Run a quick network test.
docker run --rm -it --workdir=/tmp alpine sh -c 'apk add -u bash grep; wget -qO- network-speed.xyz | su -s /bin/bash nobody'
# Podman Compose File that runs Windows in KVM + QEMU | |
# | |
# Upstream: https://github.com/dockur/windows | |
# | |
# Note: Can't run this rootless as the netardvark proxy doesn't create a host | |
# network interface for communication with the container which is what's | |
# expected for the iptables NAT port forwarding rule to work for port 3389. | |
# Instead it arrives appearing to be from the same interface and skips the nat | |
# redirect and fails. | |
# |
#!/usr/bin/env python | |
"""Prefix wrapper for wireguard-vanity-address | |
* Improve performance for generating keys with common prefixes. | |
* Extract prefixes delimited by a '+' or '/'. | |
* Exit at least on match for each prefix. | |
Usage: | |
$ wg-vanity.py ex{1,2,3} | |
Searching for ['ex1/', 'ex1+', 'ex2/', 'ex2+', 'ex3/', 'ex3+'] with ['wireguard-vanity-address', '--in', '2', 'ex'] |
From 27869268409c6bb7247d5fff51f80b31792825c0 Mon Sep 17 00:00:00 2001 | |
From: Kyle Manna <kyle@kylemanna.com> | |
Date: Sun, 1 Oct 2023 01:56:26 -0500 | |
Subject: [PATCH] release: linuxptp 4.1 | |
* Many changes! | |
--- | |
.SRCINFO | 6 +++--- | |
PKGBUILD | 7 +++---- | |
2 files changed, 6 insertions(+), 7 deletions(-) |
#!/usr/bin/env python3 | |
""" Tailscale Per Host Default Router Disabler | |
Tailscale allows a single tailnet wide "Override local DNS" setting that works | |
great for mobile and random cloud machines I have. However, my more elaborate | |
setups require the ability to turn this off and use local DNS as the default | |
route. | |
Unfortuantely with Tailscale as of v1.40.0 there's only two options: | |
1. Tailnet wide "local DNS override" (Turns out tailscale's internal resolver |
#!/usr/sbin/nft -f | |
# | |
# Can't block DHCP like a normal service beacuse it use raw sockets and bypasses nftables filter chains. Instead use and ingress chain. | |
# | |
flush table netdev filter | |
table netdev filter { | |
# Earliest filtering chain | |
chain ingress { | |
type filter hook ingress device wan0 priority -500; |
Requirement: Console access.
Refs: