lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

66
active users

#firewall

4 posts2 participants0 posts today
Peter N. M. Hansteen<p>Long rumored, eagerly anticipated by some, "The Book of PF, 4th edition" <a href="https://nostarch.com/book-of-pf-4th-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/book-of-pf-4th-ed</span><span class="invisible">ition</span></a> is now available for PREORDER. The most up to date guide to the OpenBSD and FreeBSD networking toolset <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/preorder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>preorder</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> (again for the CEST-ish crowd)</p>
Hessenhelden<p>Angeschlossen und erstmals gestartet. Was mich wundert dass es sehr warm im Betrieb wird. Ich kann es nicht einschätzen ob das normal ist aber wenn jetzt schon so viel Hitze erzeugt wird, bei wenig last, werden die elektrische Bauteile nicht lange durchhalten.</p><p><a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.social/tags/cwwk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cwwk</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/appliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appliance</span></a></p>
Waidler :mastodon:<p>Endlich funktioniert die Endpoint-Erkennung VLAN-übergreifend wieder bei meinem ROON Server. ROON hätte gerne alle Klienten im gleichen Netzwerksegment. Dann klappt die Erkennung auf Anhieb. Bei mehreren VLANs wird's dann schwierig. Da muß man tiefer in die Trickkiste bei den Multicast-Einstellungen greifen. <br>Alte Firewallregeln in der OPNsense-Firewall entfernt und gut durchdachte neue hinzugefügt und schon funktioniert es wieder VLAN-übergreifend.</p><p><a href="https://bayerwald.social/tags/roon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roon</span></a> <a href="https://bayerwald.social/tags/multicast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multicast</span></a> <a href="https://bayerwald.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://bayerwald.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a> <a href="https://bayerwald.social/tags/mdns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mdns</span></a></p>
Pseudo Nym<p>It's dangerous to go alone. Here. Take this.</p><p><a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.online/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> </p><p>Note: this is totally how cybersecurity works.</p>
Rynn the Cyberwitch 🌙<p>Hey other <a href="https://furry.engineer/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> folks I have a weird <a href="https://furry.engineer/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> and <a href="https://furry.engineer/tags/NAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NAT</span></a> question. I'm looking at the firewall traffic log where my work laptop (I'm in the office) is the source, and I'm looking at the traffic connecting to my home plex server. </p><p>The plex server is a private IP behind NAT. In the log I show the putbound traffic from my work laptop to my home router IP, but I also see a following entry with the private IP that my router is forwarding plex's port traffic to. I thought anything done behind NAT wouldn't show up, especially because I'm only looking at the initial communication out, and not the return communication from my server to my me. Is my understanding of NAT wrong?</p>
Peter N. M. Hansteen<p>Network Management with the OpenBSD Packet Filter Toolset <a href="https://www.bsdcan.org/2025/timetable/timetable-Network-Management-with.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bsdcan.org/2025/timetable/time</span><span class="invisible">table-Network-Management-with.html</span></a> at <a href="https://mastodon.social/tags/bsdcan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bsdcan</span></a> now concluded, new slides up at <a href="https://nxdomain.no/~peter/pf_fullday.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/pf_fullday.</span><span class="invisible">pdf</span></a> -- now with during-session updates (labs available for attendees only, sorry) </p><p><a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/networktrickery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networktrickery</span></a></p>
