mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.7K
active users

#iptables

4 posts4 participants0 posts today
Diego Cordoba 🇦🇷<p>Cerrando la semana con las grabaciones del nuevo curso de <a href="https://mstdn.io/tags/firewalling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalling</span></a> con <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a> en <a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a>! </p><p>Se viene también nuevo contenido para el curso de <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> :)</p><p>¿Les interesa que considere añadir algún tema puntual?</p><p>¡Dejamelo en los comentarios!<br>Buen fin de semana!</p>
AskUbuntu<p>Forwarding problem on ubuntu 20+ <a href="https://ubuntu.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://ubuntu.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a></p><p><a href="https://askubuntu.com/q/1546907/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1546907/612</span><span class="invisible"></span></a></p>
Andy Piper<p>I updated my Framework 13 to Fedora 42 about two weeks ago, just before the final release. It has been pretty solid!</p><p>This evening, I went to start up my VPN (I use NordVPN, FWIW). No luck. Just no connection.</p><pre><code>The VPN connection has failed. Please check your internet connection and try connecting to the VPN again. If the issue persists, contact our customer support.</code></pre><p>Well, thanks.</p><p>In case it was a package issue, I uninstalled and reinstalled the third party <code>nordvpn</code> RPM. No luck, same error.</p><p>Digging into the system log, I found this:</p><pre><code>19:40:46 [Error] failed to connect to uk2646.nordvpn.com : resseting forward firewall: reseting allowlist rules: removing allowlisted subnets: listing iptables rules: exec: "iptables": executable file not found in $PATH</code></pre><p>A “smoking gun”! </p><p>OK, so let’s dig a bit more.</p><pre><code>$ journalctl -g iptables -b --no-pagerApr 28 19:47:20 neshatan tailscaled[1649]: linuxfw: clear iptables: exec: "iptables": executable file not found in $PATHApr 28 19:47:20 neshatan tailscaled[1649]: router: iptables not found: firewall mode "iptables" not supported: iptables command run fail: multiple errors:Apr 28 19:47:20 neshatan tailscaled[1649]: exec: "iptables": executable file not found in $PATHApr 28 19:48:56 neshatan nordvpnd[1518]: 2025/04/28 19:48:56 [Error] failed to connect to uk2582.nordvpn.com : resseting forward firewall: reseting allowlist rules: removing allowlisted subnets: listing iptables rules: exec: "iptables": executable file not found in $PATHApr 28 19:49:22 neshatan nordvpnd[1518]: 2025/04/28 19:49:22 [Error] failed to connect to uk1910.nordvpn.com : unsetting allowlist: disabling allowlist routing: clearing allowlisting: iptables listing rules: exec: "iptables": executable file not found in $PATH:Apr 28 19:50:28 neshatan nordvpnd[1518]: 2025/04/28 19:50:28 [Error] failed to connect to uk2281.nordvpn.com : unsetting allowlist: disabling allowlist routing: clearing allowlisting: iptables listing rules: exec: "iptables": executable file not found in $PATH:Apr 28 19:53:36 neshatan nordvpnd[16192]: 2025/04/28 19:53:36 [Error] failed to connect to uk2570.nordvpn.com : resseting forward firewall: reseting allowlist rules: removing allowlisted subnets: listing iptables rules: exec: "iptables": executable file not found in $PATHApr 28 19:57:28 neshatan nordvpnd[16192]: 2025/04/28 19:57:28 [Error] failed to connect to uk2123.nordvpn.com : unsetting allowlist: disabling allowlist routing: clearing allowlisting: iptables listing rules: exec: "iptables": executable file not found in $PATH:</code></pre><p>OK, so we definitely don’t have an <code>iptables</code> executable.</p><p>It turns out that there is an <code>iptables-nft</code> package installed (for netfilter), and this is <em>supposed</em> to install <code>/usr/bin/iptables</code> – but that file doesn’t exist.</p><p>A quick symlink of <code>iptables-nft</code> as <code>iptables</code> was a basic patch for this, and I was able to bring the VPN connection up again.</p><p>Two related reports from the interwebs, one from as recent as today (which may explain why I only just encountered it) – I found these just as I started to write this post.</p><ul><li><a href="https://www.reddit.com/r/Fedora/comments/1k9tvbh/latest_upgrade_of_iptablesnft_and_iptableslibs/" rel="nofollow noopener noreferrer" target="_blank">Latest update of iptables-nft breaks NordVPN</a></li><li><a href="https://www.reddit.com/r/Windscribe/comments/1k0wts4/connection_problem_on_fedora_42/" rel="nofollow noopener noreferrer" target="_blank">Connection problem on Fedora 42</a></li></ul> <p>I’ll take the opportunity of this blog post to point out that <code>nordvpnd</code> has two typos in log messages. I’m not entirely certain where else to report this issue. Consider resetting these.</p><p>In the meantime, I also accidentally discovered that <code>tailscaled</code> had also been reporting issues with a missing <code>iptables</code> executable. I hadn’t noticed too many issues with it over the past couple of weeks, but hopefully this is an improvement for both daemons!