helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

158
active users

#firewall

1 post1 participant0 posts today
r1w1s1Comparing firewall syntax for SSH (port 22) with default-deny:<br>================================================<br><br><a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> (Linux)<br>iptables -A INPUT -p tcp --dport 22 -j ACCEPT<br>iptables -P INPUT DROP<br><br><a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#nftables</a> (Linux)<br>nft add rule inet my_filter input tcp dport 22 accept<br>nft add rule inet my_filter input drop<br><br><a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> (Linux - simplified frontend to iptables)<br>ufw allow 22/tcp<br>ufw default deny incoming<br><br><a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#pf</a> (OpenBSD)<br>pass in proto tcp to port 22<br>block all<br><br>pf’s syntax feels so elegant, human-readable, &amp; minimal!<br><br>After 20years scripting iptables, I’m ready to try UFW on my laptop.<br><a href="https://snac.bsd.cafe?t=firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#firewall</a> <a href="https://snac.bsd.cafe?t=sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#sysadmin</a> <a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#pf</a> <a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> <a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> <a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#nftables</a><br>
politikal<p>Wie bringt man die Mitmenschen nur dazu, den Mailverkehr zu verschlüsseln? Stöhn... 😵‍💫</p><p><a href="https://mastodon.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unplugtrump</span></a> <a href="https://mastodon.social/tags/pfsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pfsense</span></a> <a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.social/tags/netcup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netcup</span></a> <a href="https://mastodon.social/tags/vps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vps</span></a> <a href="https://mastodon.social/tags/cloudserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudserver</span></a> <a href="https://mastodon.social/tags/netzwerk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netzwerk</span></a> <a href="https://mastodon.social/tags/cloudnetzwerk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudnetzwerk</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://mastodon.social/tags/lineageOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lineageOS</span></a> <a href="https://mastodon.social/tags/DigitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitaleSouveränität</span></a> <a href="https://mastodon.social/tags/SupportYourLocalDealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupportYourLocalDealer</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/linuxmint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxmint</span></a> <a href="https://mastodon.social/tags/digitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaleSouveränität</span></a> <a href="https://mastodon.social/tags/digitaleSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaleSicherheit</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a></p>
Impish4249<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> </p><p>Rough time to have DOGE running around cutting staff in US Government in seemingly random ways...</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/FortinetFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortinetFirewall</span></a> <a href="https://mastodon.social/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://mastodon.social/tags/threatactors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactors</span></a></p>
Doerk<p>Gary has published a new video on his 5 top tips for home labbers, focusing on pfSense/opnsense. Like always, good tips for those of us who are using these filters in their network. Thanks <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@garyhtech" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>garyhtech</span></a></span> !</p><p><a href="https://mastodon.bsd.cafe/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.bsd.cafe/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.bsd.cafe/tags/pfsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pfsense</span></a></p><p><a href="https://m.youtube.com/watch?v=HR9SnkrbVnI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">m.youtube.com/watch?v=HR9Snkrb</span><span class="invisible">VnI</span></a></p>
D_70WN 🌈 🏳️‍⚧️<p>- OPNSense from the Netherlands<br>- <a href="https://opnsense.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">opnsense.org/</span><span class="invisible"></span></a></p><p>- OpenWrt International<br>- <a href="https://openwrt.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">openwrt.org/</span><span class="invisible"></span></a></p><p>Many of them also offer hardware and if no hardware is offered or you want something of your own then you will find everything you need here, <a href="https://www.nrg-systems.de/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">nrg-systems.de/</span><span class="invisible"></span></a></p><p><a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://chaos.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> </p><p>2/2</p><p>/EOL</p>
D_70WN 🌈 🏳️‍⚧️<p>For good reasons, I have completely switched from US providers to EU FOSS projects and solutions since around 2020. Here are the router/firewall solutions. </p><p>- DD-WRT from Germany<br>- <a href="https://dd-wrt.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dd-wrt.com/</span><span class="invisible"></span></a></p><p>- DynFI from France<br>- <a href="https://dynfi.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dynfi.com/</span><span class="invisible"></span></a> </p><p> - IPFire from Germany<br>- <a href="https://www.ipfire.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">ipfire.org/</span><span class="invisible"></span></a></p><p>- Mikrotik from Latvia<br>- <a href="https://mikrotik.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">mikrotik.com/</span><span class="invisible"></span></a></p><p>- Nethsecurity from Italy<br>- <a href="https://nethsecurity.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nethsecurity.org/</span><span class="invisible"></span></a></p><p>1/2</p><p><a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://chaos.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Linux Renaissance<p><strong>You Want To Host Your Own PeerTube Server, Right?</strong></p> <p><a href="https://video.fosshq.org/w/egFPF4pdjKcAsnEiBNLq9f" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">video.fosshq.org/w/egFPF4pdjKc</span><span class="invisible">AsnEiBNLq9f</span></a></p>