Hessenhelden<p>Rückabwicklung abgeschlossen und jetzt kommt ein neues Teil ins Haus. Diesmal ein China Kracher. Mal sehen ob die Hardware länger funktioniert als das Markenprodukt.</p><p><a href="https://mastodon.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://mastodon.social/tags/Appliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Appliance</span></a> <a href="https://mastodon.social/tags/Hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hardware</span></a> <a href="https://mastodon.social/tags/OPNsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPNsense</span></a> <a href="https://mastodon.social/tags/AmazonShop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AmazonShop</span></a> <a href="https://mastodon.social/tags/Chinaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chinaware</span></a></p>
#Pfleger aus #Münster🏳️‍🌈🇪🇺🌈🌻<p><a href="https://muenster.im/tags/Smartphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smartphone</span></a> plattgemacht und neu installiert. Wieder komplett ohne <a href="https://muenster.im/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://muenster.im/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> <a href="https://muenster.im/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a> Krempel. Alles was sonst noch übrig ist bleibt in <a href="https://muenster.im/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://muenster.im/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> stecken...<br><a href="https://muenster.im/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a></p>
Hessenhelden<p>Meine <a href="https://mastodon.social/tags/OPNsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPNsense</span></a> <a href="https://mastodon.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> ist abgestürzt. Zuerst kein Internet, dann die Erkenntnis: Kein Boot-Medium erkannt. Woran's liegt? Keine Ahnung. Gestern noch ein Update gemacht, mit Reboot zur Sicherheit – heute ist alles tot. Ich hab weder Zeit noch Nerven, mich jetzt darum zu kümmern. Ohne funktionierende Firewall fühle ich mich nackt.</p><p>Ich könnte Ko****</p><p>🤮 </p><p>💀</p>
BSI<p>Ihr möchtet dafür sorgen, dass eure Kinder im Netz sicher unterwegs sind? Dann klickt in unseren "Wegweiser kompakt: 8 Tipps für den digitalen Familienalltag": 👉 <a href="https://www.bsi.bund.de/dok/1101378" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bsi.bund.de/dok/1101378</span><span class="invisible"></span></a> </p><p><a href="https://social.bund.de/tags/DeutschlandDigitalSicherBSI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeutschlandDigitalSicherBSI</span></a> <a href="https://social.bund.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://social.bund.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.bund.de/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersicherheit</span></a></p>
The Psychotic Network Ferret<p>let's see if I can format this correctly.</p><p>Dynamic Address lists in JunOS on an SRX firewall.</p><p>----------------------------<br>user@srx&gt; show configuration security dynamic-address </p><p>feed-server &lt;just-a-name&gt; { <br> url http(s)://server.hostname<br> update-interval &lt;seconds&gt;;<br> hold-interval &lt;more-seconds&gt;;<br> feed-name feed-1 {<br> path /gets/appended/to/url;<br> }<br> feed-name feed-2 {<br> path /gets/appended/to/url;<br>} <br>address-name address-1 {<br> description &lt;something-useful&gt;<br> profile {<br> feed-name feed-1;<br> }<br>}<br>address-name address-2 {<br> description &lt;something-useful&gt;<br> profile {<br> feed-name feed-2; <br> }<br>}<br>-------------------------</p><p>You need a webserver that has files with CIDR formatted prefixes, one per line, eg:<br>192.0.2.1/32<br>192.0.2.16/28<br>192.0.2.128/25</p><p>------------------------</p><p>The SRX will fetch that file every update-interval, if it fails to get the file, it will hold the last good copy for the hold-interval before expiring it.</p><p>------------------------</p><p>see a list:<br>show security dynamic-address feed-name &lt;feed-name&gt;</p><p>force an update:<br>request security dynamic-address update address-name &lt;address-name&gt;</p><p>------------------------</p><p>once you have them loaded, they can be used just like address and address-set entries in firewall rules</p><p>Cool, huh?</p><p><a href="https://mastodon.bsd.cafe/tags/Juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Juniper</span></a> <a href="https://mastodon.bsd.cafe/tags/JunOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JunOS</span></a> <a href="https://mastodon.bsd.cafe/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://mastodon.bsd.cafe/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.bsd.cafe/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Merle Meyerdierks<p>Ein googlefreies <a class="hashtag" href="https://bsky.app/search?q=%23Smartphone" rel="nofollow noopener" target="_blank">#Smartphone</a> für unter 90 Euro! Das bietet <a class="hashtag" href="https://bsky.app/search?q=%23Martkkauf" rel="nofollow