11 Followers
19 Following
52 Posts
Builder of things.
Websitehttps://driohq.net
Githubhttps://github.com/drio

Very cool: @drio has built himself a physical button to play relaxing music in the bathroom, using my https://gokrazy.org/ #golang appliance platform! 🤘

Here’s his blog post: https://drio.sh/posts/relaxswitch-gokrazy/ (contains a demo video!)

gokrazy Go appliances :: gokrazy

May I ask you something @tqbf? Are you still using magic wormhole? I know you use the go implementation, but I was wondering if you self-host the relay/mail servers or if you use your own. If you do, what implementation do you use? The python one? Thank you!

@jnsgruk I enjoyed your post: https://jnsgr.uk/2024/07/how-i-computer-in-2024 .

What do you use to run syncthing in your iphone?

I recently switched from iOS to android because I wasn't happy I wasn't able to run syncthing in my phone (at least not in a straight forward way). After moving I discover things like the F-Droid store where you can find very interesting and more privacy aware apps.

How I Computer in 2024

An extended “uses” post that outlines the hardware I’m currently using, the software and tools that I use to get things done, and how I configure things.

I wrote a pretty bold statement in a presentation slide today:

"Wireguard is to networking what Linux was to operating systems"

Too bold?

For those moments, when you have to relax... https://vimeo.com/953720166
Relax

Vimeo
I read in this paper (https://arxiv.org/abs/cs/0603074 - April 2005) that 82% of the NAT devices tested supported UDP punching.
I wonder what that number is these days.
@danderson Are you allowed to share what % of direct connections are you seeing on all the tailnets created by Tailscale?
Peer-to-Peer Communication Across Network Address Translators

Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address. Several NAT traversal techniques are known, but their documentation is slim, and data about their robustness or relative merits is slimmer. This paper documents and analyzes one of the simplest but most robust and practical NAT traversal techniques, commonly known as "hole punching." Hole punching is moderately well-understood for UDP communication, but we show how it can be reliably used to set up peer-to-peer TCP streams as well. After gathering data on the reliability of this technique on a wide variety of deployed NATs, we find that about 82% of the NATs tested support hole punching for UDP, and about 64% support hole punching for TCP streams. As NAT vendors become increasingly conscious of the needs of important P2P applications such as Voice over IP and online gaming protocols, support for hole punching is likely to increase in the future.

arXiv.org

Thank you @dgentry for sending the grafana/@[email protected] link. That is *extremely* useful!

If I may. I have big plans for tsnet and wasm but I am having issues (https://github.com/tailscale/tailscale/pull/8325). I think @bradfitz fixed it but I am still having issues. Am I doing something wrong? Maybe it is not possible to run tsnet via wasm yet?

net/tstun, tsnet: make happier on WASI by bradfitz · Pull Request #8325 · tailscale/tailscale

Also fix a js/wasm issue with tsnet in the process. (same issue as WASI) Updates #8320 Fixes #8315

GitHub
@tailscale do you still use users/passwords in your internal Grafana dashboards?

@tailscale I am trying to run a tsnet app in the browser (wasm) but I get the following error when loading the wasm compiled go code in the browser:

tsnet: Executable not implemented for js. Do you know what may be happening here?

If I remove all the ts logic I can successfully run my code in the browser. Things fail when I incorporate the tsnet package and start my tsnet app.

@tailscale I have restarted tailscaled with --accept-routes. That has locked me out of the box.
The only solution I have found (I haven't tried it yet because the machine has to be rebooted first):
1. Remove the node from the tailnet (via the UI).
2. Enable device approval.
3. Restart the machine.
Then I should be able to ssh into the box and restart tailscaled without accepting routes.
Is this a valid solution?
Is there any other way that does not require a reboot?