• 11 Posts
  • 285 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle
  • You might be confusing public IP addresses with ports? If your torrent client doesn’t have a public IP address that just means it’s offline / no internet. Maybe your internet is down or the VPN is disconnected. You’re won’t torrent anything at all in that state.

    One side of the connection needs a public address open port, not both. When both parties don’t have a publicly addressable IP open port, the status is firewalled. I guess they can “see” each other but are unable to exchange any torrent data.

    For what it’s worth in the situation where both peers don’t have open ports (meaning they are both firewalled) they end up having to wait for another peer to join that torrent swarm that happens to have a open port, that’s the only way any data will exchange in that swarm. Until that happens those two peers will sit there waiting and not exchanging data.




  • I have never done any kind of manual port forwarding my current VPN provider does not do that at the price I have it for right now.

    If the VPN provider does not support port forwarding then it is normal and expected to always be firewalled. Toggling random ports doesn’t change that fact.

    Not sure why you would sometimes see your status as fully connectable, guessing either it’s a Windscribe misconfiguration when you initially connect (?) or qBittorrent gets confused during the intitial connect. Or there’s some other misconfiguration.

    You might want to see if other people using that VPN provider have more insight, maybe they are doing something strange with the ports when you initially connect & eventually close them on you.


  • True, wouldn’t be too different vs just using a VPN. You’re choosing to trust the Tribler tech and the Tribler exit node operator vs choosing to trust the VPN provider. Granted most VPN connections are going to have much better performance vs anything Tribler related.

    There is a nice side effect of running an *arr stack against Tribler, even in 1 hop mode - Your Tribler node is much more easily pulling in new content into the Tribler network for other users to access afterwards without needing an exit node. Ideally it’s just one Tribler node/user needing to pull data through the exit nodes while the rest would just pull it from you and share with other nodes in-network.

    Torrents over I2P work the same way. If the torrent data isn’t found within I2P and you have outproxies configured you could pull torrents from the clearnet & afterwards other I2P users just share amongst the I2P network.


  • That’s pretty cool, thanks for sharing! Been a while since I tried it out but last I looked Tribler’s own automation features were quite lacking so something like this helps a lot.

    I was not able to download anything with more than 1 hops in between - ie it does hide your real IP address, but only uses one relay in between.

    Hmm I don’t think there’s any relays at all in that configuration, unless you’re counting the exit node itself?

    https://github.com/Tribler/tribler/issues/3067#issuecomment-325367047

    One thing to keep in mind is that to download torrents from outside Tribler’s own network you would need to download through an exit node… not sure on the exact stats but last I tested exit nodes were only like 5-10% of the Tribler user base. For a while I tried volunteering my own VPN connection as an exit node for Tribler just to see how it went but the Tribler client kept locking up/crashing after a few days so the experiment did not go well… hopefully works better nowadays.



  • If you’re using Google Workspace, Google will give you the appropriate DMARC, DKIM and SPF records to add to your DNS. The NS themselves should resolve the records and provide the recipient server with the values you’ve entered, thereby ensuring delivery.

    Sure. But why would that matter when you’re dealing with hostile 3rd party email providers that intentionally want to blackhole all email domains at Namecheap? But yes, just to clarify I do configure DMARC/DKIM/SPF and that works great for most cases.

    I’m just describing what worked for me though in truth I don’t know exactly how these hostile email providers actually determine the domain is hosted at Namecheap. My hunch is that they are using a lookup & finding the nameserver for the domain & have already blacklisted Namecheap’s default free nameserver IP addresses. For whatever reason those same hostile email providers don’t seem to be blacklisting Namecheap’s paid nameserver but I think that sort of makes sense…

    The larger issue is that Namecheap is known for cheap domains that scammers/spammers tend to buy in bulk & then use to spam with. Those same scammers/spammers aren’t trying to spend extra money so they only ever use the default free Namecheap nameservers.


  • Brickfrog@lemmy.dbzer0.comtoSelfhosted@lemmy.worldCustom Domain Email
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    1 month ago

    If you use Namecheap for email domain(s) you may want to consider also splurging for their PremiumDNS to keep your domain(s) off spam blocks at other email providers.

    I help maintain some emails at Gmail/Google Workspace but the domains themselves are at Namecheap. For a while there were complaints that some emails never landed in other people’s inboxes… this led me to talk about the issue with one of the email provider recipients based in the UK & apparently they were null routing anything coming from Namecheap since they felt a lot of spam came from them. But after some experimenting I figured out their system (& probably others) were figuring out they were Namecheap domains via the default FreeDNS they use. On a hunch I switched those domains over to PremiumDNS and after that all our emails were landing in other inboxes correctly. I guess maybe it makes sense, a typical spammer buying a cheap domain at Namecheap isn’t going to splurge for the higher end DNS service for it.

    I’m not saying all email providers treat Namecheap domains as spam but just be warned there definitely ones out there that do.