triskelion, to random
@triskelion@floss.social avatar

Why does podman has legacy iptables dependency? 🤔

jhx, to linux
@jhx@fosstodon.org avatar

In case anyone else ever has some fun with #docker and #libvirt / #kvm on #Linux :linux:

By default the FORWARD table drops all packages...
To get vm's back on the net simply leverage #iptables to make the packets flow again:

$ sudo iptables -A FORWARD -i br0 -o br0 -j ACCEPT

You can install iptables-persistent to save the current ruleset so it is applied every time you restart the system. 😉

Did that on my #Debian workstation... I always fall for it. 😂

larsmb, to random
@larsmb@mastodon.online avatar

Ah, obviously. #docker only gets along with #firewalld if the latter is using the iptables backend (not the higher performing nftables default).
The #iptables backend is depreciated and slated for removal.

And of course there's no error message if configured "incorrectly", just random breakage that one then gets to debug!

I hate computers. I wish I was good enough at something else.

#Linux

weilawei, to linux
@weilawei@mastodon.online avatar

Hot take: #Linux #iptables is a steaming pile of garbage when compared to #OpenBSD #pf.

I've used both for a long time, and iptables is just a slow mess. I really prefer my boxen that use pf.

pf is simple, clean, and significantly faster.

some_natalie, to random
zeroiee, to wireguard
@zeroiee@techhub.social avatar

Hey Fediverse , have you heard of Wireguard VPN networks?

No worries - we're not trying to trick you into subscribing to another scammy VPN provider that you don't need 😉

Wireguard is an Open Source VPN protocol and implementation for lightweight VPN connections that "just work". We've been using this technology to connect our ZERO nodes across the internet and to our office. It enables us to monitor and update AMPS devices remotely without any client interaction.

To make sure that sensitive customer data does not leak, we've come up with a security concept for our VPN server. We share a part of our implementation in our latest blog post:

"Securing a multi-tenant Wireguard VPN server with iptables" - https://blog.zero-iee.com/en/posts/multi-tenant-wireguard-vpn-server/

What are you using Wireguard for? Did you face any challenges when switching to Wireguard based VPN networking? - And how did you tacle them?

mai_lapyst, to linux
@mai_lapyst@soc.saiyajin.space avatar

After spending yesterday entirely by re-implementing in I now know:

  • TCP is weird
  • we have the PSH flag that completly makes the data ignore the TCP sending/recieve buffers and directly writes into the application's stream
  • ACK can be part of literally any other package; you also can SYN, FIN or PSH data while ACK'ing
  • zero-length data packages technically exist, but they dont do anything; they dont even wake up the FD when it's in a epoll
  • the is funny: it responds with RST to incomming TCP packets, even on raw sockets; you'll need to drop them via if you want to implement TCP in userspace

Learned a lot! Now I can go on and create a few tests for ; mainly SYN floodings and so on.

flipsideza, to random
@flipsideza@fosstodon.org avatar

Can I route my #pivpn traffic out to the internet via an online vpn provider. Say #protonvpn for example? Am I going to have to go deep into #iptables or would installing the protonvpn cli and enabling it be enough?

5min job or weekend project? 🤔

Ozzy, to random
linuxmagazine, to foss
@linuxmagazine@fosstodon.org avatar

From Linux Update: Frank Hoffman shows you how nftables simplifies the process of creating and maintaining firewall rules https://www.linux-magazine.com/Issues/2023/270/nftables #firewall #nftables #iptables #FOSS #filter #packets #Linux #netfilter #OpenSource

geekland, to debian Spanish
@geekland@mastodon.social avatar
profoundlynerdy, to firefox
@profoundlynerdy@bitbang.social avatar

https://mastodon.cloud/@slashdot/110630469728113305
slashdot@mastodon.cloud - Brave Aims To Curb Practice of Websites That Port Scan Visitors https://tech.slashdot.org/story/23/06/29/219224/brave-aims-to-curb-practice-of-websites-that-port-scan-visitors?utm_source=rss1.0mainlinkanon

When can #Firefox get this feature? I had no idea #portscanning from the web was a thing. That's far too invasive. Is there a sane way to set this up locally #Linux with #iptables?

