gyptazy.ch is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
contact@gyptazy.ch
Admin account
@gyptazy@gyptazy.ch

Search results for #pf

Peter N. M. Hansteen »
@pitrh@mastodon.social

For those of you wondering what happened to the slides, the new home for the slides is at nxdomain.no/~peter/pf_fullday. - as PDF for reasons only to be discussed over refreshments when we meet.

New versions will be available at that location in sync with updated sessions.

And since somebody asked - yes, the older version slides exist but now also sport a link the new location.

Juno »
@jutty@mastodon.bsd.cafe

After a lot of nftables documentation read, I have a working ruleset with two-way blocking.

One thing that was a nuisance all along:

nftables provides a way to use configuration files to lay out your ruleset, which is great, and from what I infer was not possible in iptables and only accomplished with scripting.

But the docs are still very centered on configuring everything through imperative commands, which is just... hard to grasp, to say the least.

Compared to pf, there are some more complex possibilities, like dictionaries and typed sets.

The underlying processing is very different though. While in nftables I felt like I was writing the rules themselves, in pf I was writing syntax that would then expand to the rules. That meant much more concise rulesets.

It also defaults to stopping evaluation at the first block, while pf defaults to "last rule wins". Not sure how I feel about that, but overall pf seems to be easier to reason about.

Peter N. M. Hansteen »
@pitrh@mastodon.social

A recent kerfuffle over a issues in a popular firewall out there makes me think it's time to point to an article I wrote about my favorite -

"A Few of My Favorite Things About The OpenBSD Packet Filter Tools" nxdomain.no/~peter/better_off_ (or with nicer formatting but trackers bsdly.blogspot.com/2022/09/a-f)

Felix Palmen 📯 »
@zirias@techhub.social

@badgerops Ok that's pretty fine it seems. Authentication and remote desktops working with these pretty minimal firewall rules ( on ):

pass proto tcp from $rdgwhost to $adhost port ldaps
pass proto tcp from $rdgwhost to $rdhosts port rdp

I can't be 100% sure no credential stealing will EVER be possible, but at least it seems unlikely. Both of these allowed connections use , so assuming an attacker would succeed to "enter" the , any attack on credentials would involve trying to get them from the virtual address space of running services.

Peter N. M. Hansteen »
@pitrh@mastodon.social

Peter N. M. Hansteen »
@pitrh@mastodon.social

This week it's 2024.asiabsdcon.org/program.ht - I'll be doing a refresh of the "Network Management with the OpenBSD Packet Filter Toolset" tutorial with Max Stucchi @stucchimax

Felix Palmen 📯 »
@zirias@techhub.social

Impatiently waiting for my backup to complete ...

Then the next step will be to test (as introduced in 13.3), to finally replace my horrible hack of redirecting NFS-related traffic with (and, therefore, punching a hole for LAN machines to access the physical host located in the management segment).

I hope to also move to at the same time. And once *this* works, enable auth and encryption. We will see 😎

Peter N. M. Hansteen »
@pitrh@mastodon.social

A Few of My Favorite Things About The OpenBSD Packet Filter Tools nxdomain.no/~peter/better_off_ (or with trackers bsdly.blogspot.com/2022/09/a-f) reprising my 2022 piece about fun and useful things to do with , some of which are doeable on , , and elsewhere too.

Stefan Sperling »
@stsp@bsd.network

I will be hosting and firewall courses at @linuxhotel in the city of Essen, Germany.

July 1-3 2024: OpenBSD: linuxhotel.de/course/openbsd-d

July 4-5 2024: PF: linuxhotel.de/course/pf-de

The target audience are system administrators who would like to learn about OpenBSD and PF in order to use them as part of their network security tool set.

(Do not be afraid to sign up if you do not understand German. While the courses are advertised in German, written course material will be in English and the presentation will be in English if preferred by participants.)

Ricardo Martín »
@fluxwatcher@mastodon.social

weilawei »
@weilawei@mastodon.online

Hot take: is a steaming pile of garbage when compared to .

I've used both for a long time, and iptables is just a slow mess. I really prefer my boxen that use pf.

pf is simple, clean, and significantly faster.