Tag: Tinkering

Stuff I attempt to fix or improve.

  • The Site is Back

    I finally bought a new router to keep the site up. My old one kept breaking the firewall rule, so the sure had been offline for months. I bought an Asus this time. Wifi 6, whatever that is.

  • Site has been down

    I’ve been trying to figure out why my SSL cert wouldn’t renew with certbot. I haven’t put much effort into it until today. Turns out my router wasn’t actually forwarding ports, so the site was completely down. I of course could load it locally, and didn’t realize it wasn’t on the internet. lol. Simple fix, I had to delete the port forwarding entries and re-add them. I hope that doesn’t mean my router is getting too old, but I wouldn’t be surprised.

  • Russian

    Russian

    No wonder we don’t understand each other. Damn fools got an n for a p, and a p for an r.

    Duolingo my dingo
  • Reason a billion for why I hate iOS.

    Reason a billion for why I hate iOS.

    If you delete too many message threads, it’ll display them as bubbles instead of a list. It doesn’t appear to be something I can change.

  • Basement

    Basement

    Posts are installed and the dinning room is way more level. Note I did not say level, just more level. Hundred year old house, blah blah blah.

    I saw white duct tape at the drug store and grabbed it right after they finished, so this happened. Not sure if I’ll leave it, or add more.

  • Basement support post upgrade

    Basement support post upgrade

    The guys came and installed the new concrete pads for the support posts. They dug down a couple feet and put some pretty good sized pads in. The basement floor is only like an inch think of concrete, so the posts weren’t really doing much anyway. They don’t guarantee that they can get the steel beam bent back into place, but it won’t get any worse.

    They’ll come back in 7-10 days and install the posts.

  • Camera System

    Camera System

    The new house came with a security and camera system. 2 TB NVR. I had to reset the thing to get into it, which was surprisingly simple. There was a switch wired to the mother board. I just had to hold it for like 30 seconds while powered on the device. Seems to be an embedded system. I’m not really seeing familiar logos on the board or anything, so I will probably stop with just having a working NVR, and not try to put linux on it.

  • Invention

    Decaffeinated Re-Caffeinated Coffee. The purpose is to enable super accurate dosing of caffeine. With the idea being you can find your optimum balance of goods versus negative effects. Companion app of course.

  • WireGuard VPN

    I’ve been just spinning up VMs left and right since I setup that Oracle VM. I decided that if I’m going to be out of town for a week, then I’d like to have a VPN in to the home network, so that I can get some work done. It is my vacation, so I’d like to do some hobbies.

    So far the config is pretty simple. I like the approch they are using with wiregaurd too. Very “unixy” in that it is just a network interface, that will encrypt with a private key, and decrypt with the client’s public key. There is almost no CPU usage. It does one thing and it does it well. Use what ever key management or authentication scheme you want.

    New VM on Universe. 2 GB ram and 25GB storage. Its pool is 100GB.

    package is just called wireguard

    ## Create the Wireguard virtual network adapter
    $ sudo ip link add dev wg0 type wireguard
    
    ## Set proper umask for key files, and generate private and public key files
    $ umask 077
    $ wg genkey > privatekey
    $ wg pubkey < privatekey > publickey
    
    ## Setup network
    $ sudo ip addr add 10.0.0.1/24 dev wg0
    
    ## attach key to interface
    $ wg set wg0 private-key ./private
    ## up
    $ sudo ip link set wg0 up
    
    ## create /etc/wireguard/wg0.conf
    $ sudo vi /etc/wireguard/wg0.conf
    
    contents of new file
    
    [Interface]
    SaveConfig = true
    PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o enp1s0 -j MASQUERADE;
    PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o enp1s0 -j MASQUERADE;
    ListenPort = 56990
    PrivateKey = QETsE2fXOXC81R/MRYDYjHTyjZxfSlF2vuiCgK5nv0U=
    
    [Peer]
    PublicKey = L/VrqKjC5/harAftr+2w0I0hs0MPy0QgXGvvAKqYZlA=
    AllowedIPs = 10.0.0.2/32