</p> <p><strong>Update 2024/04/30</strong> – as pointed out by some folks in Fediverse comments, this appears to have been an issue with an update to the <code>iptables-nft</code> package on Fedora interacting poorly with <code>alternatives</code> and the merger of <code>/usr/bin</code> and <code>/usr/sbin</code>, and has been resolved for the moment by reverting the change 👍</p><p></p><p><a href="https://andypiper.co.uk/2025/04/28/nordvpn-fedora-42-and-iptables-compatibility/" class="" rel="nofollow noopener noreferrer" target="_blank">https://andypiper.co.uk/2025/04/28/nordvpn-fedora-42-and-iptables-compatibility/</a></p><p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/100daystooffload/" target="_blank">#100DaysToOffload</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/computing/" target="_blank">#Computing</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/fedora/" target="_blank">#Fedora</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/iptables/" target="_blank">#iptables</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/linux/" target="_blank">#Linux</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/networking/" target="_blank">#networking</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/nordvpn/" target="_blank">#nordVPN</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/tailscale/" target="_blank">#tailscale</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/technology/" target="_blank">#Technology</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://andypiper.co.uk/tag/vpn/" target="_blank">#VPN</a></p>
AskUbuntu<p>Simple Iptables setup <a href="https://ubuntu.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://ubuntu.social/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://ubuntu.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> <a href="https://ubuntu.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a></p><p><a href="https://askubuntu.com/q/1546681/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1546681/612</span><span class="invisible"></span></a></p>
nigelI was trying to use <code>iptables</code> decided that life is too short for this hobbyist to go down that path, so installed <code>ufw</code> and saw there was an XMPP app profile when doing <code>ufw app list</code>.<br><br>Brilliant, this should be easy then!<br><b>WRONG.</b><br><br>This is what <code>ufw app info XMPP</code> gave:<br><br><pre>Profile: XMPP<br>Title: XMPP Chat<br>Description: XMPP protocol (Jabber and Google Talk)<br><br>Ports:<br> 5222/tcp<br> 5269/tcp<br></pre>Which is um... not many ports. And naturally broke things like image uploading.<br><br>So I wrote my own in a new file at /etc/ufw/applications.d/ufw-prosody like this:<br><br><pre>[Prosody]<br>title=Prosody XMPP<br>description=Prosody XMPP Server ports per https://prosody.im/doc/ports<br>ports=5000,5222,5223,5269,5270,5281/tcp<br></pre>Which after saving, doing <code>ufw app update Prosody</code>,<br>then <code>ufw app info Prosody</code> now gives:<br><br><pre>Profile: Prosody<br>Title: Prosody XMPP<br>Description: Prosody XMPP Server ports per https://prosody.im/doc/ports<br><br>Ports:<br> 5000,5222,5223,5269,5270,5281/tcp<br></pre><code>ufw allow Prosody</code> to apply (allow) the rules and all is well again.<br><br>❤️<br><a href="https://snac.lowkey.party?t=xmpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#XMPP</a> <a href="https://snac.lowkey.party?t=prosody" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Prosody</a> <a href="https://snac.lowkey.party?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> <a href="https://snac.lowkey.party?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> <a href="https://snac.lowkey.party?t=firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#firewall</a><br>
r1w1s1Comparing firewall syntax for SSH (port 22) with default-deny:<br>================================================<br><br><a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> (Linux)<br>iptables -A INPUT -p tcp --dport 22 -j ACCEPT<br>iptables -P INPUT DROP<br><br><a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#nftables</a> (Linux)<br>nft add rule inet my_filter input tcp dport 22 accept<br>nft add rule inet my_filter input drop<br><br><a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> (Linux - simplified frontend to iptables)<br>ufw allow 22/tcp<br>ufw default deny incoming<br><br><a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#pf</a> (OpenBSD)<br>pass in proto tcp to port 22<br>block all<br><br>pf’s syntax feels so elegant, human-readable, &amp; minimal!<br><br>After 20years scripting iptables, I’m ready to try UFW on my laptop.<br><a href="https://snac.bsd.cafe?t=firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#firewall</a> <a href="https://snac.bsd.cafe?t=sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#sysadmin</a> <a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#pf</a> <a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> <a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> <a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#nftables</a><br>
