

Mull was part of the DIvestOS project, which has recently been discontinued.
For a similarly strengthened fork, I’ve been using IronFox after seeing it recommended on Lemmy.
Languages: Français, English
Pronouns: They/them
Communities:
Mull was part of the DIvestOS project, which has recently been discontinued.
For a similarly strengthened fork, I’ve been using IronFox after seeing it recommended on Lemmy.
They meant pinging your server from another device, I assume.
What error(s) do you get when you try to SSH into your server?
By “can’t access containers”, I assume you mean via devices you’re trying to connect to the server with? Can you still access the stuff you’re running in the containers directly on the server via localhost?
I’ll echo what the other commenter’s have said and you need to give us more info. “I added two containers” is pretty much useless if that’s all we have to go off of to start troubleshooting. More details on what exactly you did, any troubleshooting steps you’ve already tried, what specific errors you get, etc.
I can only assume it’d be a bridge for Nextcloud Talk.
I was having issues getting my Android device to use my local DNS server over VPN, what worked for me was setting it up through RethinkDNS. There’s a setting to prevent DNS leaks by capturing all traffic on port 53 and directing it to the DNS server you set. It doesn’t feel like an elegant solution but hey, it works.
Note, you’ll have to make sure your private DNS setting is off, in the internet section of the system settings.
From a quick Lemmy search, I’ve seen Njalla and 1984.hosting being recommended for these kinds of uses.
I could do that, but I want to avoid opening ports on my router’s firewall apart from the one necessary for Wireguard. I can access all my other stuff through Wireguard, but I can’t wrap my head around why it seemingly can’t access Unbound on the local host.
The reason for the VPN is to have access to my Unbound DNS on my phone from anywhere, not only my local network. If I just wanted to configure the DNS on my local network, I’d set up static IP for my network in Android’s settings and input the DNS server manually. This works fine when I set it up, but like I said I want to use Unbound on my phone anywhere via Wireguard.
I’m not sure what’s the second thing you want me to clarify! Sorry for the confusion, I appreciate you trying to help out :)
Android doesn’t let me add an IP address under private DNS, it needs to be a domain (like dns.quad9.net rather than 9.9.9.9).
I tried adding a quick DuckDNS domain to my reverse proxy towards port 53, where Unbound is listening. It works, as in I can nslookup using the DuckDNS domain on my desktop (or on my phone when not connected to Wireguard) but if I try to set that domain as my private DNS on Android it says it can’t connect, whether or not I’m on my VPN.
I think you misunderstood part of my post, because there’s only one VPN tunnel, from the WG client on my phone to the WG server on my laptop.
I want my phone to use the Unbound DNS server, which is hosted locally on the same laptop that runs my Wireguard server.
EDIT: Note, I don’t want to setup the DNS router-side via DCHP because I want to use Unbound to block a bunch of stuff that my roommates use, like Facebook.
When connected through wireguard can you access anything on the local network?
Everything works as expected with Wireguard otherwise, I can ssh into my server or my desktop, and access the other things hosted on my server (although these are all through Docker, which is why I suspect container isolation to be an issue).
Does this issue also happen when you’re on another network and vpning back?
Yup, same issues whether I’m on the local network, the WiFi at work, or on LTE.
Ottawa announced yesterday that they’ll be dropping more than half of federal internal trade barriers.