For folks that are unable to port forward on the local router (eg CGNAT) I made this post on doing it via a VPS. I’ve scoured the internet and didn’t find a complete guide.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 days ago

    In most environments ipv6 bypasses cgnat (because, why would you need a nat with ipv6).

    • ntn888@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 days ago

      Like I said ip6 is useless when it comes to torrenting. Even if the tracker supports it it’s not persavive with users connecting to you.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 days ago

        The general topic was about self-hosting. IPv6 is very useful for self-hosting,… connections.

        I’ll admit there is a critical mass problem with torrenting clients, but if you’re trying to set up a wire guard tunnel with your friends, IPv6 is a absolute banger

  • andscape@feddit.it
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 days ago

    Nice, I recently went through the same struggle of setting up this configuration based on that LinuxServer post. My main nitpick on this is that automating the ip route configuration for the qBittorrent container is a pretty important step which is not explained in the post. Leaving any manual steps in any Docker setup is pretty bad practice.

    Since you’re using LinuxServer’s QBT image a good way to do this is to make use of their standard custom init scripts. You can just mount a script with the ip route commands to /custom-cont-init.d/my-routes.sh:ro on the container and it will be run automatically on each startup.

    Another nitpick is that the PostDown commands in the wireguard configs are useless since you’re running them in Docker.

    • ntn888@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 days ago

      Thanks for the addition. It’s also mentioned in that original blog post I linked in the article.

    • ntn888@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 days ago

      Yes that’s how I’m automating it, and it’s noted in the blog I highlighted. Your point about post down does make sense 😕

  • PunkiBas@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    3 days ago

    Thanks for the nice write-up, saving it in case I find myself behind CGNAT in the future.

  • ѕєχυαℓ ρσℓутσρє@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    3 days ago

    Hey, great post. I have one request. Can you maybe add some description for what the iptables entries do? I have a similar setup with a lot less iptables rules that works well for me. But I’m not an expert in networking, and am now worried that I might be missing something that can leak my home IP.

    • ntn888@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      3 days ago

      Thanks for the feed back. I started out with that post I referenced in my article, which had fewer entries. It didn’t work. Caveat was although the online port checkers were reporting the port as open, it was not actually making through the tunnel!

      I actually solved it by asking chatgpt!! I put in the suggestions and it worked. I’m also no expert on creating iptables, but once it was in place it seemed self explanatory.

      I ran netcat as client-server to test it actually worked.

      • andscape@feddit.it
        link
        fedilink
        English
        arrow-up
        4
        ·
        3 days ago

        Idk man, it seems pretty irresponsible to me to write a blogpost with stuff that you got from ChatGPT without understanding it. People will assume that if you wrote a blogpost on this then you know what you’re doing. ChatGPT gets stuff wrong all the time, and we’re talking about firewall configuration here. If it misconfigured some stuff it could leave you and your readers vulnerable to all kinds of shit.

        In this case it seems to me that (luckily) there’s just a bunch of redundant routing, but the next time it could be leaking your and your readers’ torrent traffic out of the VPN tunnel, leaving you vulnerable to legal repercussions for piracy.

        Please don’t authoritatively post stuff that you got from the automatic bullshit generator without understanding it.

        • ntn888@lemmy.mlOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          I understand what you mean. It’s become a habit of mine lately, and I learn lots in the discussion to.

          In my defence I did run some tests and confirm it’s functioning.

        • ntn888@lemmy.mlOP
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          2 days ago

          I understand what you mean. It’s become a habit of mine lately, and I learn lots in the discussion to.

          In my defence I did run some tests and confirm it’s functioning.

          • andscape@feddit.it
            link
            fedilink
            English
            arrow-up
            3
            ·
            2 days ago

            Look at the very least you should write in the blogpost clearly which parts are generated by LLMs, so your readers can decide whether to trust them.

      • ѕєχυαℓ ρσℓутσρє@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        3 days ago

        I took a look at it. From what I understand, some of the lines in your setup are redundant. The final product seems to do basically the same job as mine. In any case, if it works, it works.

