boothin

joined 1 year ago
[–] boothin@kbin.social 15 points 8 months ago* (last edited 8 months ago) (8 children)

How exactly does that prevent spam, vs just using other existing established verification methods like email validation? If the only goal is preventing spam, its overkill, and other web sites who also have to contend with spam don’t use it.

It's trivial to create new accounts and emails to verify those accounts. It is not trivial to get a new phone number since virtual numbers are blocked by the verification process.

[–] boothin@kbin.social 35 points 1 year ago

there's an entire wikipedia article for this that makes it super easy https://en.wikipedia.org/wiki/Pirated_movie_release_types

[–] boothin@kbin.social 4 points 1 year ago (1 children)

Is it just me or does that "comparison" make no sense for this thread. It's mostly comparing vaultwarden to the cloud version of bitwarden, not the self hosted version. It only mentions the self hosted version in passing. It doesn't do anything to help someone choose between vaultwarden and self hosted bitwarden

[–] boothin@kbin.social 3 points 1 year ago* (last edited 1 year ago)

It sounds like what you need to do at this point is find what IP address your lemmy instance and mastodon instance containers are using on your VPS. you can do "docker inspect containername" and look for the IP address in there. it might be something like 172.16.0.1 for lemmy and 172.17.0.1 for mastodon. then you want to set up your reverse proxy to point lmy.my-domain.tld to 172.16.0.1:80 (or whatever port you set lemmy to use) and then mstdn.my-domain.tld to point to 172.17.0.1:80 (again, port might be different, i dont know what the default port is)

-IF- both of the containers are using the same IP, then you will need to make sure that they are using different ports. if they are on the same ip and same port, whichever container loads 2nd will fail to properly load, because when a port is taken on an IP address, it is reserved and nothing else can try to listen on that port.

[–] boothin@kbin.social 9 points 1 year ago (2 children)

So a reverse proxy is sort of like a phonebook or directory, it routes outside requests to the appropriate place. So imagine your reverse proxy is a receptionist, someone comes in and says "hey I am looking for plex.mydomain.com" the receptionist would then use the phonebook and say "ok if you are looking for plex.mydomain.com, go to building 192.168.1.10 (the ip), room 9000 (the port)"

Since you are asking about dockerized services, the networking for those can be done in several different ways, but the one thing that really matters is that each service needs to have a unique combination of ip and port, because only 1 service can live at each address. With docker, you could set up multiple services that use the host server's ip, in which case each container will need to be on different ports, or you could have it so each container has its own ip, in which case the port can be anything.

[–] boothin@kbin.social 2 points 1 year ago (1 children)

I'm fairly certain hardware based 2fa has been around since the early 90s maybe even earlier. It's not the maturity that's the issue, as I'm fairly certain its significantly older than application based, but that it's extremely inconvenient for the user to have to buy a physical key and keep it safe

[–] boothin@kbin.social 1 points 1 year ago (1 children)

I would also test by connecting to the vpn and trying to go to a service's ip or ping an ip on the network behind the vpn from the browser. I use juice and ovpn on my router as well and it works fine, so its unlikely to be a juice specific problem

[–] boothin@kbin.social 0 points 1 year ago (2 children)

Look into NUT, Network UPS Tools. It runs in a server/client type of set up. You'd install the server onto the device that has the UPS data connected to it. It then monitors the UPS status and can tell all the clients to shutdown when the UPS is running low.