noopener" target="_blank">#Martkkauf</a> mit dem <a class="hashtag" href="https://bsky.app/search?q=%23Motorola" rel="nofollow noopener" target="_blank">#Motorola</a> <a class="hashtag" href="https://bsky.app/search?q=%23Moto" rel="nofollow noopener" target="_blank">#Moto</a> g34 - vom 12. - 17. Mai. In Kürze wird das <a class="hashtag" href="https://bsky.app/search?q=%23ungoogled" rel="nofollow noopener" target="_blank">#ungoogled</a> <a class="hashtag" href="https://bsky.app/search?q=%23Android" rel="nofollow noopener" target="_blank">#Android</a> von <a href="https://calyxos.org" rel="nofollow noopener" target="_blank">calyxos.org</a> dafür erscheinen. Mit <a class="hashtag" href="https://bsky.app/search?q=%23Firewall" rel="nofollow noopener" target="_blank">#Firewall</a>, <a class="hashtag" href="https://bsky.app/search?q=%23microG" rel="nofollow noopener" target="_blank">#microG</a> &amp; <a class="hashtag" href="https://bsky.app/search?q=%23AuroraStore" rel="nofollow noopener" target="_blank">#AuroraStore</a> Sag "Tschüss" zur <a class="hashtag" href="https://bsky.app/search?q=%23Datenkrake" rel="nofollow noopener" target="_blank">#Datenkrake</a> <a class="hashtag" href="https://bsky.app/search?q=%23Google" rel="nofollow noopener" target="_blank">#Google</a> <a class="hashtag" href="https://bsky.app/search?q=%23Privatsph%C3%A4re" rel="nofollow noopener" target="_blank">#Privatsphäre</a> <a class="hashtag" href="https://bsky.app/search?q=%23Datenschutz" rel="nofollow noopener" target="_blank">#Datenschutz</a></p>
Bundeszentrale f. pol. Bildung<p><a href="https://social.bund.de/tags/Job" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Job</span></a> Zum nächstmöglichen Zeitpunkt suchen wir in <a href="https://social.bund.de/tags/Bonn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bonn</span></a> für das Referat Z/5 „Informationstechnik“ Verstärkung im Bereich <a href="https://social.bund.de/tags/Netzwerke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerke</span></a> und <a href="https://social.bund.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a>. Zu den Aufgaben gehören u.a. die Konzeptionierung, Durchführung und Koordinierung von Projekten zur Neu- und Weiterentwicklung von Firewall- und Netzwerk-Infrastrukturen. </p><p>Hier erfahrt ihr mehr: <a href="https://www.bpb.de/561580" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bpb.de/561580</span><span class="invisible"></span></a><br>Kommt gerne auch am 8. Mai um 15 Uhr beim offenen Online-Treffen vorbei, wo ihr das IT-Team kennenlernen und Fragen stellen könnt.</p>
C.<p>Q: So, anything new? What'd you do today?</p><p>A: Oh, dug through menus in a new AV receiver to find its MAC addresses, configured my network DHCP server to give it a static address, and then wrote some iptables rules to keep that address from being able to reach outside the LAN. Pretty standard stuff.</p><p>Looking for a "DO NOT CONNECT THIS MACHINE TO THE INTERNET NO MATTER HOW MUCH IT NAGS" warning sign to print out.</p><p><a href="https://mindly.social/tags/dystopia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dystopia</span></a> <a href="https://mindly.social/tags/spying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spying</span></a> <a href="https://mindly.social/tags/telemetry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telemetry</span></a> <a href="https://mindly.social/tags/connected" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>connected</span></a> <a href="https://mindly.social/tags/SmartDevice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartDevice</span></a> <a href="https://mindly.social/tags/AV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AV</span></a> <a href="https://mindly.social/tags/AVR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AVR</span></a> <a href="https://mindly.social/tags/receiver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>receiver</span></a> <a href="https://mindly.social/tags/HomeTheatre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HomeTheatre</span></a> <a href="https://mindly.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a></p>