    • Schlemmy@lemmy.ml
      link
      fedilink
      English
      arrow-up
      26
      ·
      3 days ago

      I’ve set up some tunnels. Works nice but then the voices came. ‘Why would you trust a company like Cloudflare with all your data?’ ‘Why rely on this one company for all your services?’

      Nearly a year into my selfhosting journey and I’m more confused than ever.

      • EmbarrassedDrum@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        3 days ago

        tl;dr: classic convenience/privacy. depends on your threat model. surely better than Google. models of zero trust will help.

        That’s a great question, that I have asked myself before too. It doesn’t have one answer, and any one would make their own choices based on their own respective threat model. I’ll answer you with some of my thoughts, and why I do use their services.

        I’ll take as an example my usage of NextCloud, coming as a replacement to Google Drive for example.

        let’s break up the setups:

        1. client (mobile app, desktop client, browser)
        2. communication to server
        3. server

        It’s oversimplified, but to the point: In Google’s setup, you have control of 0 out of three things.

        1. you use their closed source client, 2. they decide the communication to the server (if there’s any CDN, where their servers located, TLS version), and 3. data is on their servers, wether encrypted or not is up to them.

        In NextCloud’s setup,

        1. The clients are open source (you can varify them, or build your own),
        2. communication to server is up to you. and in this case you trust your data with CF, that’s right. gonna have to trust them.
        3. server is your server, and you encrypt the files how you want.

        From just this look, NC is clearly better off. now, it’s not perfect, and each one will do their own convenience vs privacy deal and decide their deal.

        If you deploy some sort of e2ee, the severity level of CF drops even more, because they’re exposed to less data. specifically for NC they do do e2ee, but each solution to its own. https://nextcloud.com/encryption/ this goes as an example for zero trust model. if you handle the encryption yourself (like using an e2ee service), you don’t have to trust the medium your data is going through. like the open internet.

        • fmstrat@lemmy.nowsci.com
          link
          fedilink
          English
          arrow-up
          3
          ·
          3 days ago

          surely better than Google

          This contradicts your threat model comment, though. If you fear Google’s access to your data, you fear nation states, or hate Google. Cloudflare is in the same boat for size, scope, and US ownership.

          • EmbarrassedDrum@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 days ago

            Obviously I’m not avoiding it all together, but I’m taking a step in the right direction.

            And it’s not just replacing Google by CF, because CF has much less access in comparison as I explain.

            you can deploy some zero trust models in your setup, and eliminate the threat even further. for example end to end encryption

            • fmstrat@lemmy.nowsci.com
              link
              fedilink
              English
              arrow-up
              2
              ·
              2 days ago

              Oh yes, wasn’t trying to say it was a bad decision at all. If it fits your threat model, and it makes life easier, it’s probably the right choice.

        • Schlemmy@lemmy.ml
          link
          fedilink
          English
          arrow-up
          4
          ·
          3 days ago

          Thanks. I agree with your conclusion. I probably have spent too much time in privacy communities. In the end you’ll have to trust someone.

    • ntn888@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      10
      ·
      3 days ago

      Yeah it’s a popular choice for various things. But wouldn’t it be against TOS using it for p2p and that amount of traffic?

      • EmbarrassedDrum@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        3 days ago

        gotta admit I haven’t read the ToS, but I didn’t encounter any problems. I’m streaming GBs of music via the tunnel and it still works. p2p I didn’t try, but I don’t really see a reason to?

        • asap@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          3 days ago

          Just remember that Cloudflare decrypts and re-encrypts all your data, so they can read absolutely everything that passes through those tunnels.

          • EmbarrassedDrum@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            3
            ·
            3 days ago

            mind elaborating?

            If I let them handle the TLS for me then I can see that. but if, for example, I’m using NextCloud, which implement end to end encryption from client to server, then I wouldn’t care if they did, no?

        • ntn888@lemmy.mlOP
          link
          fedilink
          English
          arrow-up
          3
          ·
          3 days ago

          Huh, good to know. I’m out remember some of us have traffic in the TBs pretty month!

    • ntn888@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      3 days ago

      Oh cool. I couldn’t find any info on doing this. And struggled lots at I don’t understand Iptables