb:matrix.orgsrhb set a profile picture.07:08:19
@anton:gersthof.comAnton (he/him) joined the room.16:08:01
10 Oct 2025
@chris_god:trafkin.comm0lokI'm trying to run tailscale inside a nixos container16:51:25
@chris_god:trafkin.comm0lokgm gm16:51:32
@chris_god:trafkin.comm0lokbut for some reason even if I have internet, I get this route ip+net: no such network interface16:51:57
@chris_god:trafkin.comm0lokI'm using a bridge for networking16:52:15
@chris_god:trafkin.comm0lokI had to enable tun :D16:55:35
@chris_god:trafkin.comm0lokmmm for some reason the tailscale on the podman container failed23:04:42
11 Oct 2025
@midischwarz12:libg.somidischwarz12 joined the room.20:34:07
@k900:0upti.meK900Woo new regdb update21:13:41
@k900:0upti.meK900And still no https://lore.kernel.org/wireless-regdb/20250708-russia-320-v1-1-53641e8dd417@0upti.me/T/#u21:13:43
@k900:0upti.meK900Should just email wens directly probably21:14:14
12 Oct 2025
@midischwarz12:libg.somidischwarz12 removed their profile picture.02:45:02
@midischwarz12:libg.somidischwarz12 set a profile picture.02:45:11
@anton:gersthof.comAnton (he/him) changed their display name from Anton to Anton (he/him).13:17:55
@midirhee12:tchncs.de@midirhee12:tchncs.de removed their profile picture.21:27:42
@midirhee12:tchncs.de@midirhee12:tchncs.de removed their display name midirhee12.21:28:17
@midirhee12:tchncs.de@midirhee12:tchncs.de left the room.21:28:28
13 Oct 2025
@kdk12:matrix.orgKDK12 joined the room.11:41:46
@kdk12:matrix.orgKDK12Hi everyone! I'm using fail2ban to secure my server — it works fine, but I'd like to block known bad IP addresses before they can access anything. Currently, I have a small systemd service and timer that download a FireHOL blacklist daily and insert all the IPs into an nftables set. Is there a more idiomatic or less DIY way to achieve this on NixOS?13:21:57
@k900:0upti.meK900Honestly the correct answer is "just don't"13:26:32
@k900:0upti.meK900Address based blocklists are terrible and an adversary that can break ed25519 can do much more damage than pwning your seedbox13:27:05
@k900:0upti.meK900fail2ban may have made sense when people were actually using password auth13:27:48

Show newer messages


Back to Room ListRoom Version: 6