samenome<p>"Don't use shorewall anymore, it's old" my stupid brain said. And who wants to be 'old'? Not me. No. I am hip, chic, sprightly-brained. I also live a very happy rich fantasy existence, keep that pin away from my bubble!</p><p>DuckDuckGo: 'nftables replacement for shorewall' gets: <br>"Just accept that Firewalld is a major player, and that iptables is on its way out with nftables being more robust and consistent. And nftables is the default Firewalld back end. Firewalld is good once you get used to what it's doing. And it's the default on Fedora/CentOS/RHEL and SUSE/openSUSE Leap/Tumbleweed. "</p><p>I am always using <a href="https://aus.social/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a>, (because, ahem, old? I'd dare not say) including on this firewall box. But, there's a firewalld package. Probably best to go with the flow ....</p><p>So I install firewalld, then muck about with dnsmasq, then turn back to fiirewalld, which seems enabled without me asking consciously asking for it (?) oh well ...</p><p>Then I get to:<br>Machine: A zone called 'work' exists.<br>Me: nnah, not here in my shed it doesn't.<br><a href="https://aus.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a>-cmd --delete-zone=work --permanent<br>Machine: Error: BUILTIN_ZONE: 'work' is built-in zone</p><p>What!? Say the fuck WHAT? "work"???<br>What fresh hell is this? Am I not allowed to be away from work even here at my shed with the magpies and roos?</p><p>Christ on a bike. Well I'll just get my bigger stick, and do:<br><a href="https://aus.social/tags/rm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rm</span></a> /etc/firewalld/zones/work*<br>and restart firewalld.<br>... It is back ... 🤐 <br>Machine: Error: BUILTIN_ZONE: 'work' is built-in zone<br>Oh. ComeTheFuckON!</p><p><a href="https://aus.social/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a>, unless something changes my mind in the night, you are headed for the bin in the morning. </p><p>And some unasked-for advice from me to the <a href="https://aus.social/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a> people: You MIGHT, just might, have permanent built-ins for 'drop' and 'bridge', ... perhaps. But 'work'? Fuck off to the place with the fuckoff sign, read it carefully, then fuck off further, yes and your friends too. Example zones? fine. Recipes about common 'internal'/'dmz'/'external' arrangements? also fine. Helpful in fact. Demanding that I have a "work" zone??? </p><p>'WORK' </p><p><a href="https://aus.social/tags/JFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JFC</span></a> <a href="https://aus.social/tags/cunts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cunts</span></a></p><p>To think that I fought the good fight for the cultural insensitivity of <a href="https://aus.social/tags/DMZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMZ</span></a>. (oh yeah - that little fucker? built-in too, ofCourseItIs)<br>What a waste of my time.<br> <br><a href="https://aus.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> people: If you had a four-port PCbox configured as a debian <a href="https://aus.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a>, what would you use to make the configuration of <a href="https://aus.social/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a> easy/safe/happy/fucker-free?</p>
Sebastian Büttrich @ ITU<p>In the safe hands of <a href="https://social.itu.dk/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> </p><p><a href="https://www.theregister.com/2025/03/14/ransomware_gang_lockbit_ties/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/14/ran</span><span class="invisible">somware_gang_lockbit_ties/</span></a> </p><p><a href="https://social.itu.dk/tags/forti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forti</span></a> <a href="https://social.itu.dk/tags/fortiOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortiOS</span></a> <a href="https://social.itu.dk/tags/ransom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransom</span></a> <a href="https://social.itu.dk/tags/LockBit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LockBit</span></a> <a href="https://social.itu.dk/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://social.itu.dk/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://social.itu.dk/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
jhx<p>New video out! (A short one) 🙂 </p><p>Using the Spamhaus DROP List on <a href="https://mastodon.bsd.cafe/tags/OPNSense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPNSense</span></a> :freebsd: </p><p><a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.bsd.cafe/tags/opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opnsense</span></a> </p><p>On <a href="https://mastodon.bsd.cafe/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a> <br><a href="https://youtu.be/SNpDWiudIys" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/SNpDWiudIys</span><span class="invisible"></span></a></p><p>On <a href="https://mastodon.bsd.cafe/tags/Odysee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Odysee</span></a> <br> <a href="https://odysee.com/@YetanotherSysAdmin:0/Using-the-Spamhaus-DROP-List-on-OPNSense:6" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">odysee.com/@YetanotherSysAdmin</span><span class="invisible">:0/Using-the-Spamhaus-DROP-List-on-OPNSense:6</span></a></p>
Tom<p>10 years ago I ran LineageOS on my phone and at home I ran a really restrictive firewall. I was blocking port 5228 outbound &amp; I think that caused the phone to factory reset sometimes but I'm not sure. It was really annoying when it happened. Has anyone ever come across it before? </p><p><a href="https://mastodon.bsd.cafe/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://mastodon.bsd.cafe/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://mastodon.bsd.cafe/tags/lineageos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lineageos</span></a> <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a></p>
