mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.7K
active users

#firewall

4 posts4 participants1 post today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@n_dimension" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>n_dimension</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@shaknais" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>shaknais</span></a></span> <span class="h-card" translate="no"><a href="https://beige.party/@maxleibman" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>maxleibman</span></a></span> what kind of facist policestate has it become?</p><ul><li>Oh nevermind, having an encrypted phone or using secure communications is also illegal, I guess... [1 - 5]</li></ul><p>And to enshure <em>"criminals"</em> can't just order something on ShitExpress, they now have an <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMEI</span></a>-<a href="https://infosec.space/tags/Allowlisting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Allowlisting</span></a> / <a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://www.youtube.com/watch?v=zIJavqEzEIw" rel="nofollow noopener noreferrer" target="_blank">in place</a> that makes the <a href="https://infosec.space/tags/Turkish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Turkish</span></a> Registration Demands look chill in comparison, [6 - 10] cuz they only yeet devices after 90 days and not <em>preemtively block them from any network!</em></p><ul><li>This wouldn't be such a proplem if Australia was like Germany where the furthest doctor away is 1hr by bike and the worst one could get is a bite from a rabid fox and having to get some post-exposure shots. So yeah tourists are not gonna be able to call for help in down under... </li></ul><p>Seriously, whoever came up with these ideas needs to touch grass, preferablzyin the outback on foot!</p><p><a href="https://www.wired.com/story/australia-encryption-law-global-impact/" rel="nofollow noopener noreferrer" target="_blank">1</a> <a href="https://www.aljazeera.com/news/2022/4/5/australias-dangerous-encryption-law-in-works-in-2015-document" rel="nofollow noopener noreferrer" target="_blank">2</a> <a href="https://astorlegal.com.au/are-cipher-phones-illegal-in-australia/" rel="nofollow noopener noreferrer" target="_blank">3</a> <a href="https://www.kingstonfox.com.au/articles/what-are-dedicated-encrypted-criminal-communication-device-prohibition-orders" rel="nofollow noopener noreferrer" target="_blank">4</a> <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/lawful-access-telecommunications/data-encryption" rel="nofollow noopener noreferrer" target="_blank">5</a> <a href="https://istanbul.tips/detailed-manual-on-how-to-unlock-imei-in-turkey/" rel="nofollow noopener noreferrer" target="_blank">6</a> <a href="https://www.mcks.gov.tr/en/registration-and-matching" rel="nofollow noopener noreferrer" target="_blank">7</a> <a href="https://ico.ku.edu.tr/resources/registering-mobile-phones/" rel="nofollow noopener noreferrer" target="_blank">8</a> <a href="https://expatguideturkey.com/how-can-foreigners-register-imei-in-turkey/" rel="nofollow noopener noreferrer" target="_blank">9</a> <a href="https://www.vartur.com/avoid-penalties-register-your-mobile-phone-in-turkey" rel="nofollow noopener noreferrer" target="_blank">10</a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.ie/@jherazob" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jherazob</span></a></span> <span class="h-card" translate="no"><a href="https://existiert.ch/@leberschnitzel" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>leberschnitzel</span></a></span> they <a href="https://infosec.space/@kkarhan/114437851069942896" rel="nofollow noopener noreferrer" target="_blank">already exist</a>...</p><ul><li>Worst case fork <a href="https://infosec.space/tags/PoWshield" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoWshield</span></a> as used by the fmr. admin of <a href="https://infosec.space/tags/IncognitoMarket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncognitoMarket</span></a> if you don't want to work with your hoster/upstream to block <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attacks through <a href="https://infosec.space/tags/blackholing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blackholing</span></a> and having a proper <a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> setup!</li></ul><p>I think it's bad <a href="https://infosec.space/tags/TechPopulism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechPopulism</span></a> to think that <a href="https://infosec.space/tags/Anubis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anubis</span></a> will fix all the issues.</p><ul><li>It's like <a href="https://infosec.space/tags/KernelLevelAnticheat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KernelLevelAnticheat</span></a>, <a href="https://infosec.space/tags/Antivirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Antivirus</span></a> and <a href="https://infosec.space/tags/DRM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DRM</span></a>: A hamfisted approach that harms legitimate users more than the bad actors!</li></ul><p>Just block all the <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GAFAMs</span></a> ASNs &amp; <a href="https://infosec.space/tags/hosters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hosters</span></a> that host <a href="https://infosec.space/tags/Scrapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Scrapers</span></a> so the industry cracks down harder on them than on <a href="https://infosec.space/tags/IRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IRC</span></a>, <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExitNodes</span></a>, <a href="https://infosec.space/tags/CSAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSAM</span></a> &amp; <a href="https://infosec.space/tags/BitTorrent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BitTorrent</span></a> combined!</p>
