mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.4K
active users

#iptables

1 post1 participant0 posts today
Diego Córdoba 🇦🇷<p>Les aviso que quedan 2 días de la promoción de precios mínimos de Julio en todos los cursos de <a href="https://mstdn.io/tags/JuncoTIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JuncoTIC</span></a> en <a href="https://mstdn.io/tags/Udemy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Udemy</span></a>!</p><p>Si quieren aprender algo de <a href="https://mstdn.io/tags/gnu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gnu</span></a> <a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redes</span></a> <a href="https://mstdn.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpip</span></a> <a href="https://mstdn.io/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mstdn.io/tags/wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireshark</span></a> <a href="https://mstdn.io/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://mstdn.io/tags/flask" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flask</span></a> <a href="https://mstdn.io/tags/vim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vim</span></a> <a href="https://mstdn.io/tags/lpic1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lpic1</span></a> <a href="https://mstdn.io/tags/firealling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firealling</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>, esta es la oportunidad 🙂 </p><p>Como siempre, los enlaces promocionales en nuestro sitio, los esperamos! 👇 </p><p><a href="https://juncotic.com/cursos/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">juncotic.com/cursos/</span><span class="invisible"></span></a> </p><p>(Cualquier duda me escriben 💬)</p>
Diego Córdoba 🇦🇷<p>Preparando clases del nuevo curso de <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> de <a href="https://mstdn.io/tags/JuncoTIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JuncoTIC</span></a>, sólo puedo decir que es hermosa la forma en la que el comando <a href="https://mstdn.io/tags/nft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nft</span></a> puede cargar configuraciones de forma rápida.</p><p>O es que estoy demasiado acostumbrado a un shell script para configurar reglas de <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>... también puede ser 😅 </p><p><a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/gnu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gnu</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/ciberseguridad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ciberseguridad</span></a> <a href="https://mstdn.io/tags/curso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curso</span></a> <a href="https://mstdn.io/tags/course" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>course</span></a></p>
Sam Bent<p>Whonix workstation firewall drops all clearnet. <br>Only localhost and gateway allowed. <br>Verify with sudo iptables -L -n -v. <br>Test leaks with tcpdump. <br><a href="https://mastodon.social/tags/Whonix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whonix</span></a> <a href="https://mastodon.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://mastodon.social/tags/IPtables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPtables</span></a> <a href="https://mastodon.social/tags/Isolation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Isolation</span></a></p>
linuxHow to Create a Simple IP Blocker Script Using iptables and Fail2Ban Today, I’m going to show you a simple but effective way to automatically block suspicious IPs using a small script and tools l...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Blog" target="_blank">#Blog</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Fail2ban" target="_blank">#Fail2ban</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Iptables" target="_blank">#Iptables</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Linux" target="_blank">#Linux</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/server" target="_blank">#server</a><br><br><a href="https://www.linuxtoday.com/blog/how-to-create-a-simple-ip-blocker-script-using-iptables-and-fail2ban/" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=linux" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=6Q1paRKuoiEjQQ82STD2NSouOfI&amp;interestId=linux" rel="nofollow noopener" target="_blank">Match</a>
