OpenVPN
Mastodon
Our great sponsors
OpenVPN | Mastodon | |
---|---|---|
81 | 1,225 | |
9,911 | 45,874 | |
2.4% | 0.8% | |
9.2 | 10.0 | |
4 days ago | 6 days ago | |
C | Ruby | |
GNU General Public License v3.0 or later | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
OpenVPN
-
Ask HN: Who is hiring? (October 2023)
OpenVPN is hiring! https://openvpn.net/
C++ Developer in the United States. Full-time| Fully remote| Flexible work schedules
Link to look at vacancy details and apply:
-
Are there any work arounds for the Netflix new "household" system?
How you connect to your modem will depend on the device you are using, but for windows laptops as an example you download the OpenVPN program and input your modem details there, much like you would any other vpn service. I think there would be some guides on youtube. https://openvpn.net/
-
Can i use PFSense to control incoming user connections (without a vpn?)
I just started playing with CloudConnexa for remotely managing my second pFSense. Really nice and is free for up to 3 concurrent users. https://openvpn.net. Can also self-host OpenVPN access server with a free 2 concurrent license.
-
Is the 7spotlight Markle family interview airing now? Is anyone watching and can provide comment? ๐๐บ
If anyone is being blocked check out free OpenVPN
-
gluetunvpn docker help
It is likely an issue with the 'cipher' options, if any, that are in your ".opvn" file. This is telling you that the opvn setting is not finding a matching cipher it is allowed to use. The fix per the message would be to add the Servers cipher to your options. https://github.com/OpenVPN/openvpn-gui/issues/381 https://github.com/OpenVPN/openvpn/blob/master/doc/man-sections/cipher-negotiation.rst
-
Is it possible for a sysadmin to block only some packets from a VPN connection ?
I too haven't used the client-nat directive in some years (I currently implement 1:1 NAT with pfsense to access my network because I'm too lazy to change the networks subnet from the default) so I decided to retest and it does appear that OpenVPN Connect clients do not properly support the client-nat directive but the traditional OpenVPN server/clients still do. I've just tested this on OpenVPN 2.6.3 Server, OpenVPN 2.6.1 GUI for Windows from openvpn.net, and OpenVPN Connect iOS 3.3.3 and only the OpenVPN Connect client has any difficulty. Difficulty being that you can use client-nat successfully but it has to be configured server-side it can't be pushed to or setup on the client (OpenVPN Connect) side. The Server and Windows (non-OpenVPN Connect) clients work an any setup whether it's configured server-side, pushed to the client, or set up in the client config.
-
WebUI not accessible, even with port opened
Ask openvpn.net for commercial support: https://support.openvpn.com/
-
My Installed App as Developer
OpenVPN is a VPN client that I used primarily for work. We used VPN to connect to the dev server and we are using VPN. I also sometimes used that to open websites that got blocked in Indonesia like Reddit.
-
minexmr2.com updated to p2pool v3.1, monerod v0.18.2.0, and ready for Mar 18 p2pool (not monero) hardfork
I connect all the servers with secure OpenVPN private network. And block unused ports anywhere with ufw.
-
A little server help would be appreciated (a bit out of my depth)
Ensure remote access is by VPN only like the site-to-site with Ubiquitis gear, WireGuard or OpenVPN and there could be a paid option I just don't know.
Mastodon
-
Alt Text box can't fit one screenshot of text
Interestingly there is some discussion for Mastodon with people asking the limit to be smaller, which raises the question as to the purpose of alt text, and how to properly handle larger text lengths in screen reader programs.
https://github.com/mastodon/mastodon/issues/12268
-
Open source at Fastly is getting opener
Through the Fast Forward program, we give free services and support to open source projects and the nonprofits that support them. We support many of the worldโs top programming languages (like Python, Rust, Ruby, and the wonderful Scratch), foundational technologies (cURL, the Linux kernel, Kubernetes, OpenStreetMap), and projects that make the internet better and more fun for everyone (Inkscape, Mastodon, Electronic Frontier Foundation, Terms of Service; Didnโt Read).
