techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.9K
active users

#shorewall

1 post1 participant1 post today
albi insincerely yours<p>konec <a href="https://f.cz/tags/IPTables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPTables</span></a> je v dohlednu, částecně už i na dosah<br>za poslední rok jsem investoval čas a z předchozích <a href="https://f.cz/tags/UFW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UFW</span></a> a mrtvého <a href="https://f.cz/tags/Shorewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shorewall</span></a> přeskočil <a href="https://f.cz/tags/FirewallD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FirewallD</span></a> rovnou do nahatých <a href="https://f.cz/tags/NFTables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NFTables</span></a></p><p>- UFW využívá na pozadí iptables automaticky překládané do nftables, což je paskvil, který může vyhovovat závislákům na prehistorických iptables souborech "na které se nešahá", ale progresivnějšímu uživateli dost svazuje ruce<br>- navíc je nutné mít namemorovanou jejich speciální syntaxi a hlavně skladbu argumentů, takže většinou zadám validní příkaz na asi 4. pokus</p><p>- FirewallD si samozřejmě taky vymyslel vlastní příkazovou syntaxi, ale zároveň zapleveluje nftables nepoužívanými chainy, přijít k cizímu stroji a udělat nějakou drobnou úpravu v pravidlech je skoro na nobelovku</p><p>- NFtables jsou za mě nejpřehlednější a nejspolehlivější (největší kontrola), navíc umožňujou mít totální kontrolu nad firewallem a poslat k šípku snahy Dockeru o nadvládu<br>- navíc jsou velmi jednoduché a snadno pochopitelné</p>
Marcos Dione<p><span class="h-card" translate="no"><a href="https://mastodon.social/@JulianOliver" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>JulianOliver</span></a></span> I guess it's the same than with physics: classic mechanics works fine until you need more detail and use quantum instead.</p><p>For deep level but still with a patine of abstraction I suggest <a href="https://en.osm.town/tags/ShoreWall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShoreWall</span></a>. A shame the config language won't ever evolve from text based tables, but definitely better than writing ip/nftables rules by hand, and IIRC¹ it has a try mode that rolls back in case you get kicked out.</p><p>¹ I think I sued it once, but it's been a looong while since I last touched my FW.</p>
Talkless :debian: :kde:<p><a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://fosstodon.org/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://fosstodon.org/tags/NetSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetSec</span></a> </p><p>Just finished migrating from <a href="https://fosstodon.org/tags/Shorewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shorewall</span></a> (iptables) firewall configurator to <a href="https://fosstodon.org/tags/foomuuri" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foomuuri</span></a> (nftables) in my personal <a href="https://fosstodon.org/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> Sid laptop.</p><p>Took about four-five hours or so.</p><p>Ruleset is now shorter and actually easier to read. I have paranoid setup where even outgoing AND localhost traffic is filtered...</p><p>Feels refreshing after upgrade 👍 . And it's simply just great peace of <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> software engineering:</p><p><a href="https://github.com/FoobarOy/foomuuri" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/FoobarOy/foomuuri</span><span class="invisible"></span></a></p>
L'autre<p>Перевел свои :calculate: сервера с <a href="https://calculate.social/tags/shorewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shorewall</span></a> на <a href="https://calculate.social/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a>. Насколько же все стало проще и логичней!</p>
Antoine Mottier<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@0xDEADBEEF" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>0xDEADBEEF</span></a></span> thanks for mentioning <a href="https://fosstodon.org/tags/Shorewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shorewall</span></a> 👍 After taking a close look it seems that it won't provided added value compared to using directly <a href="https://fosstodon.org/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a> at least for my needs. Also I didn't see any new commits (<a href="https://gitlab.com/shorewall/code/-/commits/master" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.com/shorewall/code/-/co</span><span class="invisible">mmits/master</span></a>) for more than a year on the project so I'm not sure if it either super stable or no longer actively maintained?</p>