Diego Córdoba 🇦🇷<p>1/3<br>Por cierto, sin ánimo de hacer spam, les cuento que tenemos todos los cursos de <a href="https://mstdn.io/tags/juncotic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juncotic</span></a> en descuento por 5 días en <a href="https://mstdn.io/tags/Udmey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Udmey</span></a> :-)</p><p>Si les interesa <a href="https://mstdn.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mstdn.io/tags/redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redes</span></a> <a href="https://mstdn.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpip</span></a> <a href="https://mstdn.io/tags/comandos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>comandos</span></a> <a href="https://mstdn.io/tags/scripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scripting</span></a>, <a href="https://mstdn.io/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a>, <a href="https://mstdn.io/tags/flask" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flask</span></a> y relacionados, tal vez les interese!</p><p>Les dejo los enlaces, cualquier duda me escriben: 👇</p>
Diego Córdoba 🇦🇷<p>Nueva tarde de grabación para <a href="https://mstdn.io/tags/JuncoTIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JuncoTIC</span></a>!! 🎙️ 📹 </p><p>Media hora más de video, hoy todo práctico! ✨</p><p>Esquema de red virtualizado, y configuración desde cero del firewall nftables, creando tablas, cadenas de input, output, forward, y reglas para varias cositas 😉 </p><p>Hace mucho que no armaba tanto escenario para grabar, ahora a aprovecharlo para todas las prácticas que se puedan! En el curso no s vamos a cansar de ejecutar comandos 😃 🖥️ </p><p><a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/curso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curso</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/nft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nft</span></a> <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> <a href="https://mstdn.io/tags/redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redes</span></a> <a href="https://mstdn.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpip</span></a></p>
Diego Córdoba 🇦🇷<p>Bueno, ahora a organizar diapositivas y ejemplos de <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> que hoy se graba para el nuevo curso! <a href="https://mstdn.io/tags/juncotic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juncotic</span></a> </p><p><a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/nft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nft</span></a> <a href="https://mstdn.io/tags/netfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netfilter</span></a></p>
Gonçalo Ribeiro<p>Next, I had the theory that maybe the game was checking the source IP address of the packet to see it if matched the expected player's address based on the DirectPlay protocol phase.</p><p>So I added the following <a href="https://infosec.exchange/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> rule such that any traffic coming from the host towards Sarah's VM (192.168.1.242) would appear as if had come from James' VM (192.168.1.243).</p><p><code>iptables -t nat -A POSTROUTING -p udp -s &lt;my ip&gt; -d 192.168.1.242 -j SNAT --to-source 192.168.1.243</code></p><p>In the packet captures I could see that the source IP changed as intended and Sarah's game responded to these messages, but no trains were produced.</p><p><a href="https://infosec.exchange/tags/games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>games</span></a> <a href="https://infosec.exchange/tags/pcgaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcgaming</span></a> <a href="https://infosec.exchange/tags/trains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trains</span></a> <a href="https://infosec.exchange/tags/LEGO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LEGO</span></a></p>
Diego Córdoba 🇦🇷<p>Nueva tarde de grabación para <a href="https://mstdn.io/tags/juncoTIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juncoTIC</span></a>!!</p><p>Entre trabajo y trabajo se me complicó, pero esta semana realmente tenía ganas de grabar 😃 </p><p>Y hoy llegó el momento, media hora más de video sumado al nuevo curso de firewalls con <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> en <a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> 💪 </p><p>Ya van casi 3hr de video! 😮 </p><p>Hoy tocó jugar con los comandos ⌨️ 🖥️ </p><p>La semana que viene cierro con otras obligaciones, y ya termino de grabar y editar este curso! (y sumo contenido al de <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>)</p><p>Los voy teniendo al tanto por si les interesa 🙂</p>
uvok cheetah<p>...<br>For some reason, <a href="https://woof.tech/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> logging doesn't appear in /var/log/syslog nor /var/log/kern.log nor journalctl.<br>What am I missing?</p><p>(Debian, rsyslog is installed, the log rule definitely is hit, the rule line looks like </p><p>-A FORWARD -j LOG --log-prefix "Dropped Packet: "</p><p>edit: does it matter that I'm running this in a Linux network namespace?</p><p>edit2: Uhh, yeah. <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=2851940ffee313e0ff12540a8e11a8c54dea9c65" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.kernel.org/pub/scm/linux/k</span><span class="invisible">ernel/git/torvalds/linux.git/commit?id=2851940ffee313e0ff12540a8e11a8c54dea9c65</span></a> <br>Apparently it's disabled by defait</p><p><a href="https://woof.tech/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