Frehi<p>Petter Reinholdtsen: OpenSnitch 1.6.8 is now in Trixie</p><p><a href="http://www.hungry.com/~pere/blog/OpenSnitch_1_6_8_is_now_in_Trixie.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://www.</span><span class="ellipsis">hungry.com/~pere/blog/OpenSnit</span><span class="invisible">ch_1_6_8_is_now_in_Trixie.html</span></a></p><p><a href="https://fosstodon.org/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://fosstodon.org/tags/opensnitch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensnitch</span></a> <a href="https://fosstodon.org/tags/trixie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trixie</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a></p>
Bundeszentrale f. pol. Bildung<p><a href="https://social.bund.de/tags/Job" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Job</span></a> Zum nächstmöglichen Zeitpunkt suchen wir in <a href="https://social.bund.de/tags/Bonn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bonn</span></a> für das Referat Z/5 „Informationstechnik“ Verstärkung im Bereich <a href="https://social.bund.de/tags/Netzwerke" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netzwerke</span></a> und <a href="https://social.bund.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a>. Zu den Aufgaben gehören u.a. die Konzeptionierung, Durchführung und Koordinierung von Projekten zur Neu- und Weiterentwicklung von Firewall- und Netzwerk-Infrastrukturen. </p><p>Hier erfahrt ihr mehr: <a href="https://www.bpb.de/561580" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bpb.de/561580</span><span class="invisible"></span></a><br>Kommt gerne auch am 8. Mai um 15 Uhr beim offenen Online-Treffen vorbei, wo ihr das IT-Team kennenlernen und Fragen stellen könnt.</p>
AskUbuntu<p>Simple Iptables setup <a href="https://ubuntu.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://ubuntu.social/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://ubuntu.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> <a href="https://ubuntu.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a></p><p><a href="https://askubuntu.com/q/1546681/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1546681/612</span><span class="invisible"></span></a></p>
Manuel 'HonkHase' Atug<p>Windows Server 2025: <a href="https://chaos.social/tags/DomainController" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DomainController</span></a> sind nach Neustart nicht mehr erreichbar</p><p>"Windows Server 2025 leidet offenbar unter einem <a href="https://chaos.social/tags/Konnektivit%C3%A4tsproblem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Konnektivitätsproblem</span></a>. Laut Microsoft wird bei Domain-Controllern das falsche <a href="https://chaos.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a>-Profil geladen."<br><a href="https://www.golem.de/news/windows-server-2025-domain-controller-sind-nach-neustart-nicht-mehr-erreichbar-2504-195369.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/windows-server-2</span><span class="invisible">025-domain-controller-sind-nach-neustart-nicht-mehr-erreichbar-2504-195369.html</span></a></p>
Kompot.si :unverified:<p>The plan after we do a big server upgrade <a href="https://toot.si/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a>, <a href="https://toot.si/tags/yunohost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>yunohost</span></a> and the apps we selfhost is, to analyze the list of 500k IPs that is circulating around and add it to our <a href="https://toot.si/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a>.</p>
C.<p>Q: So, anything new? What'd you do today?</p><p>A: Oh, dug through menus in a new AV receiver to find its MAC addresses, configured my network DHCP server to give it a static address, and then wrote some iptables rules to keep that address from being able to reach outside the LAN. Pretty standard stuff.</p><p>Looking for a "DO NOT CONNECT THIS MACHINE TO THE INTERNET NO MATTER HOW MUCH IT NAGS" warning sign to print out.</p><p><a href="https://mindly.social/tags/dystopia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dystopia</span></a> <a href="https://mindly.social/tags/spying" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spying</span></a> <a href="https://mindly.social/tags/telemetry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>telemetry</span></a> <a href="https://mindly.social/tags/connected" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>connected</span></a> <a href="https://mindly.social/tags/SmartDevice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmartDevice</span></a> <a href="https://mindly.social/tags/AV" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AV</span></a> <a href="https://mindly.social/tags/AVR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AVR</span></a> <a href="https://mindly.social/tags/receiver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>receiver</span></a> <a href="https://mindly.social/tags/HomeTheatre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HomeTheatre</span></a> <a href="https://mindly.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a></p>