Marcos Dione<p><a href="https://en.osm.town/tags/til" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>til</span></a></p><p>* <a href="https://en.osm.town/tags/shorewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shorewall</span></a>, the trusty <a href="https://en.osm.town/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://en.osm.town/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> you can simply describe in a few config files, has a `try` command to setup the firewall for a while and tear it down again after a timeout. Very good for configuring the firewall remotely; combine with ssh and <a href="https://en.osm.town/tags/screen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>screen</span></a>. I still lick my scars for the night I did the cowboy thing, tried to setup a firewall by hand, and the first thing I did was to `DROP` all packets. I lost a good job opportunity because of that. <a href="https://en.osm.town/tags/NeverAgain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NeverAgain</span></a></p>
ZERO GmbH<p>If you&#39;ve followed our recent posts, you already know that we gave Shorewall a try to tidy up our VPN firewall rules and gain full overview about our configuration. Our migration to Shorewall has been successful and we&#39;d like to share some insights in our configuration: </p><p>&quot;Keeping the Wireguard VPN firewall clear with Shorewall&quot; - <a href="https://blog.zero-iee.com/en/posts/vpn-firewall-shorewall/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">blog.zero-iee.com/en/posts/vpn</span><span class="invisible">-firewall-shorewall/</span></a></p><p>Shorewall by Tom Eastep is just perfect for small to mid size firewall deployments that are mostly static and not too complex. One of our developers uses OpnSense and PfSense for more complex scenarios in his private projects. </p><p>Which firewall / configuration tool do you use and why?</p><p><a href="https://techhub.social/tags/shorewall" class="mention hashtag" rel="tag">#<span>shorewall</span></a> <a href="https://techhub.social/tags/firewall" class="mention hashtag" rel="tag">#<span>firewall</span></a> <a href="https://techhub.social/tags/wireguard" class="mention hashtag" rel="tag">#<span>wireguard</span></a> <a href="https://techhub.social/tags/vpn" class="mention hashtag" rel="tag">#<span>vpn</span></a> <a href="https://techhub.social/tags/teamzero" class="mention hashtag" rel="tag">#<span>teamzero</span></a> <a href="https://techhub.social/tags/zeroiee" class="mention hashtag" rel="tag">#<span>zeroiee</span></a> <a href="https://techhub.social/tags/blog" class="mention hashtag" rel="tag">#<span>blog</span></a> <a href="https://techhub.social/tags/techblog" class="mention hashtag" rel="tag">#<span>techblog</span></a> <a href="https://techhub.social/tags/linux" class="mention hashtag" rel="tag">#<span>linux</span></a> <a href="https://techhub.social/tags/debian" class="mention hashtag" rel="tag">#<span>debian</span></a></p>
ZERO GmbH<p>We&#39;re currently evaluating Shorewall [1] as a Firewall / iptables configuration tool. </p><p>Configuring iptables manually [2] works, but can get messy and thus is error prone. For our VPN server with its many customer VPNs, we are looking for a clearer solution that can be easily configured via configuration files. One of our developers has already used Shorewall and is impressed by the software. It was therefore a natural decision to take a look at it. </p><p>Initial experiments have gone well!</p><p>[1]: <a href="https://shorewall.org/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">shorewall.org/</span><span class="invisible"></span></a><br />[2]: <a href="https://blog.zero-iee.com/posts/multi-tenant-wireguard-vpn-server/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">blog.zero-iee.com/posts/multi-</span><span class="invisible">tenant-wireguard-vpn-server/</span></a></p><p><a href="https://techhub.social/tags/wireguard" class="mention hashtag" rel="tag">#<span>wireguard</span></a> <a href="https://techhub.social/tags/shorewall" class="mention hashtag" rel="tag">#<span>shorewall</span></a> <a href="https://techhub.social/tags/foss" class="mention hashtag" rel="tag">#<span>foss</span></a> <a href="https://techhub.social/tags/server" class="mention hashtag" rel="tag">#<span>server</span></a> <a href="https://techhub.social/tags/vpn" class="mention hashtag" rel="tag">#<span>vpn</span></a> <a href="https://techhub.social/tags/firewall" class="mention hashtag" rel="tag">#<span>firewall</span></a></p>
DeaDSouL :fedora:<p>What <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> frontend do you use on your <a href="https://fosstodon.org/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> distro? </p><p>Please boost, for more range 📶</p><p><a href="https://fosstodon.org/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> <a href="https://fosstodon.org/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a> <a href="https://fosstodon.org/tags/ipset" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipset</span></a> <a href="https://fosstodon.org/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a> <a href="https://fosstodon.org/tags/shorewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shorewall</span></a> <a href="https://fosstodon.org/tags/ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ufw</span></a> <a href="https://fosstodon.org/tags/gnulinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnulinux</span></a> <a href="https://fosstodon.org/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://fosstodon.org/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://fosstodon.org/tags/distro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>distro</span></a></p>