You setup Wireguard server on the VPS with both IPv4 and IPv6. Then you connect both your computer and IPv6-only server to the Wireguard server. After connection, you can connect to the VPN through IP address assigned by wireguard.
You setup Wireguard server on the VPS with both IPv4 and IPv6. Then you connect both your computer and IPv6-only server to the Wireguard server. After connection, you can connect to the VPN through IP address assigned by wireguard.
Personally have good experience with https://github.com/Nyr/wireguard-install, there are other script that are available by searching “wireguard setup script github”.
Note: By default Wireguard config generated will route every bit of traffic through Wireguard (which will be slower and probably not wanted in this situation), to change that change AllowedIPs field in Wireguard config, lets say all your machines are assigned 1.2.3.xxx
as IP address, to only access other 1.2.3.xxx
IP through wireguard, change the config to AllowedIPs = 1.2.3.0/24
.
Host a website that needs to be accessible from your own machine or public?
Former situation: Can be solved by setup reverse proxy on the other VPS, or join machines to a VPN server (like tailscale, Zertoier or Wireguard server)
Later situation: Cloudflare or other CDN, setup reverse proxy on the other VPS.
Less accessible option but available for public: Tor or I2P
Great, if you need to SSH into Ipv6 only machine, SSH has -J flag which can be used to specify “jump host” (basically run SSH through SSH)
I think that means the access point can only run at up to 80Mhz bandwidth, so not full bandwidth.
I9 14900k…bad news for you, 13th and 14th gen I9 is unstable, crashes.
Suggestion: Wait for 15th gen or AMD 9000 series CPU to come out.
I remember trying Retroshare… no offline message is the biggest obstacle.
If the firewall just means no incoming connections, your computer can still reach out to the other side (if they open their port)
Forgot to answer this question, yes I think it would work.
Yes, speed would be much slower.
Yes, you can host a normal website through tor.
AFAIK tor websites (onion service) doesn’t require exit node, and no one knows your IP unless you are unlucky enough all nodes you connected are controlled by same entity.
I am pretty sure you can set your own DNS server in Android.
I think most up-to-date OpenWrt routers can do later (with normal, unencrypted DNS requests), see https://openwrt.org/docs/guide-user/firewall/fw3_configurations/intercept_dns.
The model you mentioned (Flint 2) is supported by OpenWrt.
route ipv6 dns to a destination of my choice
Does this mean setting custom DNS server (so devices using DHCP picks up what DNS server you want them to use) or intercept DNS requests (MITM or use firewall rule to drop outbound 53 port requests)?
One thing notable of Sierra Forest is that the CPUs don’t have SMT (only 1 thread per core), so in theory it doesn’t suffer from speculative execution attacks.
Epyc CPUs still provides more PCIE lanes, which is crucial for GPUs.
Tailscale server can also be self-hosted, look into headscale.
From my own experience, I still can’t setup headscale on my Android phone, I think latest tailscale APP fucked up setting custom server function. Don’t install from Google Play
Without the need for versioning, I think rclone fits the description. For backup into USB drive / remote SSH server I would recommend rsync.