Perhyte

joined 1 year ago
[–] Perhyte@lemmy.world 1 points 1 week ago

My Linux laptop is set to check for updates daily, which I then apply manually when I notice the tray icon. I sometimes procrastinate when it comes to reboots though.

My Android phone is on auto-update, which seems to mean whenever it's being charging for a few hours (so typically when charging overnight). Because the battery is still pretty good and I don't need to charge daily, that comes down to once every 2-3 nights or so.

My personal Linux servers (which run my self-hosted apps) are configured to automatically apply all updates (and reboot if necessary afterwards) at the time of day I'm most likely to be awake and available to manually fix stuff if anything goes wrong. The Docker-containers that run on them mostly get auto-updated to the latest version every 6 hours by Watchtower. A few containers have more cautious policies though, ranging from pinning a major version (but auto-upgrading to new minor versions within that) to pinning a specific version and at most sending a notification if there's an update. The latter is limited to stuff that has broken before and/or where newer releases are known to be buggy or incompatible.

When it comes to major updates (i.e. new distro releases) of my Linux machines, I typically wait about a month before upgrading because I've been bitten by release-day bugs before.

[–] Perhyte@lemmy.world 8 points 1 month ago (1 children)

No idea about the Lemmy hosting bit, but I highly doubt that .com you got will renew at $1 going forward. Judging by this list it'll most likely be $9+ after the first year.

At $1/year, the registrar you used is taking a loss because they pay more than that to the registry for it. They might be fine with that for the first year to get you in the door, but they'd presumably prefer to be profitable in the long term.

[–] Perhyte@lemmy.world 4 points 2 months ago* (last edited 2 months ago)

In Europe I get a voting pass sent in the mail for every election. To vote I have to show both this pass and a valid ID.

In the Netherlands it doesn't even have to be a valid ID. If it hasn't been expired for more than 5 years it's fine for voting purposes.

[–] Perhyte@lemmy.world 2 points 2 months ago

Try exiting it and then make sure no tmux process is still running, by for example running ps -aux | grep tmux.

For future reference: the command to kill the tmux daemon (and as a side-effect, all other running tmux processes connected to it) is tmux kill-server (or in tmux, typing :kill-server, assuming default keybindings).

[–] Perhyte@lemmy.world 3 points 3 months ago* (last edited 3 months ago) (2 children)

The -b in crond -b means to run it as a daemon (in the background), though it appears that is also the default (source). This means the script will continue, but since that's the last line it exits. With the entrypoint stopped, the container also stops.

The fix should be to replace that line with exec crond -f so the crond process runs in the foreground and becomes the main process running in the container, replacing the entrypoint script. crond -f without exec should also work, but that needlessly keeps an extra process (the shell running the entrypoint script) alive.

[–] Perhyte@lemmy.world 19 points 3 months ago

If you don't mind using a gibberish .xyz domain, why not an 1.111B class? ([6-9 digits].xyz for $0.99/year)

[–] Perhyte@lemmy.world 2 points 3 months ago

Any chance you've defined the new networks as "internal"? (using docker network create --internal on the CLI or internal: true in your docker-compose.yaml).

Because the symptoms you're describing (no connectivity to stuff outside the new network, including the wider Internet) sound exactly like you did, but didn't realize what that option does...

[–] Perhyte@lemmy.world 2 points 4 months ago* (last edited 4 months ago) (1 children)

It also means that ALL traffic incoming on a specific port of that VPS can only go to exactly ONE private wireguard peer. You could avoid both of these issues by having the reverse proxy on the VPS (which is why cloudflare works the way it does), but I prefer my https endpoint to be on my own trusted hardware.

For TLS-based protocols like HTTPS you can run a reverse proxy on the VPS that only looks at the SNI (server name indication) which does not require the private key to be present on the VPS. That way you can run all your HTTPS endpoints on the same port without issue even if the backend server depends on the host name.

This StackOverflow thread shows how to set that up for a few different reverse proxies.

[–] Perhyte@lemmy.world 2 points 5 months ago

If there happens to be some mental TLS handshake RCE that comes up, chances are they are all using the same underlying TLS library so all will be susceptible…

Among common reverse proxies, I know of at least two underlying TLS stacks being used:

  • Nginx uses OpenSSL.
    • This is probably the one you thought everyone was using, as it's essentially considered to be the "default" TLS stack.
  • Caddy uses crypto/tls from the Go standard library (which has its own implementation, it's not just a wrapper around OpenSSL).
    • This is in all likelihood also the case for Traefik (and any other Go-based reverse proxies), though I did not check.
[–] Perhyte@lemmy.world 2 points 8 months ago (1 children)

Have you considered putting alias htop=btop (or equivalent) in your shell profile?

[–] Perhyte@lemmy.world 2 points 8 months ago

This was my immediate suspicion as well, as soon as I read that it would leak for a GET but not a HEAD.

view more: next ›