helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

171
active users

#pf

0 posts0 participants0 posts today

What do the clever OpenBSD firewall folks use to put up a reasonable defence against known bad actors?

I have an SSH bastion host that gest spammed with connection attempts (it only accepts key authentication but even so...) as well as web server for my blog that gets requests for dot files, PHP, cpanel, etc...

On both I'm currently running a shell script that greps the logs for keywords and feeds those IP's into a temporary blocklist but I'm sure there must be a better way, plus some way to feed in a reputable source of bad IP's before they become a problem would be nice.

Finally run debian12 with gui thanks to vm-bhyve on freebsd14 after several month of tweaking and learning. Really big thank to @vermaden and his article vermaden.wordpress.com/2023/08 ❤️

But one thing I still dont get it. I have a problem with resolving a DNS on the VM. IP addreses works well but domain names like google.com not at all. I solved it by adding "nameserver 8.8.8.8" in /etc/resolv.conf in VM, but I am not sure if I solve it well and dont understabd why I have to solve it anyway, I do not remeber that I would have to set it.
I se vm-bhyve with host wifi wlan interface so I had to set NAT in PF, in article it is a section laptop wifi nat. Is it normal to set resolv.conf file in VM?

𝚟𝚎𝚛𝚖𝚊𝚍𝚎𝚗 · FreeBSD Bhyve VirtualizationThe Bhyve FreeBSD hypervisor (called/spelled ‘beehive’ usually) was created almost 10 years ago. Right now it offers speed and features that other similar solutions provide – such…

A piece of oft-repeated #openbsd #pf advice, from this morning on openbsd-misc:

In addition to the official resources such as the PF FAQ (openbsd.org/faq/pf/index.html) I think my own writings such as "A Few of My Favorite Things About The OpenBSD Packet Filter Tools" nxdomain.no/~peter/better_off_ (or with G's trackers
as the cost for slightly nicer formatting bsdly.blogspot.com/2022/09/a-f)
which has a few useful links at the end including to a certain book that *might*
be worth looking into.

www.openbsd.orgOpenBSD PF: User's Guide

Whenever I see the a "How to protect your #SSH server against #bruteforce attacks" post or article centered on some #Linux woodo, I always think to post about how easy it is to deal with those on #OpenBSD and #FreeBSD with #PF add #statetracking options: As in home.nuug.no/~peter/pf/en/brut, supplemented with nxdomain.no/~peter/forcing_the, alternatively the PF tutorial nxdomain.no/~peter/pf_fullday. and of course The Book of PF, nostarch.com/pf3

Also the slowpoke version: nxdomain.no/~peter/hailmary_le

home.nuug.noTurning away the brutes

[drm] Fence fallback timer expired on ring comp_1.0.0
amdgpu 0000:04:00.0: amdgpu: recover vram bo from shadow start
BUG: kernel NULL pointer dereference, address: 0000000000000010
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
AuthenticAMD.