Want Change? W🔁rk T🔁gether☑<p>Monitor + Give permission for each In / Out network connection (literally)</p><p>BEFORE <a href="https://qoto.org/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> contact similar to a <a href="https://qoto.org/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> </p><p><a href="https://qoto.org/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> <a href="https://qoto.org/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> via <a href="https://qoto.org/tags/LittleSnitch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LittleSnitch</span></a> / <a href="https://qoto.org/tags/OpenSnitch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSnitch</span></a> ...</p><p>Linux <a href="https://github.com/evilsocket/opensnitch" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/evilsocket/opensnit</span><span class="invisible">ch</span></a></p><p><span class="h-card"><a href="https://mastodon.obdev.at/@littlesnitch" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>littlesnitch</span></a></span> / <a href="https://obdev.at/blog/manifesto" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">obdev.at/blog/manifesto</span><span class="invisible"></span></a></p><p>macOS <a href="https://en.wikipedia.org/wiki/Little_Snitch" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Little_S</span><span class="invisible">nitch</span></a> (proprietary?)</p>
Yoshimatsu ✅🇺🇸 🇺🇦<p><span class="h-card" translate="no"><a href="https://newsie.social/@ProPublica" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ProPublica</span></a></span> Get your act behind a <a href="https://toot.community/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a>, <a href="https://toot.community/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a>, <a href="https://toot.community/tags/encrypted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encrypted</span></a> email, <a href="https://toot.community/tags/burnerPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>burnerPhone</span></a> and <a href="https://toot.community/tags/pw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pw</span></a> protected computer. Just bc you're paranoid doesn't mean <a href="https://toot.community/tags/MAGAmron" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MAGAmron</span></a> and <a href="https://toot.community/tags/muskrat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>muskrat</span></a> aren't out to get you! Even if you're not the target, you don't want to end up as collateral damage.</p>
jhx<p>New video out! 😎 </p><p>Setting up a basic <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> with <a href="https://mastodon.bsd.cafe/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> on <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> :freebsd: </p><p>Enjoy 🙂 </p><p><a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.bsd.cafe/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> </p><p>On <a href="https://mastodon.bsd.cafe/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a> <br><a href="https://youtu.be/W3LLuCb8VAs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/W3LLuCb8VAs</span><span class="invisible"></span></a></p><p>On <a href="https://mastodon.bsd.cafe/tags/Odysee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Odysee</span></a> <br><a href="https://odysee.com/@YetanotherSysAdmin:0/Setting-up-a-basic-firewall-with-pf-on-FreeBSD:d" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">odysee.com/@YetanotherSysAdmin</span><span class="invisible">:0/Setting-up-a-basic-firewall-with-pf-on-FreeBSD:d</span></a></p>
Martin Vermeer FCD<p><span class="h-card" translate="no"><a href="https://mastodon.social/@lufthans" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lufthans</span></a></span> <span class="h-card" translate="no"><a href="https://mstdn.social/@GottaLaff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GottaLaff</span></a></span> Could have been worse. Authoritarian parties typically get 20-30 % of the vote, corresponding to the presence of the authoritarian personality within the population... in a proportional system, if parties committed to democratic values understand the assignment, it is manageable.</p><p><a href="https://fediscience.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://fediscience.org/tags/CordonSanitaire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CordonSanitaire</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/PaloAltoNetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaloAltoNetworks</span></a> warns of another <a href="https://mastodon.thenewoil.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> vulnerability under attack by hackers</p><p><a href="https://techcrunch.com/2025/02/19/palo-alto-networks-warns-of-another-firewall-vulnerability-under-attack-by-hackers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/02/19/palo</span><span class="invisible">-alto-networks-warns-of-another-firewall-vulnerability-under-attack-by-hackers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/PaloAlto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaloAlto</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/SonicWall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SonicWall</span></a> <a href="https://mastodon.thenewoil.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> bug leveraged in attacks after PoC exploit release</p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-firewall-bug-leveraged-in-attacks-after-poc-exploit-release/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sonicwall-firewall-bug-leveraged-in-attacks-after-poc-exploit-release/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> discloses second <a href="https://mastodon.thenewoil.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> auth bypass patched in January</p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/SonicWall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SonicWall</span></a> <a href="https://mastodon.thenewoil.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> exploit lets hackers hijack <a href="https://mastodon.thenewoil.org/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> sessions, patch now</p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-firewall-exploit-lets-hackers-hijack-vpn-sessions-patch-now/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sonicwall-firewall-exploit-lets-hackers-hijack-vpn-sessions-patch-now/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
jhx<p>New video out 🙂 </p><p>Quick little video about creating a floating <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> rule on <a href="https://mastodon.bsd.cafe/tags/opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opnsense</span></a> 😎 </p><p>On <a href="https://mastodon.bsd.cafe/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a> <br><a href="https://youtu.be/vitOZBytKGA" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/vitOZBytKGA</span><span class="invisible"></span></a></p><p>On <a href="https://mastodon.bsd.cafe/tags/Odysee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Odysee</span></a> <br><a href="https://odysee.com/@YetanotherSysAdmin:0/Creating-a-floating-firewall-rule-on-OPNSense:7" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">odysee.com/@YetanotherSysAdmin</span><span class="invisible">:0/Creating-a-floating-firewall-rule-on-OPNSense:7</span></a></p>