Hacker News .hnnew | past | comments | ask | show | jobs | submit | alpn's commentslogin

For anyone wondering: AF_ALG is a Linux socket interface that exposes the kernel’s crypto API via file descriptors, using normal read(2)/write(2) calls for hashing and encryption.

I wonder can the kernel just remove it and distros put on a compatiability layer.

It's already a configurable option in the kernel which can be fully disabled by distros if they wanted to provide their own compatibility layer, or just not ship any software that has a hard dependency on it.

I always use only custom compiled kernels on my computers, where I enable only the configuration options that I really need.

So the options related to AF_ALG have always been disabled, because I have not encountered an application that needs them, among those that I use.

Unfortunately the Linux distributions must enable in their default configuration most options, because they cannot predict what their users will need.


here's the mailing list thread in case anyone is interested:

https://marc.info/?t=177377722400001&r=1&w=2


In case anyone else is wondering -

Neo:

  Height: 0.50 inch (1.27 cm)
  Width: 11.71 inches (29.75 cm)
  Depth: 8.12 inches (20.64 cm)
  Weight: 2.7 pounds (1.23 kg)
Air:

  Height: 0.44 inch (1.13 cm)
  Width: 11.97 inches (30.41 cm)
  Depth: 8.46 inches (21.5 cm)
  Weight: 2.7 pounds (1.23 kg)


It feels like they did everything they could so that the cheap MacBook with an iPhone CPU would not be lighter than the 1.5x more expensive MacBook with Apple Silicon


Thank you, from my cursory look of their comparison page, this is the information that was missing. But maybe that was a deliberate choice on Apple's part.


Nah it's on there.


Not OP, but I believe they are paraphrasing "First They Came…". https://en.wikipedia.org/wiki/First_They_Came


I'm working on https://wireplug.org: A simple, free, and open source connectivity coordinator for WireGuard. Basically a way to keep WireGuard tunnels connected while moving between different access points. It handles (basic) NAT traversal and works with the in-kernel WireGuard driver on Linux and OpenBSD. You can find the technical details at https://wireplug.org


> I'd rather expose a Wireguard port and control my keys than introduce a third party like Tailscale.

I’m working on a (free) service that lets you have it both ways. It’s a thin layer on top of vanilla WireGuard that handles NAT traversal and endpoint updates so you don’t need to expose any ports, while leaving you in full control of your own keys and network topology.

https://wireplug.org


Apparently I'm ignorant about Tailscale, bacause your service description is exactly what I thought Tailscale was.


The main issue people have with Tailscale is that it's a centralised service that isn't self hostable. The Tailscale server manages authentication and keeping track of your devices IPs.

Your eventual connection is direct to your device, but all the management before that runs on Tailscales server.


Isn't this what headscale is for?


This is very cool!

But I also think it's worth a mention that for basic "I want to access my home LAN" use cases you don't need P2P, you just need a single public IP to your lan and perhaps dynamic dns.


Where will you host the wg endpoint to open up?

- Each device? This means setting up many peers on each of your devices

- Router/central server? That's a single point of failure, and often a performance bottleneck if you're on LAN. If that's a router, the router may be compromised and eavesdrop on your connections, which you probably didn't secure as hard because it's on a VPN.

Not to mention DDNS can create significant downtime.

Tailscale fails over basically instantly, and is E2EE, unlike the hub setup.


To establish a wg connection, only one node needs a public IP/port.

> Router/central server? That's a single point of failure

Your router is a SPOF regardless. If your router goes down you can't reach any nodes on your LAN, Tailscale or otherwise. So what is your point?

> If that's a router, the router may be compromised and eavesdrop on your connections, which you probably didn't secure as hard because it's on a VPN.

Secure your router. This is HN, not advice for your mom.

> Not to mention DDNS can create significant downtime.

Set your DNS ttl correctly and you should experience no more than a minute of downtime whenever your public IP changes.


> one node needs a public IP/port

A lot of people are behind CGNAT or behind a non-configurable router, which is an abomination.

> Secure your router

A typical router cannot be secured against physical access, unlike your servers which can have disk encryption.

> Your router is a SPOF regardless

Tailscale will keep your connection over a downstream switch, for example. It will not go through the router if it doesn't have to. If you use it for other usecases like kdeconnect synchronizing clipboard between phone and laptop, that will also stay up independent of your home router.


A public IP and DDNS can be impossible behind CGNAT. A VPN link to a VPS eliminates that problem.


The VPS (using wg-easy or similar solutions) will be able to decrypt traffic as it has all the keys. I think most people self-hosting are not fine with big cloud eavesdropping on their data.

Tailscale really is superior here if you use tailnet lock. Everything always stays encrypted, and fails over to their encrypted relays if direct connection is not possible for various reasons.


When I said "you just need a single public IP" I figured it was clear that I wasn't claiming this works for people who don't have a public IP.


I'm working on https://wireplug.org: A simple, free, and open source connectivity coordinator for WireGuard. Basically a way to keep WireGuard tunnels connected while moving between different access points. It handles (basic) NAT traversal and works with the in-kernel WireGuard driver on Linux and OpenBSD.

You can find the technical details at https://wireplug.org


smtp2go.com offers a free tier with 1,000 emails/month. I’ve been using it for a few small services I run and haven’t had any issues so far.



Another interesting tool in this space is trippy, which ‘combines the functionality of traceroute and ping’

https://github.com/fujiapple852/trippy


There’s also the somewhat similar mtr https://www.bitwizard.nl/mtr/


As other comments say, It’s a bit of a crowded market…


mtr is my go-to, great tool!


Wow ~, in all honesty, Nping needs to do more


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: