mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#proxy

2 Beiträge1 Beteiligte*r0 Beiträge heute
Fortgeführter Thread

Делайте хорошо. Плохо не делайте.

Easy setup of VLESS-REALITY VPN within Docker on 3X-UI panel

**VLESS-REALITY VPN**

Currently VLESS-REALITY looks to be a future-proof solution for VPN which is hard to detect at least at the moment.

**VLESS**

According to Project X website VLESS is a stateless lightweight transport protocol, which is divided into inbound and outbound parts, and can be used as a bridge between Xray clients and servers.

It is important to note that VLESS itself does not have built-in encryption, so you need to use a reliable layer of encryption, such as TLS or REALITY.

**REALITY**

REALITY implements full TLS using the SNI of a camouflage website. This eliminates the TLS fingerprint of the server, while preserving perfect forward secrecy and preventing certificate chain attacks. It is not only more convenient, it also provides greater security than conventional TLS.

#proxy #VPN #vless #xtls #cloudflare #этаСтрана #РосКомПозор

semenov.work/posts/3x-ui-vless

semenov.work · Easy setup of VLESS-REALITY VPN within Docker on 3X-UI panelIn my one of my previous posts I covered a process of setting up Wireguard server on Docker. While Wireguard is a great choice for VPN protocol, as it’s known for its reliability, speed and good encryption, they way it handles handshakes is easily detectable and can be blocked by ISP firewalls. Same applies to other well known VPN protocols, such as: OpenVPN, IPsec and L2TP. A number of countries have introduced measures to block VPN protocols which can cause major problems for users who use them to connect office LAN or for whatever other purposes.

Туннели CloudFlare.com: делаем вебсервер дома без публичного IP

#proxy #VPN #vless #xtls #cloudflare #этаСтрана #РосКомПозор

Леонид Каганов 2025_07_04

Ллео разродился запоздавшей инструкцией как сделать веб-сервер без публичного IP-адреса.

Вкратце: предлагается использовать туннель от Cloudflare. Который успешно банится ТСПУ от РосКомПозора в сетях мобильных операторов.

lleo.me/dnevnik/2025/07/04

lleo.meЛеонид Каганов:

Oh snap! `YARR - Yet Another RSS Reader` has a new version and I missed it in March!
github.com/nkanaev/yarr/releas
YARR is like Feedly or NewsBlur, except more like TinyRSS or FreshRSS - you can self-host.

UNLIKE those, you can tell yarr to run at `<ip:port>`, so you can stick it at port 7666 for your reverse #proxy. And its lightweight, I run my own AND 3 other instances for fam. members on the same host accessed via different subdomains re-proxied by #nginx.

GitHubRelease v2.5 · nkanaev/yarr- (new) Fever API support (thanks to @icefed) - (new) editable feed link (thanks to @adaszko) - (new) switch to feed by clicking the title in the article page (thanks to @tarasglek for suggestion) ...
Antwortete im Thread

@rolle This reminds about useful information @nixCraft posted about setting up a #proxy for browsing.
In my opinion, things are getting so bad, that really is the only way to protect your computer in the current environment, without fighting a continuous battle.

My homelab got it's final touches. I finally removed #Nextcloud and switched completely to #Stalwart, i added automatic #database backups using #cronjobs for all my #databases, i've set up most of my publicly exposed services to run behind the #cloudflare #proxy, improved the directory structure for my #docker #containers, and finally set up pihole as the #dns server on my router. This feels so good.

Cloudflare or not Cloudflare? I have to confess I've been using it for a while, and while I do enjoy its multiple benefits (proxy, WAF, DNS management, security rules, automatic email obfuscation...), I dont like the idea of transmitting all the data through a 3rd party, especially based in the USA.

Mastodon tech people, I summon you!

What are your thoughts?
Do you use Cloudflare?
Or is it a non negociable no to you?
Have you tried European based solutions like Bunny.net?
Do you just live without such tools?

I'm interested in hearing your thoughts!
Boosts appreciated :boost_request:

gibt es eigentlich ähnliche Projekte wie #yacy nur eine Nummer kleiner?

Ich hätte gerne etwas das als #Proxy funktioniert und einfach nur die Seiten indiziert die ich besucht habe und dann auch nur für mich durchsuchbar.

gibt es da ggfs. etwas das mit #squid funktioniert oder einem anderen Proxy Server?

Hướng dẫn tạo Telegram API Proxy trên Cloudflare Worker

Hướng dẫn tạo Telegram API Proxy trên Cloudflare Worker #Telegram #API #Proxy #CloudflareWorker #HướngDẫn #Dev #Programming Bài viết này hướng dẫn bạn cách tạo một Telegram API proxy sử dụng Cloudflare Workers. Phương pháp này giúp tăng cường bảo mật và độ ổn định khi tương tác với Telegram Bot API, đặc biệt hữu ích trong các trường hợp cần bypass hạn chế địa lý hoặc tăng tốc độ truy cập.

maychu.top/2025/05/30/huong-da

The Sharp Taste of Mimo'lette: Analyzing Mimo's Latest Campaign targeting Craft CMS

Between February and May, multiple exploitations of CVE-2025-32432, a Remote Code Execution vulnerability in Craft CMS, were observed. The attack chain involves deploying a webshell, downloading an infection script, and executing malicious payloads including a loader, crypto miner, and residential proxyware. The Mimo intrusion set is believed responsible, using distinctive identifiers like '4l4md4r' and 'n1tr0'. The group deploys XMRig for cryptomining and IPRoyal for bandwidth monetization. Two potential operators, 'EtxArny' and 'N1tr0', were identified through social media analysis. While showing interest in Middle Eastern affairs, the group's primary motivation appears financial. Detection opportunities include monitoring for unusual processes in temporary directories and kernel module alterations.

Pulse ID: 68360c3f4169ef29b7c93f6f
Pulse Link: otx.alienvault.com/pulse/68360
Pulse Author: AlienVault
Created: 2025-05-27 19:02:23

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Just released: #swad 0.11 -- the session-less swad is done!

Swad is the "Simple Web Authentication Daemon", it adds cookie/form #authentication to your reverse #proxy, designed to work with #nginx' "auth_request". Several modules for checking credentials are included, one of which requires solving a crypto challenge like #Anubis does, to allow "bot-safe" guest logins. Swad is written in pure #C, compiles to a small (200-300kiB) binary, has minimal dependencies (zlib, OpenSSL/LibreSSL and optionally libpam) and *should* work on many #POSIX-alike systems (#FreeBSD tested a lot, #Linux and #illumos also tested)

This release is the first one not to require a server-side session (which consumes a significant amount of RAM on really busy sites), instead signed Json Web Tokens are now implemented. For now, they are signed using HMAC-SHA256 with a random key generated at startup. A future direction could be support for asymmetric keys (RSA, ED25519), which could open up new possibilities like having your reverse proxy pass the signed token to a backend application, which could then verify it, but still not forge it.

Read more, grab the latest .tar.xz, build and install it ... here: 😎

github.com/Zirias/swad

Simple Web Authentication Daemon. Contribute to Zirias/swad development by creating an account on GitHub.
GitHubGitHub - Zirias/swad: Simple Web Authentication DaemonSimple Web Authentication Daemon. Contribute to Zirias/swad development by creating an account on GitHub.