Atemu

joined 4 years ago
[–] [email protected] 0 points 11 months ago (1 children)

I completely misread your post. Your issue isn't outbound connections appearing as if they came from your VPS, it's inbound connections to your local mailserver being proxied.

[–] [email protected] 1 points 11 months ago (1 children)

I did not intend to be toxic.

[–] [email protected] -2 points 11 months ago (6 children)

No. That's quite literally the point of a proxy. If you don't want to be proxied, don't use a proxy.

I know this is the selfhosted community but if you're new to this, you really shouldn't be hosting email as it's one of the hardest services to get "right".
(Ideally no other public service either, they're a huge liability. Start hosting stuff for local network use.)

[–] [email protected] 3 points 11 months ago (7 children)

VPN use will functionally make it like you’re on your home network. VPN access to your network should not be given to tons of people if at all possible.

Note that Tailscale does not give other users access to your entire home network but just specific machines and you need to explicitly share those machines.

[–] [email protected] 3 points 11 months ago

Even has a KVM for emergency access ;)

[–] [email protected] 2 points 11 months ago

It's not and it's insane. TDP is a fucky "metric".

[–] [email protected] 5 points 11 months ago* (last edited 11 months ago) (7 children)

https://ifconfig.me/. Can also be be curl'd.

Easier to remember is to just search for what is my ip in clear net DuckDuckGo (or Kagi if you have it).

they all ask for CAPTYA which is an obvious attempt to obtain ones true IP.

How exactly is a CAPTCHA supposed to discover your "true IP"?

Also note that your IP address is by far not the only thing used to fingerprint you. See https://abrahamjuliot.github.io/creepjs/ and https://browserleaks.com/.

Use TOR browser if you want your starting conditions to be reasonably anonymous.

Even more critical for fingerprinting is user behaviour though.

[–] [email protected] 2 points 11 months ago

The hiding of internet traffic is also a proxy thing, not necessarily a VPN thing.

[–] [email protected] 2 points 11 months ago

Note that what is typically referred to a "router" in a home setting is actually many different devices/services in one. It's usually a combination of router, switch, firewall, DHCP server, DNS server, Wireless Access Point, modem and probably a couple other things I forgot.

[–] [email protected] 1 points 11 months ago (4 children)

DHCP is a protocol where the "router" tells the devices that it is the gateway.

[–] [email protected] 2 points 11 months ago (4 children)

Not at all. A VPN can be used as a proxy but that's not what they were intended for.

[–] [email protected] 3 points 11 months ago (2 children)

There’s only one route to an IP.

That's not true. There's an infinite numer of ways to route IP addresses on the internet in fact. Most of them are useless however.

your VPN server can try spoofing its outbound traffic to use the client’s IP, but it’ll most likely get discarded by the ISP because it only allows your IP to go out. But even if you can, the answer to those packets will go to the client’s IP, which will go directly to the client and not the VPN.

Mission accomplished? This may be what OP wants? Really not sure.

view more: ‹ prev next ›