r1w1s1Comparing firewall syntax for SSH (port 22) with default-deny:<br>================================================<br><br><a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#iptables</a> (Linux)<br>iptables -A INPUT -p tcp --dport 22 -j ACCEPT<br>iptables -P INPUT DROP<br><br><a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#nftables</a> (Linux)<br>nft add rule inet my_filter input tcp dport 22 accept<br>nft add rule inet my_filter input drop<br><br><a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener" target="_blank">#ufw</a> (Linux - simplified frontend to iptables)<br>ufw allow 22/tcp<br>ufw default deny incoming<br><br><a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#pf</a> (OpenBSD)<br>pass in proto tcp to port 22<br>block all<br><br>pf’s syntax feels so elegant, human-readable, &amp; minimal!<br><br>After 20years scripting iptables, I’m ready to try UFW on my laptop.<br><a href="https://snac.bsd.cafe?t=firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#firewall</a> <a href="https://snac.bsd.cafe?t=sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#sysadmin</a> <a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#pf</a> <a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#iptables</a> <a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener" target="_blank">#ufw</a> <a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#nftables</a><br>
politikal<p>Wie bringt man die Mitmenschen nur dazu, den Mailverkehr zu verschlüsseln? Stöhn... 😵‍💫</p><p><a href="https://mastodon.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unplugtrump</span></a> <a href="https://mastodon.social/tags/pfsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pfsense</span></a> <a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.social/tags/netcup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netcup</span></a> <a href="https://mastodon.social/tags/vps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vps</span></a> <a href="https://mastodon.social/tags/cloudserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudserver</span></a> <a href="https://mastodon.social/tags/netzwerk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netzwerk</span></a> <a href="https://mastodon.social/tags/cloudnetzwerk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudnetzwerk</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>server</span></a> <a href="https://mastodon.social/tags/lineageOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lineageOS</span></a> <a href="https://mastodon.social/tags/DigitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleSouveränität</span></a> <a href="https://mastodon.social/tags/SupportYourLocalDealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupportYourLocalDealer</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/linuxmint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linuxmint</span></a> <a href="https://mastodon.social/tags/digitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitaleSouveränität</span></a> <a href="https://mastodon.social/tags/digitaleSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitaleSicherheit</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a></p>
[chocula@mastodon ~]$:t_blink:<p>A question... :thonking:</p><p>Do you use firewall in Linux. If the answer is yes what is it?<br><a href="https://social.linux.pizza/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://social.linux.pizza/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a></p>
Doerk<p>Gary has published a new video on his 5 top tips for home labbers, focusing on pfSense/opnsense. Like always, good tips for those of us who are using these filters in their network. Thanks <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@garyhtech" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>garyhtech</span></a></span> !</p><p><a href="https://mastodon.bsd.cafe/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.bsd.cafe/tags/bsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.bsd.cafe/tags/pfsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pfsense</span></a></p><p><a href="https://m.youtube.com/watch?v=HR9SnkrbVnI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">m.youtube.com/watch?v=HR9Snkrb</span><span class="invisible">VnI</span></a></p>
Jordan<p>I've seen a real uptick in the past couple of days in attacks on my IP address space. Not sure if I'm being targeted, or part of a wider campaign. Oh well, fail2ban makes quick work of them 😸</p><p><a href="https://fosstodon.org/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://fosstodon.org/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/fail2ban" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fail2ban</span></a> <a href="https://fosstodon.org/tags/subjam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>subjam</span></a></p>
D_70WN 🌈 🏳️‍⚧️<p>Nice hardware with power over ethernet, then a decent firmware on openwrt, $sense or something else. <a href="https://chaos.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecurity</span></a> <a href="https://chaos.social/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/poe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>poe</span></a></p>