heise Security<p>Zyxel-Firewall: Angreifer können Admin-Tokens stehlen</p><p>Zyxels Firewall-Serie USG FLEX H ist verwundbar. Sicherheitsupdates schaffen Abhilfe. </p><p><a href="https://www.heise.de/news/Zyxel-Firewall-Angreifer-koennen-Admin-Tokens-stehlen-10359376.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zyxel-Firewall-A</span><span class="invisible">ngreifer-koennen-Admin-Tokens-stehlen-10359376.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
nigelI was trying to use <code>iptables</code> decided that life is too short for this hobbyist to go down that path, so installed <code>ufw</code> and saw there was an XMPP app profile when doing <code>ufw app list</code>.<br><br>Brilliant, this should be easy then!<br><b>WRONG.</b><br><br>This is what <code>ufw app info XMPP</code> gave:<br><br><pre>Profile: XMPP<br>Title: XMPP Chat<br>Description: XMPP protocol (Jabber and Google Talk)<br><br>Ports:<br> 5222/tcp<br> 5269/tcp<br></pre>Which is um... not many ports. And naturally broke things like image uploading.<br><br>So I wrote my own in a new file at /etc/ufw/applications.d/ufw-prosody like this:<br><br><pre>[Prosody]<br>title=Prosody XMPP<br>description=Prosody XMPP Server ports per https://prosody.im/doc/ports<br>ports=5000,5222,5223,5269,5270,5281/tcp<br></pre>Which after saving, doing <code>ufw app update Prosody</code>,<br>then <code>ufw app info Prosody</code> now gives:<br><br><pre>Profile: Prosody<br>Title: Prosody XMPP<br>Description: Prosody XMPP Server ports per https://prosody.im/doc/ports<br><br>Ports:<br> 5000,5222,5223,5269,5270,5281/tcp<br></pre><code>ufw allow Prosody</code> to apply (allow) the rules and all is well again.<br><br>❤️<br><a href="https://snac.lowkey.party?t=xmpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#XMPP</a> <a href="https://snac.lowkey.party?t=prosody" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Prosody</a> <a href="https://snac.lowkey.party?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> <a href="https://snac.lowkey.party?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> <a href="https://snac.lowkey.party?t=firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#firewall</a><br>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10353991.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10353991.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
dwardoric<p>Debugging aids for pf firewall rules [on FreeBSD] – Dan Langille's Other Diary</p><p><a href="https://dan.langille.org/2025/02/24/debugging-aids-for-pf-firewall-rules-on-freebsd/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dan.langille.org/2025/02/24/de</span><span class="invisible">bugging-aids-for-pf-firewall-rules-on-freebsd/</span></a></p><p><a href="https://chaos.social/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://chaos.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a></p>
r1w1s1Comparing firewall syntax for SSH (port 22) with default-deny:<br>================================================<br><br><a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> (Linux)<br>iptables -A INPUT -p tcp --dport 22 -j ACCEPT<br>iptables -P INPUT DROP<br><br><a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#nftables</a> (Linux)<br>nft add rule inet my_filter input tcp dport 22 accept<br>nft add rule inet my_filter input drop<br><br><a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> (Linux - simplified frontend to iptables)<br>ufw allow 22/tcp<br>ufw default deny incoming<br><br><a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#pf</a> (OpenBSD)<br>pass in proto tcp to port 22<br>block all<br><br>pf’s syntax feels so elegant, human-readable, &amp; minimal!<br><br>After 20years scripting iptables, I’m ready to try UFW on my laptop.<br><a href="https://snac.bsd.cafe?t=firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#firewall</a> <a href="https://snac.bsd.cafe?t=sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#sysadmin</a> <a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#pf</a> <a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> <a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> <a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#nftables</a><br>
Ralf-Peter Kleinert<p>Sicherer Fernzugriff mit pfSense und WireGuard: In meinem Artikel zeige ich dir, wie du Schritt für Schritt einen WireGuard-VPN-Server aufsetzt – inklusive Tunnel-Konfiguration, Peer-Einrichtung und Firewall-Regeln. Ideal für alle, die ihre Netzwerksicherheit erhöhen möchten.</p><p><a href="https://ralf-peter-kleinert.de/linux-server/pfsense-wireguard-vpn.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ralf-peter-kleinert.de/linux-s</span><span class="invisible">erver/pfsense-wireguard-vpn.html</span></a></p><p><a href="https://mastodon.social/tags/pfSense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pfSense</span></a> <a href="https://mastodon.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/Netzwerksicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netzwerksicherheit</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://mastodon.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosting</span></a></p>