#cybersecurity

RL_Dane,
@RL_Dane@fosstodon.org avatar

@profoundlynerdy

How would a port scan get through nat? Is it happening in JS?

#cybersecurity #iptables #linux #portscanning #firefox

appzer0, to fediverse French

en: OK fellows, here's a pad with IPv4 rules to block inbound traffic fom & their friends, feel free to add any IPs/ranges that would be missing.

fr: OK les gens, voici un pad avec les règles IPv4 pour iptables bloquant en entrée Meta et ses copains, n'hésitez pas à y ajouter toute IP/range qui manquerait.

Thanks to @MOULE @revengeday https://pad.liberta.vip/p/fediblockmeta

MOULE, (edited ) to internet

CONFIRMED: "Threads" is the name of 's new -enabled social media, also codenamed , , & .

URL: https://threads.net
IPv4: 157.240.22.63
IPv6: 2a03:2880:f231:c5:face:b00c:0:43fe

I recommend everyone block threads.net in their domain blocking lists, and every in the to all Meta's IP addresses at the firewall level before they go live on the on July 6th: read https://mastodon.moule.world/@MOULE/110586556696261405 for more info!

MOULE,

Here's the #iptables and #ip6tables commands to block #IPv4 and #IPv6 packets directed to/from threads.net:

iptables -A INPUT -s 157.240.22.63 -j DROP
iptables -A OUTPUT -s 157.240.22.63 -j DROP
ip6tables -A INPUT -s 2a03:2880:f231:c5:face:b00c:0:43fe -j DROP
ip6tables -A OUTPUT -s 2a03:2880:f231:c5:face:b00c:0:43fe -j DROP

@revengeday has a list of 2000+ domains owned by Facebook / Meta you can save as "blocked_domains.csv" and import as a blocking list in your server: https://datakra.sh/assets/lizard.txt

Screenshot showing that threads.net's IPv6 address has been blocked on mastodon.moule.world in the OUTPUT chain.
Screenshot showing that threads.net's IPv6 address has been blocked on mastodon.moule.world in the INPUT chain.
Screenshot showing threads.net's IPv4 address is blocked in mastodon.moule.world's firewall in both the INPUT and OUTPUT chains.

MOULE,

Here's a list of #iptables and #ip6tables commands for admins can copy and paste into their #Fediverse server's command line to bulk-block all packets to and from IPv4 and IPv6 addresses owned by #Meta:

https://drive.google.com/file/d/16syQy-HMIb__cEBua6y-ZZDYGfXwYf01/view?usp=sharing

Sources:

  1. https://www.asnlookup.com/ipv4/31.13.24.0/ (including other CIDRs listed on the page)
  2. https://datakra.sh/assets/lizard.txt (the 2,024 domains listed here have been found to use either of 26 IPv4 addresses, which I have updated the list on my Google drive with.)

#FediBlock #FediPact

ablackcatstail, to linux

The more I am digging in to , the more I am realizing I really need to take the time to grok . This way I'll understand what tools like and are really doing.

adam, to linux

Is there really no #Linux #firewall that can allow or block FQDNs or domains?

iptables doesn't do it, and #ufw is just a frontend for #iptables. What else is out there for #Debian based machines?

For context: I've been around Linux since the days of ipchains. I know the #OSI model and run my own #DNS servers (primary, secondary, and resolving/caching) so there's no need to explain why this feature is non-trivial to implement

Most other OSes have this feature and it's pretty reasonable to want

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • InstantRegret
  • mdbf
  • ngwrru68w68
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • osvaldo12
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • JUstTest
  • tacticalgear
  • ethstaker
  • modclub
  • cisconetworking
  • tester
  • GTA5RPClips
  • cubers
  • everett
  • megavids
  • provamag3
  • normalnudes
  • Leos
  • lostlight
  • All magazines