Event JSON
{
"id": "539b61b31dae24c0da1c9c085e34c0dc071cc0fba71a197a863cfbb4ee1723ff",
"pubkey": "7db514183a014a0cf47bcc62508a932f031ec723fdc3c33efc727c38629e1ac1",
"created_at": 1692971440,
"kind": 1,
"tags": [
[
"p",
"622afc22fc949485a0a8a621e6c4cac0d8869de136359b7c6c2d0165249d13e2",
"wss://relay.mostr.pub"
],
[
"p",
"b15e52e9623da51cfe460020e7da27a086de784731ae755e0bb94e9f1c113cb2",
"wss://relay.mostr.pub"
],
[
"e",
"dd830c471aa4b3b8d4be03e34e3ff98e110c5967141f0583b53ab9289c25f9b0",
"wss://relay.mostr.pub",
"reply"
],
[
"emoji",
"blobfoxsad",
"https://cdn.pawb.social/mastodon-fe/custom_emojis/images/000/015/091/original/f0327c2165e778d5.png"
],
[
"proxy",
"https://furry.engineer/users/nysepho/statuses/110950576318683902",
"activitypub"
]
],
"content": "nostr:npub1vg40cghujj2gtg9g5cs7d3x2crvgd80pxc6eklrv95qk2fyaz03q7s2yt8 I've been trying out a few things like marking ICMP packets so they use a different rouble table that specifies a source address, or DNATing inbound traffic that may generate an ICMP response (e.g. -m ttl --ttl-eq 1) in the hopes that it would apply to the entire flow and respond from the right IP address, but I just can't get anything to work :blobfoxsad:\n\nIf you figure it out I'd be pretty interested to see any writeup you do on it.",
"sig": "01245f080d9a4c7c794dea1a484d330bdc0adf1aa51ec3d39f6fc28af08ca0f28b086bae58bc2a6f6e25497c7a839e01f26b04952ad9e6f08f6c100f4762b94a"
}