Elosha<p>Quick reminder for the <a href="https://chaos.social/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://chaos.social/tags/admin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>admin</span></a>:</p><p>1. ALWAYS patch your <a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a><br>2. ALWAYS set up multi-factor auth for vpn access<br>3. ALWAYS set up geoblocking<br>4. ALWAYS disable unneeded accounts<br>5. ALWAYS disable public weblogins</p><p>Or you will suffer an incident sooner or later. Do such things even if you‘re lazy, because ransomware ruins lives in different ways.</p><p>It is just annoying to see the same mistakes leading to ransomware incidents happening over and over. It‘s called a firewall for a reason.</p>
politikal<p>Wie bringt man die Mitmenschen nur dazu, den Mailverkehr zu verschlüsseln? Stöhn... 😵‍💫</p><p><a href="https://mastodon.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unplugtrump</span></a> <a href="https://mastodon.social/tags/pfsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pfsense</span></a> <a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.social/tags/netcup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netcup</span></a> <a href="https://mastodon.social/tags/vps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vps</span></a> <a href="https://mastodon.social/tags/cloudserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudserver</span></a> <a href="https://mastodon.social/tags/netzwerk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netzwerk</span></a> <a href="https://mastodon.social/tags/cloudnetzwerk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudnetzwerk</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://mastodon.social/tags/lineageOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lineageOS</span></a> <a href="https://mastodon.social/tags/DigitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitaleSouveränität</span></a> <a href="https://mastodon.social/tags/SupportYourLocalDealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupportYourLocalDealer</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/linuxmint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxmint</span></a> <a href="https://mastodon.social/tags/digitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaleSouveränität</span></a> <a href="https://mastodon.social/tags/digitaleSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaleSicherheit</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a></p>
Impish4249<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> </p><p>Rough time to have DOGE running around cutting staff in US Government in seemingly random ways...</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/FortinetFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortinetFirewall</span></a> <a href="https://mastodon.social/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://mastodon.social/tags/threatactors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactors</span></a></p>
heise Security<p>Palo Alto Networks: Schwachstellen in PAN-OS gefährden Firewalls</p><p>Sicherheitslücken im Firewall-Betriebssystem PAN-OS bedrohen Netzwerke. Sicherheitsupdates stehen zum Download. </p><p><a href="https://www.heise.de/news/Palo-Alto-Networks-Schwachstellen-in-PAN-OS-gefaehrden-Firewalls-10348442.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Palo-Alto-Networ</span><span class="invisible">ks-Schwachstellen-in-PAN-OS-gefaehrden-Firewalls-10348442.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@micahflee" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>micahflee</span></a></span> lemme guess: <span class="h-card" translate="no"><a href="https://mastodon.social/@eff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>eff</span></a></span> just took a multi-network eSIM and multi-network WWAN modules to scan for "<a href="https://infosec.space/tags/deauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deauth</span></a>" / "<a href="https://infosec.space/tags/EvilTwin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EvilTwin</span></a>" attacks?</p><p>Cuz I remember <span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>heiseonline</span></a></span> or <span class="h-card" translate="no"><a href="https://squeet.me/profile/golem" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>golem</span></a></span> actually suggest this as a method to detect <a href="https://infosec.space/tags/IMSIcatchers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMSIcatchers</span></a> without requiring an expensive <a href="https://infosec.space/tags/SDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SDR</span></a>: </p><ul><li>By precisely looking when which WWAN stick (for <a href="https://infosec.space/tags/3G" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>3G</span></a> back then) got disconnected and warning if they all got disconnected &amp; reconnected at the same time...</li></ul><p>AFAIK <a href="https://infosec.space/tags/GSMK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GSMK</span></a> uses that same technique for their <a href="https://infosec.space/tags/Baseband" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Baseband</span></a>-<a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> to automatically detect <a href="https://infosec.space/tags/Interception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Interception</span></a> attempts and deploy countermeasures!</p>
[chocula@mastodon ~]$:t_blink:<p>A question... :thonking:</p><p>Do you use firewall in Linux. If the answer is yes what is it?<br><a href="https://social.linux.pizza/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://social.linux.pizza/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a></p>