• 235 Posts
  • 1.26K Comments
Joined 3 years ago
cake
Cake day: July 7th, 2023

help-circle








  • Yes, that’s called Round-Robin Load Balancing.

    To get more specific, your DNS provider spins up a large number of DNS resolvers out in the world on a CDN network that resolves clients to the most geographically convenient server(s) at any point in time based on the GeoIP info of your public IP.

    Once you resolve one set of addresses at any given time, it caches your request, so the next time you ask these DNS servers for something you’ll get a response right back from them as fast as possible.

    You constantly checking is just going to show this. It’s quite normal.



  • I might be misunderstanding, but you’re checking what exactly for DNS leaks?

    If the IPs are changing, that’s not uncommon. The HOST changing would be though, like if you swapped from what you expected back to Comcast or something.

    You need to get better control of your local network and not have to be paranoid about this. Static reservations for long lived hosts, your router should have a setting to override and prevent internal hosts (like guests) from sending OoB DNS requests, and any sort of VPS stack should as well.



  • Well, firstly, it’s not what Tailscale is meant for. I’m getting downvoted by the people using the wrong tool for the wrong job.

    You don’t install a VPN on all your local machines just to talk to each other. That’s insane. You especially don’t install one that, while misconfigured, is sending all of its traffic OUTSIDE of your local network, then back in. This is what Tailscale on a number of local machines will do by default.

    The way Tailscale works is by installing a Wireguard client on a machine. It then checks in with their DERP servers to figure out it’s network situation (behind NAT, peers in the network, routing tables…etc). So when you have more than one client on the Tailscale network, it automagically assumes some things, the first being that these two machines dont have a more direct route to talk to each other.

    So then it will attempt to bridge a path between the DERP server each client is checked into, and pass traffic that way. Which means you then have two machines on the same local network sending traffic OUTSIDE of that network, then back in to complete a VPN network.

    This is stupid.

    You setup multiple different networks and use exit nodes to bridge two networks together with Tailscale. That’s the entire point. This means setting up routes to let the orchestration layer know that a set of certain machines exist in the same network, and shouldn’t use Tailscale to communicate with each other. Then it will only be using routes for REMOTE networks, where other clients exist, to pass traffic over the Tailscale network.

    May I ask what you were planning on doing with Tailscale? I can point you in the right direction.



  • If you’re not comfortable using SSH, each Linux DE comes with its own RDP setup, so refer to the docs of whichever you’re running to set that up if you want things to be super simple.

    Past that, there’s tons of stuff, but I would generally avoid VNC these days because it’s pretty much a dead protocol that is insecure and inefficient.

    Some people prefer to use RDP compatible tools, some people just use Moonlight. You can use whatever is comfortable for you, really. I would avoid all the suggestions that are telling you to install the giant constructs like Mesh Central though. That’s overkill for just two machines here.


  • just_another_person@lemmy.worldBanned from communitytoSelfhosted@lemmy.worldwhat is good remote desktop software?
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    3
    ·
    1 month ago

    I hate having to continuously point this out, but DO NOT DO THIS unless you have a deeper understanding of networking.

    “Just installing Tailscale” without proper configuration of the default routes is going to cause all kinds of routing inefficiencies and loopbacks in your internal network that is absolutely unnecessary, especially for what OP asking for.

    This is just bad advice.



  • just_another_person@lemmy.worldBanned from communitytoSelfhosted@lemmy.worldSelf hosted live streaming
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 month ago

    Need more details here:

    1. What’s your bandwidth and delivery medium like?
    2. What are your edge/router specs?
    3. What hardware would you be hosting this on?
    4. What format are you expecting to stream (audio and video formats)?
    5. Related to #5, what hardware would you streaming from?

    OBS and Owncast should allow you to do this for the most part, but it’s heavily dependent on all of the above.