

At some point you had to learn all about debugging the overly-complicated and annoying OS that runs your full installs, didn’t you?


At some point you had to learn all about debugging the overly-complicated and annoying OS that runs your full installs, didn’t you?


per the searxng container instructions:
Understanding container architecture basics is essential for properly maintaining your SearXNG instance. This guide assumes familiarity with container concepts and provides deployment steps at a high level.
The fact that you’re logging into your container to manually edit your config hints that you need to read more about managing containers.
Make sure you’re editing the file that you’re mounting on the host, and edit it from the host.
Have you checked the actual log with podman logs? It’ll tell you what it’s doing about its config.
did you shower think yourself into the dead internet?


you’re just seeing bikes that either aren’t self maintained or whose owners use the platform style stands. no one is uninstalling their spools.


no. Arp bridges layer 1 and 2. It’s switch local. With a VLAN, it becomes VLAN local, in the sense that 802.1q creates a “virtual” switch.


Broadcast traffic (such as DHCP) doesn’t cross subnets without a router configured to forward it. It’s one of the reasons subnets exist.


What in the world is “a proprietary OS I cannot trust”. What’s your actual threat model? Have you actually run any risk analyses or code audits against these OSes vs. (i assume) Linux to know for sure that you can trust any give FOSS OS? You do realize there’s still an OS on your dumb switch, right?
This is a silly reason to not learn to manage your networking hardware.


A VLAN is (theoretically) equivalent to a physically separated layer 2 domain. The only way for machines to communicate between vlans is via a gateway interface.
If you don’t trust the operating system, then you don’t trust that it won’t change it’s IP/subnet to just hop onto the other network. Or even send packets with the other network’s header and spoof packets onto the other subnets.
It’s trivially easy to malform broadcast traffic and hop subnets, or to use various arp table attacks to trick the switching device. If you need to segregate traffic, you need a VLAN.
Edit: Should probably note that simply VLAN tagging from the endpoints on a trunk port isn’t any better than subnetting, since an untrusted machine can just tag packets however it wants. You need to use an 802.1q aware switch and gateway to use VLANs effectively.


What you are asking will work. That’s the whole point of subnets. No you don’t need a VLAN to segregate traffic. It can be helpful for things like broadcast control.
However, you used the word “trust” which means that this is a security concern. If you are subnetting because of trust, then yes you absolutely do need to use VLANs.

deleted by creator


deleted by creator


I owned a 2019 z900rs. My buddy owns an xsr900. The xsr feels like a modern street bike. The z900rs feels like a classic Kawasaki Z, with a shitload more power and traction control.
Both feel sleepy once the retro novelty wears off. I traded the Z for a street triple.


So… you’re afraid of the command that does the thing you’re trying to do?


FSD option costs $199 per month
Doesn’t matter how well it performs, this guarantees I’d never, ever use it.
Gatorz are tough as hell, and have some of the best polarized optics I’ve ever worn.
They’ll do lens replacements, and can make prescriptions as well.
Careful leaving them on a car dashboard though. They’re aluminum frames and I burned my temples once.


Google the concept of an escrow service.


I’m surprised no one’s mentioned the security implications. Mounting with nosuid and nodev options can undermine rootkit or privileged escalation exploits.


it does not.
.gov.fr. is a subdomain of .fr., unrelated to .gov…