Ziggy the Hamster :whyfox:🐹🌻<p>I must be doing something wrong.</p><p>On the older EL8/Docker 24 instances, I can access the published port for a container via the host’s private IP. So host:32768-&gt;container:8080. This works great, even within a container.</p><p>It does not work on EL9/Docker 25. I do not know why. <a href="https://ruby.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> is configured near identically. Anyone have any ideas? I’ve tried nearly everything at this point. Going to try Docker 24 on EL9 next</p>
Diego Cordoba 🇦🇷<p>Tarde de grabación! Comencé a grabar el nuevo curso de firewall con <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a> de JuncoTIC.com! :D</p><p>Pronto se vendrán actualizaciones en el curso de <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> también... nuevos diagramas, ejemplos, y explicaciones, con mejor calidad de video y audio, como merecen mis alumnos :)</p>
Linux Renaissance<p><strong>How To Mount Remote NFS On Linux</strong></p> <p><a href="https://video.fosshq.org/videos/watch/0bb4ffb9-7cad-4559-aa97-a47cf75b60ac" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">video.fosshq.org/videos/watch/</span><span class="invisible">0bb4ffb9-7cad-4559-aa97-a47cf75b60ac</span></a></p>
Andreu Casablanca 🐀<p><a href="https://hachyderm.io/tags/TIL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TIL</span></a> that, on <a href="https://hachyderm.io/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> systems, <a href="https://hachyderm.io/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> bypasses <a href="https://hachyderm.io/tags/ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ufw</span></a> <a href="https://hachyderm.io/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> rules ( <a href="https://hachyderm.io/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> under the hood ) because of some incompatibility on how they interact with iptables.</p><p>Does anyone know if the same happens with <a href="https://hachyderm.io/tags/Podman" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Podman</span></a> ?</p>
Hraban (fiëé visuëlle)<p>Wanted to play <a href="https://literatur.social/tags/Freeciv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Freeciv</span></a> with my son in my LAN between a Mac and a Debian laptop.<br>After several tries we had matching v3.1.4 (had to self-compile on Linux).<br>Tried to start the server on each machine, other couldn’t see it (connection refused).<br>Switched off the <a href="https://literatur.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> of MacOS and completely opened <a href="https://literatur.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> on Linux after single port settings had no effect.<br>Local tools say the port is open, remote tools (nmap) say it’s closed.<br>Out of ideas now. Any suggestions?</p>
Follow me on video.fosshq.org instead<p><strong>How To Mount Remote NFS On Linux</strong></p> <p><a href="https://tux-edu.tv/videos/watch/cca9930f-0a3b-49ca-bb5f-a325fdadc7fa" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tux-edu.tv/videos/watch/cca993</span><span class="invisible">0f-0a3b-49ca-bb5f-a325fdadc7fa</span></a></p>
OSTechNix<p>How To Check And Secure Open Ports In Linux <a href="https://floss.social/tags/Linuxnetworking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxnetworking</span></a> <a href="https://floss.social/tags/Linuxsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxsecurity</span></a> <a href="https://floss.social/tags/Linuxadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxadmin</span></a> <a href="https://floss.social/tags/Linuxhowto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxhowto</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netstat</span></a> <a href="https://floss.social/tags/ss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ss</span></a> <a href="https://floss.social/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a> <a href="https://floss.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> <a href="https://floss.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://floss.social/tags/lsof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lsof</span></a> <br><a href="https://ostechnix.com/check-and-secure-open-ports-in-linux/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/check-and-secure</span><span class="invisible">-open-ports-in-linux/</span></a></p>
Edd<p>I've spent the last two days at $DayJob bashing my head against a problem. Finally got a solution engineered and deployed last night and it's working.</p><p>Woke up suddenly at about 4am this morning realizing that I massively over engineered it, and I could have solved the problem with about 3 <a href="https://mastodon.eddmil.es/tags/IPTables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPTables</span></a> rules instead.</p><p>Why can't my brain think of these things before I deploy my overly elaborate contraptions?</p>