uvok cheetah<p>I did a mistake with my <a href="https://woof.tech/tags/dn42" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dn42</span></a> network namespace <a href="https://woof.tech/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> setup! I made some crucial mistakes with the rules!</p><p>This should be better:</p><p>```<br>-A FORWARD -s fd00::/8 -d fd00::/8 -j ACCEPT<br>-A FORWARD -i eth0 -d fd00::/8 -j ACCEPT<br>-A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT<br>```</p>
Verfassungklage@troet.cafe<p><a href="https://troet.cafe/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>-Regeln erstellen und dauerhaft speichern (Iptables Teil 2) </p><p><a href="https://gnulinux.ch/iptables-regeln-erstellen-und-dauerhaft-speichern-iptables-teil-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/iptables-regeln-er</span><span class="invisible">stellen-und-dauerhaft-speichern-iptables-teil-2</span></a></p>
GNU/Linux.ch<p>iptables-Regeln erstellen und dauerhaft speichern (Iptables Teil 2)</p><p>In diesem Artikel erkläre ich, wie man eigene Firewall-Regeln mit iptables erstellt und dauerhaft speichert. Mit dabei: eine Einführung in die wichtigsten Begriffe wie INPUT, OUTPUT, DROP und conntrack. </p><p><a href="https://social.anoxinon.de/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://social.anoxinon.de/tags/iptables_persistent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables_persistent</span></a> <a href="https://social.anoxinon.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.anoxinon.de/tags/Netzwerksicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerksicherheit</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p><p><a href="https://gnulinux.ch/iptables-regeln-erstellen-und-dauerhaft-speichern-iptables-teil-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/iptables-regeln-er</span><span class="invisible">stellen-und-dauerhaft-speichern-iptables-teil-2</span></a></p>
Diego Córdoba 🇦🇷<p>Nueva tarde de grabación!! 😃 </p><p>Ya empecé a grabar el contenido propio del curso de <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> (intro de firewalls terminada 💪)</p><p>Ahora, a divertirse y jugar con los comandos y archivos de configuración! 🎉 </p><p>No hay mejor forma de aprender que practicando, y jugando con la tecnología, sí, viva la <a href="https://mstdn.io/tags/CulturaHacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CulturaHacker</span></a> ;-)</p><p><a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/nft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nft</span></a> <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> <a href="https://mstdn.io/tags/curso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curso</span></a> <a href="https://mstdn.io/tags/juncotic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juncotic</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a></p>
Diego Córdoba 🇦🇷<p>1/3<br>🔥 ¡Nueva promoción de precios mínimos por tiempo limitado!</p><p>¿Querés aprender Linux, Redes, Python/Flask, shell scripting, Wireshark, SSH, iptables y más?</p><p>Todos nuestros cursos a sólo USD 9.99 por 5 días!</p><p>Acá los descuentos. Te esperamos!! 👇 👇 </p><p>(Por otras formas de pago: info@juncotic.com)</p><p><a href="https://mstdn.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mstdn.io/tags/Redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Redes</span></a> <a href="https://mstdn.io/tags/TCPIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCPIP</span></a> <a href="https://mstdn.io/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mstdn.io/tags/Flask" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flask</span></a> <a href="https://mstdn.io/tags/shellscripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellscripting</span></a> <a href="https://mstdn.io/tags/Wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireshark</span></a> <a href="https://mstdn.io/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> </p><p>🧵</p>
Verfassungklage@troet.cafe<p>Was ist <a href="https://troet.cafe/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>-persistent? </p><p>Und wie unterscheidet es sich von <a href="https://troet.cafe/tags/UFW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UFW</span></a>? (Iptables Teil 1)</p><p>Wer mit der <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>-Firewall iptables arbeitet, trifft früher oder später auf das Paket iptables-persistent. Was ist das genau – und worin unterscheidet es sich von der einfacheren Alternative UFW? </p><p>Die integrierte <a href="https://troet.cafe/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://troet.cafe/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> ist auf den meisten GNU/#Linux-Systemen verfügbar und bietet eine leistungsfähige Möglichkeit, Netzwerkzugriffe zu kontrollieren. </p><p><a href="https://gnulinux.ch/was-ist-iptables-persistent-und-wie-unterscheidet-es-sich-von-ufw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/was-ist-iptables-p</span><span class="invisible">ersistent-und-wie-unterscheidet-es-sich-von-ufw</span></a></p>
