aboutsummaryrefslogtreecommitdiff
path: root/content
diff options
context:
space:
mode:
authorJulien Dessaux2024-01-08 20:15:58 +0100
committerJulien Dessaux2024-01-08 20:15:58 +0100
commit9a8bf598ec1c4f79b03513aeebf1c4e5f31edc5c (patch)
treeaf9b6a7868fc9b9666f8ee795e8624b8837c572b /content
parentAdded migrating miniflux to nixos blog article (diff)
downloadwww-9a8bf598ec1c4f79b03513aeebf1c4e5f31edc5c.tar.gz
www-9a8bf598ec1c4f79b03513aeebf1c4e5f31edc5c.tar.bz2
www-9a8bf598ec1c4f79b03513aeebf1c4e5f31edc5c.zip
Fixed tags in old articles
Diffstat (limited to 'content')
-rw-r--r--content/blog/OpenBSD/wireguard-firewall.md4
-rw-r--r--content/blog/freebsd/wireguard-firewall.md4
-rw-r--r--content/blog/miscellaneous/wireguard-routing-2.md2
-rw-r--r--content/blog/miscellaneous/wireguard-routing.md4
4 files changed, 7 insertions, 7 deletions
diff --git a/content/blog/OpenBSD/wireguard-firewall.md b/content/blog/OpenBSD/wireguard-firewall.md
index b7b381d..8bff7e9 100644
--- a/content/blog/OpenBSD/wireguard-firewall.md
+++ b/content/blog/OpenBSD/wireguard-firewall.md
@@ -2,7 +2,7 @@
title: Wireguard firewalling on OpenBSD
description: How to configure pf for wireguard on OpenBSD
date: 2023-03-04
-tage:
+tags:
- pf
- vpn
- wireguard
@@ -72,4 +72,4 @@ pass in on egress proto udp from <internet> to <myself> port 342
pass in on wg0 from <private> to <private>
```
-Note that you will need to have set `net.inet.ip.forwarding=1` in your `/etc/sysctl.conf` to route traffic. \ No newline at end of file
+Note that you will need to have set `net.inet.ip.forwarding=1` in your `/etc/sysctl.conf` to route traffic.
diff --git a/content/blog/freebsd/wireguard-firewall.md b/content/blog/freebsd/wireguard-firewall.md
index e05ba69..d585442 100644
--- a/content/blog/freebsd/wireguard-firewall.md
+++ b/content/blog/freebsd/wireguard-firewall.md
@@ -2,7 +2,7 @@
title: Wireguard firewalling on FreeBSD
description: How to configure pf for wireguard on FreeBSD
date: 2023-03-15
-tage:
+tags:
- pf
- vpn
- wireguard
@@ -73,4 +73,4 @@ pass in on egress proto udp from <internet> to <myself> port 342
pass in on wg0 from <private> to <private>
```
-Note that you will need to have set `gateway_enable="YES"` in your `/etc/sysctl.conf` to route traffic. \ No newline at end of file
+Note that you will need to have set `gateway_enable="YES"` in your `/etc/sysctl.conf` to route traffic.
diff --git a/content/blog/miscellaneous/wireguard-routing-2.md b/content/blog/miscellaneous/wireguard-routing-2.md
index a4e8ec5..0752251 100644
--- a/content/blog/miscellaneous/wireguard-routing-2.md
+++ b/content/blog/miscellaneous/wireguard-routing-2.md
@@ -2,7 +2,7 @@
title: Wireguard routing part two
description: An advanced example
date: 2023-02-23
-tage:
+tags:
- vpn
- wireguard
---
diff --git a/content/blog/miscellaneous/wireguard-routing.md b/content/blog/miscellaneous/wireguard-routing.md
index 446555d..63592af 100644
--- a/content/blog/miscellaneous/wireguard-routing.md
+++ b/content/blog/miscellaneous/wireguard-routing.md
@@ -2,7 +2,7 @@
title: Wireguard routing part one
description: The basics to know about wireguard routing
date: 2023-02-21
-tage:
+tags:
- vpn
- wireguard
---
@@ -89,4 +89,4 @@ Kaladin's would look very similar:
```
10.1.2.1 dev wg0 scope link
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.20 metric 600
-``` \ No newline at end of file
+```