jb55's avatar
jb55 _@jb55.com 4 months ago
can anyone connect to my lightning node? I think my ISP started blocking inbound connections to lightning =/ 03f3c108ccd536b8526841f0a5c58212bb9e6584a1eb493080e7c1cc34f82dad71@ln.damus.io:9735

Replies (33)

jb55's avatar
jb55 _@jb55.com 4 months ago
my ip has been static for like a year. they changed it to the one I have now: dig +short myip.opendns.com @resolver1.opendns.com 24.84.153.116 so I updated my dns (ln.damus.io) to that, but now I can't connect to it from my external VPS. thinking rogers (my isp) started filtering me. no other config has changed.
jb55's avatar
jb55 _@jb55.com 4 months ago
rogers recently bought shaw (the ISP i was with). it looks like i just got kicked off my static ip into a CGNAT, so I can't host anything anymore. lame.
I'm passing off a 2 second AI query as my own 😂 Alternatives to Cloudflare Tunnel For ease of use and features: ngrok: A popular and feature-rich option for developers, it's known for being easy to set up and use, offering features like TLS tunnels. LocalTunnel: A straightforward and easy-to-use tool for quickly exposing a local port to the internet. Pinggy: A simple and accessible alternative for creating tunnels. For private networks: Tailscale: Ideal for securely connecting your own devices in a peer-to-peer network, often used for accessing a home lab or NAS. Unlike Cloudflare Tunnel, which acts as a reverse proxy, Tailscale creates a private network that only your devices can join. For self-hosted and maximum control: Pangolin: A self-hosted solution that combines features of Cloudflare Tunnels and other tools like Traefik using WireGuard for a high degree of control over your infrastructure. Traefik: A modern reverse proxy that can be used to build self-hosted solutions similar to Cloudflare Tunnel, giving you full control over your setup. Other options: LocalXpose: Another alternative for tunneling. Zrok: A self-hosted option with a focus on privacy and easy sharing.
jb55's avatar
jb55 _@jb55.com 4 months ago
I don’t think there was an agreement, it was just how shaw had their network setup
jb55's avatar
jb55 _@jb55.com 4 months ago
Already did this but just used wireguard since tailscale is a backdoor into your network nevent1qqsgk2hhnr5zh7fgc0k9c48t3n05tdtmwl6n383em9hntgqtz4zlxtgl9ynyx
jb55's avatar
jb55 _@jb55.com 4 months ago
tailscale has a control plane which can add a removes machines to your mesh. they control this unless you run your own. its just simpler to run wireguard imo
jb55's avatar
jb55 _@jb55.com 4 months ago
they could in theory backdoor into any tailscale network. scary shit. I wouldn't be surprised in governments are already thinking about using this.
matevz's avatar
matevz 4 months ago
seems to work? { "id": "03f3c108ccd536b8526841f0a5c58212bb9e6584a1eb493080e7c1cc34f82dad71", "features": "0898882a8a59a1", "direction": "out", "address": { "type": "ipv4", "address": "45.79.91.128", "port": 9735 } }
IPv4s finally got expensive enough that it became worth it for legacy carriers to transition networks over to CGNAT, at least if they’re already redoing it like in an acquisition. Sucks…
Not true, or not entirely true The control plane can be self hosted (headscale), and they have a mitigation for mitm or attack surface in the control plane - tailscale lock. It's FOSS, on their clients, if their control plane is FULLY compromised, literally completely taken over, they can still not add new machines, nor access them, at best they can shut you out of derp (can't even prevent your already logged in machines to connect because holepunch)
basically tailscale does direct connections between nodes, yes, and it is encrypted but these nodes at the start don’t know each other, they ask the tailscale control plane “what nodes are there” if the control plane lies and inserts fake/impersonating nodes, it could pretend to be your trusted laptop for example
jb55's avatar
jb55 _@jb55.com 4 months ago
this makes no sense. if they couldn't add machines then how do they add your machines? something has to coordinate everything.
With lock, YOU are the one coordinating. After a machine gets added it can't do anything until YOU sign a lock message. (I.e. sign its pubkey and publish that)