can anyone connect to my lightning node? I think my ISP started blocking inbound connections to lightning =/

03f3c108ccd536b8526841f0a5c58212bb9e6584a1eb493080e7c1cc34f82dad71@ln.damus.io:9735

Reply to this note

Please Login to reply.

Discussion

Maybe the IP is wrong? Can’t ping or get any kind of response.

my ip has been static for like a year. they changed it to the one I have now:

dig +short myip.opendns.com @resolver1.opendns.com

24.84.153.116

so I updated my dns (ln.damus.io) to that, but now I can't connect to it from my external VPS. thinking rogers (my isp) started filtering me.

no other config has changed.

gonna change my port to see if its a port blocking thing

bleh nothing. guess I'm switching ISPs

Can they actually know that it's lightning traffic? or are they just blocking the ln.damus.io?

rogers recently bought shaw (the ISP i was with). it looks like i just got kicked off my static ip into a CGNAT, so I can't host anything anymore. lame.

That sucks.

Cgnat is 💀

Look into cloudflare tunnel... Free

I'm passing off a 2 second AI query as my own 😂

Alternatives to Cloudflare Tunnel

For ease of use and features:

ngrok: A popular and feature-rich option for developers, it's known for being easy to set up and use, offering features like TLS tunnels.

LocalTunnel: A straightforward and easy-to-use tool for quickly exposing a local port to the internet.

Pinggy: A simple and accessible alternative for creating tunnels.

For private networks:

Tailscale: Ideal for securely connecting your own devices in a peer-to-peer network, often used for accessing a home lab or NAS. Unlike Cloudflare Tunnel, which acts as a reverse proxy, Tailscale creates a private network that only your devices can join.

For self-hosted and maximum control:

Pangolin: A self-hosted solution that combines features of Cloudflare Tunnels and other tools like Traefik using WireGuard for a high degree of control over your infrastructure.

Traefik: A modern reverse proxy that can be used to build self-hosted solutions similar to Cloudflare Tunnel, giving you full control over your setup.

Other options:

LocalXpose: Another alternative for tunneling.

Zrok: A self-hosted option with a focus on privacy and easy sharing.

Put tailscale on your machine

Run a vps, the cheapest one you can find

Put tailscale there

Write a caddy config that routes traffic to your home server via tailscale.

Problem solved

I will guide you through the whole setup over here if you want

Already did this but just used wireguard since tailscale is a backdoor into your network

nevent1qqsgk2hhnr5zh7fgc0k9c48t3n05tdtmwl6n383em9hntgqtz4zlxtgl9ynyx

why is tailscale a backdoor since it's also WG

tailscale has a control plane which can add a removes machines to your mesh. they control this unless you run your own.

its just simpler to run wireguard imo

they could in theory backdoor into any tailscale network. scary shit. I wouldn't be surprised in governments are already thinking about using this.

What about headscale?

Not true, or not entirely true

The control plane can be self hosted (headscale), and they have a mitigation for mitm or attack surface in the control plane - tailscale lock.

It's FOSS, on their clients, if their control plane is FULLY compromised, literally completely taken over, they can still not add new machines, nor access them, at best they can shut you out of derp (can't even prevent your already logged in machines to connect because holepunch)

https://tailscale.com/kb/1230/tailnet-lock-whitepaper

basically tailscale does direct connections between nodes, yes, and it is encrypted

but these nodes at the start don’t know each other, they ask the tailscale control plane “what nodes are there”

if the control plane lies and inserts fake/impersonating nodes, it could pretend to be your trusted laptop for example

this makes no sense. if they couldn't add machines then how do they add your machines? something has to coordinate everything.

i meant to reply to nostr:note1sv9hnywxw9hkq9qtxpzmr2zv9hmfmtzqd6rlm3yruj0uyu6wldeqzk2e77

not sure how that happened

With lock, YOU are the one coordinating. After a machine gets added it can't do anything until YOU sign a lock message. (I.e. sign its pubkey and publish that)

It's true without tailscale lock, please look into that feature

Do you pay for static IP? With some ISPs that is part of the agreement and so maybe the new ISP is breaching yours...

I don’t think there was an agreement, it was just how shaw had their network setup

IPv4s finally got expensive enough that it became worth it for legacy carriers to transition networks over to CGNAT, at least if they’re already redoing it like in an acquisition. Sucks…

was able to hack a fix together with wireguard:

nostr:note13v400x8g90uj3slvt32whrxlgk6hkal48z0rnkt0xksqk9297vkswwszr7

its nested noise protocols all the way down

{

"code": 401,

"message": "All addresses failed: Error connecting to ln.damus.i

o: Tor server reply: general SOCKS server failure. ln.damus.io:9735

: Connection establishment: Connection refused. Error connecting to

24.84.153.116: Tor server reply: general SOCKS server failure. 24.

84.153.116:9738: Connection establishment: Connection refused. "

}

cannot connect

24.84.153.116:9735 timed out

seems to work?

{

"id": "03f3c108ccd536b8526841f0a5c58212bb9e6584a1eb493080e7c1cc34f82dad71",

"features": "0898882a8a59a1",

"direction": "out",

"address": {

"type": "ipv4",

"address": "45.79.91.128",

"port": 9735

}

}

yeah I have my VPS acting as a wireguard proxy for now

Damn sorry brother