GNU/Linux.ch<p>Was ist iptables-persistent? Und wie unterscheidet es sich von UFW? (Iptables Teil 1)</p><p>Wer mit der Linux-Firewall iptables arbeitet, trifft früher oder später auf das Paket iptables-persistent. Was ist das genau – und worin unterscheidet es sich von der einfacheren Alternative UFW? </p><p><a href="https://social.anoxinon.de/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://social.anoxinon.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.anoxinon.de/tags/Ufw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ufw</span></a> <a href="https://social.anoxinon.de/tags/Netzwerksicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerksicherheit</span></a> <a href="https://social.anoxinon.de/tags/iptables_persiste" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables_persiste</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p><p><a href="https://gnulinux.ch/was-ist-iptables-persistent-und-wie-unterscheidet-es-sich-von-ufw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/was-ist-iptables-p</span><span class="invisible">ersistent-und-wie-unterscheidet-es-sich-von-ufw</span></a></p>
PitWD<p>2/3<br>Aber es gab diverse Issues...<br><a href="https://nrw.social/tags/RaspAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspAP</span></a> z.B. ist trotz eigentlich guter Funktionalität für mich nicht zu gebrauchen. Leaken der echten IP in einigen <a href="https://nrw.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> Situationen - vor allem aber gibts mit RaspAP derzeit bekannte Stabilitätsprobleme mit dem aktuellen <a href="https://nrw.social/tags/RaspberryOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryOS</span></a> auf dem <a href="https://nrw.social/tags/RaspberryPiPico" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryPiPico</span></a>.</p><p>Und jetzt scripte ich mir seit 2 Tagen nen Wolf alle RaspAP Funktionalität mittels <a href="https://nrw.social/tags/NetworkManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkManager</span></a> (<a href="https://nrw.social/tags/nmcli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nmcli</span></a>), <a href="https://nrw.social/tags/dnsmasq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnsmasq</span></a> und <a href="https://nrw.social/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> zu ersetzen.</p>
Diego Córdoba 🇦🇷<p>Enorme artículo acabo de encontrar sobre packet flow en <a href="https://mstdn.io/tags/netfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netfilter</span></a>, <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> y <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a>! 😲 </p><p>👇 </p><p>Nftables - Packet flow and Netfilter hooks in detail</p><p><a href="https://thermalcircle.de/doku.php?id=blog:linux:nftables_packet_flow_netfilter_hooks_detail" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thermalcircle.de/doku.php?id=b</span><span class="invisible">log:linux:nftables_packet_flow_netfilter_hooks_detail</span></a></p><p>Si les gusta <a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a>, <a href="https://mstdn.io/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a>, <a href="https://mstdn.io/tags/netfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netfilter</span></a>, <a href="https://mstdn.io/tags/routing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>routing</span></a>, <a href="https://mstdn.io/tags/sockets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sockets</span></a>, <a href="https://mstdn.io/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> y temas afines, el blog completo de Andrej Stender tiene varios posts muy interesantes!</p>
Diego Córdoba 🇦🇷<p>🛡️ ¿iptables? ¿nftables? ¿firewall stateful o stateless? </p><p>¡La práctica hace al experto!</p><p>En este nuevo post en el blog de <br>juncotic.com, les explico, con ejemplos prácticos, cómo configurar un <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> stateless y uno stateful usando <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> y <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> 🔥</p><p>¡Y todo por línea de comandos! 💪</p><p>Aquí podrán ver las diferencias de sintaxis y comparar ambas herramientas, ideal si estás iniciando con iptables, o estás explorando el mundo de nftables.</p><p>¡Espero que les guste! 👇</p><p><a href="https://juncotic.com/iptables-y-nftables-practicos-stateless-y-stateful/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">juncotic.com/iptables-y-nftabl</span><span class="invisible">es-practicos-stateless-y-stateful/</span></a></p>