orris

joined 2 years ago
[–] [email protected] 4 points 3 months ago (1 children)

It doesn’t seem to be, they look like different cables, look at the strain relief after the clear part, looks like a different pattern and shorter. They are probably both fully seated.

[–] [email protected] 7 points 3 months ago (2 children)

Yes, or the systems etc. Or the port is disabled if the switch has the ability.

[–] [email protected] 7 points 3 months ago

‘Type disco into console for lights’ for CS

[–] [email protected] 4 points 3 months ago (1 children)

What is something something “*******”

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago)

Thats great! Overly simplistic explanation, the container is in its own little network and when you connect wireguard inside the container it is punching a hole out to where the wireguard server is located. Without knowing your setup its difficult, but that is probably why your ping is acting as it does. The container doesn’t know how to get to where you’re attempting to ping.

The allowed ips is a list, off the top of my head it accepts single IPs and cidr blocks. 0.0.0.0/0 is the cidr block that essentially means all ipv4 IPs, ::/0 is the same for ipv6. So to answer directly, the , is an or, its for any IP in the list.

[–] [email protected] 4 points 6 months ago* (last edited 6 months ago) (2 children)

Does your wireguard config have ipv6 addresses? If your not using them you can safely remove them.

For example Change AllowedIPs = 0.0.0.0/0, ::/0 To AllowedIPs = 0.0.0.0/0

Also could try adding net.ipv6.conf.all.disable_ipv6=1 in the sysctls section

Multiple edits: I’m terrible with formatting while not on a phone.

More edits: just found out i can expand errors and the compose. Looks like it is the AllowedIPs line in peer1.conf. Just removing , ::/0 as above “should” solve it