Aussie living in the San Francisco Bay Area.
Coding since 1998.
.NET Foundation member. C# fan
https://d.sb/
Mastodon: @dan@d.sb

  • 3 Posts
  • 1.06K Comments
Joined 2 years ago
cake
Cake day: June 14th, 2023

help-circle
  • The drivers have gotten a lot better over the last few years, and Nvidia even have an official open-source driver now, but there’s still issues with them. Wayland works very well now, but not perfectly (especially on GPUs with low VRAM).

    If you’re on Linux and are buying a new GPU, stick to AMD. Their driver is part of the Linux kernel, it’s more stable, and it gets all the newest features first.


  • install newest proprietary nvidia drivers

    On newer cards, the open source drivers work pretty well as of version 555. The process for installing them is usually very similar to the proprietary drivers, but there’s often some flag you need to set to tell it to use the open source ones instead. For Fedora, the instructions are here: https://rpmfusion.org/Howto/NVIDIA#Kernel_Open (ignore the part about it only working for data center GPUs, as that’s no longer true)

    sudo sh -c 'echo "%_with_kmod_nvidia_open 1" > /etc/rpm/macros.nvidia-kmod'
    sudo akmods --kernels $(uname -r) --rebuild 
    

    If you use Nvidia’s installer, it automatically uses the open source driver instead of the proprietary one if you have a new enough GPU (20 series or newer)



  • There’s no reason your media server needs to be directly exposed to the public internet. Use Tailscale. Get everyone that uses it to sign up for a Tailscale account, and add them all to your Tailnet.

    Tailscale will perform better than a Cloudflare tunnel because it’s a direct connection between the two peers, whereas Cloudflare tunnels route through Cloudflare.

    Tailscale does have relay servers, but they’re only used in very rare cases, if both peers have very strict firewalls. Almost always, the connection between two peers over Tailscale is a direct connection, so there’s no extra latency (other than some small overhead for the encryption)

    You could use Wireguard and manually configure it to be in a mesh config, but Tailscale makes it so much easier. I’m a big fan of their product.




  • Oh yeah, there’ll be some overhead if you’re running Wireguard on a router. Hitting your router’s public IP won’t go out to the internet though - the router will recognize that it’s its IP.

    It’s common to run Wireguard on every computer/phone/tablet/etc where possible rather than just on the router, since this takes advantage of its peer-to-peer nature. For home use, that’s how it was originally designed to be used. Tailscale makes it a lot easier to configure it this way though - it’s a bit of work for vanilla Wireguard. Tailscale does support “subnet routers” if you have any devices that you want to access over the VPN that can’t run Tailscale.







  • If you have a separate subnet for it, then why do you only want it to be connected when you’re not on home wifi? You can just leave it connected all the time since it won’t interfere with accessing anything outside that subnet.

    One of the main benefits of Wireguard (and Tailscale) is that it’s peer-to-peer rather than client-server. You can use the VPN IPs at home too, and it’ll add barely any overhead.

    (leaving it connected is assuming you’re not routing all your traffic through one of the peers)




  • conditional Auto-Connect. If not on home wifi, connect to the tunnel.

    You don’t need this with Tailscale since it uses a separate IP range for the tunnel.

    Edit: Tailscale (and Wireguard) are peer-to-peer rather than client-server, so there’s no harm leaving it connected all the time, and hitting the VPN IPs while at home will just go over your local network.

    The one thing you probably wouldn’t do at home is use an exit node, unless you want all your traffic to go through another node on the Tailnet.