-
Bluesky announces data federation for self hosters
Mastodon DMs have absolutely no privacy: https://github.com/mastodon/mastodon/issues/18079
For a decentralized protocol doing things right is much more important than doing things fast, it is very difficult (and in a lot of cases impossible) to break backwards compatibility.
- External OpenID Connect Account Takeover by Email Change
-
Ask HN: Best practice for posting links to large Mastodon threads?
Postmortem on what happened here: https://news.ycombinator.com/edit?id=39305884
The v1 API of Mastodon limits the size of the tree that it will expand for users who are not logged into the server: https://github.com/mastodon/mastodon/blob/main/app/controllers/api/v1/statuses_controller.rb . I am guessing that this or some similar limit applies to threads being returned to unauthenticated users of the web UI. It just arbitrarily stops expanding the replies at some point, including the main thread from the OP.
If a thread is truncated, users expect it to expand automatically and autoscroll when you hit the bottom. In my desktop browser, that does not occur, and there is no indication that there is more to see. This is the situation of the web interface as of Mastodon version 4.2.5.
The issue is very sensitive to observer conditions. If you are logged into the server, the behavior is different. If you use a Mastodon app instead of the web, the behavior might be different. As the tree expands, the cutoffs become different. If you look at the thread on a different Mastodon server, the tree is different because every server has its own view of the Fediverse.
HN needs a best practice for linking to Mastodon threads in a way that provides a consistent experience to HN readers. The average Mastodon server would be crushed by hundreds of HN readers grabbing the entirety of a huge thread all at once, so this might involve some thread-unroll-and-cache service. I tried https://mastoreader.io/ but it did not solve the problem.
Alternately, we push changes into the Mastodon web UI to warn users when they need to click to see more and assume that people will get used to the navigation.
Suggestions?
-
CVE-2024-23832 Mastodon Vulnerability: Remote user impersonation and takeover
Fixed in Mastodon v4.2.5 https://github.com/mastodon/mastodon/releases/tag/v4.2.5
-
Unity's Open-Source Double Standard: The Ban of VLC
>You can defeat the Affero clause by putting the software behind a proxy, for example
Could someone elaborate on this? This is NOT my understanding of the license, and it seems absurd considering e.g. Mastodon is AGPL but the standard install requires a reverse proxy[1]. If using a proxy defeats Affero, why would the Mastodon team do this? Are they stupid?
[1] https://github.com/mastodon/mastodon/blob/main/dist/nginx.co...
-
You Can't Follow Me
Mastodon is free and open-source. Go ahead and add the flag:
https://github.com/mastodon/mastodon/blob/main/CONTRIBUTING....
- Change Referer value to something generic such as "urn:activitypub:Mastodon"
-
Welcome to the public domain, Steamboat Willie
Didn't say anything about freedom of speech. And again: I'm not the one to talk to. I don't have any strong feelings on the topic, but if you do, you should take it somewhere that people who can do something about it will see.
I tried to find an existing discussion to help get you started, but couldn't. You can start one here: https://github.com/mastodon/mastodon/issues
It's easy to sit here on Hacker News and say "they should just..."
Coming up with a standard for an international project will be a long, noisy discussion. You'll tread on internecine conflicts you had no idea about. Old wounds from past related discussions will come out. People will soapbox.
This is why I have no interest in discussing it. It probably won't go anywhere in a place where it actually could. It definitely won't here.
What are some alternatives?
tinc - a VPN daemon
diaspora* - A privacy-aware, distributed, open source social network.
Pritunl - Enterprise VPN server
Misskey - ๐ An interplanetary microblogging platform ๐
ocserv
Lemmy - ๐ A link aggregator and forum for the fediverse
tailscale - The easiest, most secure way to use WireGuard and 2FA.
Friendica - Friendica Communications Platform
openvpn3-linux - OpenVPN 3 Linux client
GNU social - GNU social is social communication software for both public and private communications.
SoftEther - Cross-platform multi-protocol VPN software. Pull requests are welcome. The stable version is available at https://github.com/SoftEtherVPN/SoftEtherVPN_Stable.
nostr - a truly censorship-resistant alternative to Twitter that has a chance of working