Sven<p>It looks like on February 15 there was an <a href="https://mastodon.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> update on <a href="https://mastodon.social/tags/RHEL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RHEL</span></a> 9. Broke <a href="https://mastodon.social/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a> accesses to each other.</p>
europlus :autisminf:<p><a href="https://social.europlus.zone/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://social.europlus.zone/tags/SysAdmins" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmins</span></a> <a href="https://social.europlus.zone/tags/NetworkAdmins" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkAdmins</span></a></p><p>Ubuntu 24.04 system with a publicly-routable external IP address.</p><p>For a given incoming UDP port (&lt;1024, call it port x, I can’t change this), I want to forward that to localhost (or the ens3 interface) on another port (&gt;1024, port y) so I can invoke QEMU as non-root and forward port y to the emulated system’s port x via slirp.</p><p>Is this doable?</p><p>I’ve tried heaps of nat prerouted examples, but haven’t yet gotten anything to stick.</p><p>Boosts appreciated!</p><p><a href="https://social.europlus.zone/tags/IPTables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPTables</span></a></p>
Linux Guides<p>Was fuer ein Quatsch ist das eigentlich denn, dass ufw nicht greift, wenn die offizielle Docker-Version installiert ist. </p><p>Meiner Ansicht nach eine riesiges Sicherheitsrisiko, dem sich viele Admins evtl. gar nicht bewusst sind.<br>Habe ich auch erst vor ein paar Monaten entdeckt. Das existiert schon seit Jahren so.</p><p>Was meint Ihr? Die Maintainer Version von Debian hat das Gott sei Dank nicht. </p><p>Wird wohl Zeit, Pentesting in unseren regelmaessigen Checks einzubauen.</p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a> <a href="https://mastodon.social/tags/ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ufw</span></a> <a href="https://mastodon.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a></p>
Diego Cordoba 🇦🇷<p>Por si les interesa, ando preparando un nuevo curso, relacionado con las redes y seguridad. Sale algo de firewalling con <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a>! 💪 </p><p>Y de paso, a aprovechar para regrabar mucho contenido del curso de <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a>, teoría de firewalling, DMZ, y casos prácticos.</p><p>Se vienen cositas interesantes con el networking en <a href="https://mstdn.io/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>! 😃</p>
MOULE, 2¹³⁶²⁷⁹⁸⁴¹-1 Enthusiast<p>Since <a href="https://mastodon.moule.world/tags/Tumblr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tumblr</span></a> (owned by <a href="https://mastodon.moule.world/tags/MattMullenweg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MattMullenweg</span></a>'s <a href="https://mastodon.moule.world/tags/Automattic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Automattic</span></a>) renewed plans to join the <a href="https://mastodon.moule.world/tags/Fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fediverse</span></a>, I suggest blocking them (as I have) for the same reason as <a href="https://mastodon.moule.world/tags/Threads" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Threads</span></a>: queerphobia and corporate tracking.</p><p>Just like the anti-Meta <a href="https://mastodon.moule.world/tags/FediPact" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediPact</span></a> (<a href="https://FediPact.online" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">FediPact.online</span><span class="invisible"></span></a>), there's now an anti-Automattic <a href="https://mastodon.moule.world/tags/FediPact2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediPact2</span></a>: <a href="https://FediPact2.online" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">FediPact2.online</span><span class="invisible"></span></a></p><p>Like I did with Meta, I wrote <a href="https://mastodon.moule.world/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> commands your <a href="https://mastodon.moule.world/tags/FediAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediAdmin</span></a> can use to drop all traffic to and from Automattic's IP addresses: <a href="https://pastebin.com/e5UKJCKU" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pastebin.com/e5UKJCKU</span><span class="invisible"></span></a> (source: AS2635)</p>
Sunflower Björnskalle 🌻<p>Oh my jeeebus! Fucking <a href="https://mastodon.online/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> and <a href="https://mastodon.online/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a>. Took me half an hour to figure out that I needed to pass through the docker0 (and friends) network interfaces. I was trying all kinds of shit to pass through localhost, lo, 127.0.0.1/32, etc. like what the hell, but it's obvious. Of course containers have their own interfaces. Excuse the n00b.</p><p><a href="https://mastodon.online/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>