jb55's avatar
jb55 _@jb55.com 4 months ago
looks like my node and zaps are down until I switch ISPs. plz no force close me in the meantime. should be back up on nov 5th
jb55's avatar jb55
can anyone connect to my lightning node? I think my ISP started blocking inbound connections to lightning =/ 03f3c108ccd536b8526841f0a5c58212bb9e6584a1eb493080e7c1cc34f82dad71@ln.damus.io:9735
View quoted note →

Replies (23)

jb55's avatar
jb55 _@jb55.com 4 months ago
yeah, this is giving me the opportunity to finally switch to a 3Gbps fibre connection with a proper business plan that guarantees a static ip. I just lucked out with the consumer static ip before I guess.
jb55's avatar
jb55 _@jb55.com 4 months ago
hosting on ISPs has always been a non reliable thing because of CGNATs. requiring an ISP business plan to run a routing lightning node is the real issue. maybe ipv6 fixes this, maybe not
jb55's avatar
jb55 _@jb55.com 4 months ago
looks like the buyout of shaw to rogers kicked us all off into cgnats without even asking. rogers fucking sucks so I'm switching to telus.
jb55's avatar
jb55 _@jb55.com 4 months ago
rogers are the biggest cunts of the canadian isps, always has been
I've been pretty impressed by the latest wireguard features, or maybe it's the systemd-networkd integrations, but it manages the routes and masquerade for you. Recovers from network outages automatically and never have to touch it.
jb55's avatar
jb55 _@jb55.com 4 months ago
thanks for this idea. i use my wireguard for masquerading vpn connections, but never thought about setting up a persistent tunnel for a specific port. will try
yeah, that's why I like it so much. It's such a clean config. Tho, yeah I just remembered you do have to setup DNAT, SNAT, and FORWARD yourself on the exit node, that's where you'll do the public ports -> wireguard interface..
Cheat sheet for ya: wg_ip1=ip of your wg0 on the remote wg_ip2=ip of your wg0 on local iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 9735 -j DNAT --to-destination $wg_ip2:9735 iptables -t nat -A POSTROUTING -o wg0 -p tcp -d $wg_ip2 --dport 9735 -j SNAT --to-source $wg_ip1 iptables -A FORWARD -i eth0 -o wg0 -d $wg_ip2 -p tcp --dport 9735 -m conntrack --ctstate NEW -j ACCEPT iptables -A FORWARD -i eth0 -o wg0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT iptables -A FORWARD -i wg0 -o eth0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
Bison's avatar
Bison 4 months ago
Remember, remember, the fifth of November
↑