101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

481
active users

#pf

0 posts0 participants0 posts today
Dave Polaschek (he/him)<p>Spent an hour this morning updating blocklists and my (draft) webpage. Thanks again to all the folks who’ve offered suggestions. I appreciate them, even if I don’t use them, because I’m trying to learn. I look through most of the suggestions and borrow any ideas that seem new and useful.</p><p>Today, I reduced the number of password-gropers from ~1000 attempts/day to about 800/day, with a blocklist of 80IPs and one /24 range. <a href="https://writing.exchange/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> <a href="https://writing.exchange/tags/PasswordGropers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordGropers</span></a> <a href="https://writing.exchange/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a>… (1/3)</p>
BSDTV<p>A new BSDCan video has been posted:</p><p>A packet's journey through pf By Kristof Provost</p><p><a href="https://youtu.be/JtSg6ylDALo" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/JtSg6ylDALo</span><span class="invisible"></span></a></p><p>A walkthrough of a packet's journey through (FreeBSD's) pf, concentrating on the big picture and its implications.</p><p>We'll cover when packets are inspected, when rules are evaluated and how states are used. Along the way we'll cover what DTrace probes can show us, what some of pfctl's counters mean and just how many times pf can look at a single packet.</p><p>This talk is intended for firewall admins looking for a deeper understanding and aspiring pf developers. It is not a "How to use pf" talk.</p><p><a href="https://bsd.network/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://bsd.network/tags/runbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runbsd</span></a> <a href="https://bsd.network/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a></p>
Peter N. M. Hansteen<p>Yes, The Book of PF, 4th Edition Is Coming Soon <a href="https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/yes_the_boo</span><span class="invisible">k_of_pf_4th_ed_is_coming.html</span></a> (also tracked <a href="https://bsdly.blogspot.com/2025/07/yes-book-of-pf-4th-edition-is-coming.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsdly.blogspot.com/2025/07/yes</span><span class="invisible">-book-of-pf-4th-edition-is-coming.html</span></a>) <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/bookofpf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bookofpf</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/book" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>book</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libresoftware</span></a> <a href="https://mastodon.social/tags/shamelessplug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shamelessplug</span></a></p>
Peter N. M. Hansteen<p>The long version of why you need key authentication for your SSH servers - "The Hail Mary Cloud and the lessons learned" <a href="https://nxdomain.no/~peter/hailmary_lessons_learned.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/hailmary_le</span><span class="invisible">ssons_learned.html</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/keys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keys</span></a> <a href="https://mastodon.social/tags/passwordgroping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordgroping</span></a> <a href="https://mastodon.social/tags/unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unix</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/statetracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>statetracking</span></a> <a href="https://mastodon.social/tags/blocklists" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blocklists</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> </p><p>Also, The 4th edition of the Book of PF is coming soon: <a href="https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/yes_the_boo</span><span class="invisible">k_of_pf_4th_ed_is_coming.html</span></a></p>
Peter N. M. Hansteen<p>We are still working on The Book of PF, 4th ed. </p><p>Preorders are open at <a href="https://nostarch.com/book-of-pf-4th-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/book-of-pf-4th-ed</span><span class="invisible">ition</span></a>, read about the work at <a href="https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/yes_the_boo</span><span class="invisible">k_of_pf_4th_ed_is_coming.html</span></a> (also tracked at <a href="https://bsdly.blogspot.com/2025/07/yes-book-of-pf-4th-edition-is-coming.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsdly.blogspot.com/2025/07/yes</span><span class="invisible">-book-of-pf-4th-edition-is-coming.html</span></a>) <a href="https://mastodon.social/tags/bookofpf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bookofpf</span></a> <a href="https://mastodon.social/tags/newedition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newedition</span></a> <a href="https://mastodon.social/tags/freebsdd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsdd</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libresoftware</span></a></p>

Fellow network nerds, at EuroBSDcon 2025 in Zagreb, there will be a Network Management with the OpenBSD Packet Filter Toolset" events.eurobsdcon.org/2025/tal session, a full day tutorial starting at 2025-09-25 10:30 CET. You can register for the conference and tutorial by following the links from the conference Registration and Prices 2025.eurobsdcon.org/registrati page. #openbsd #freebsd #networking #security #eurobsdcon #conference #pf #packetfilter #freesoftware #libresoftware #zagreb

events.eurobsdcon.orgNetwork Management with the OpenBSD Packet Filter Toolset EuroBSDCon 2025The OpenBSD Packet Filter (PF) is at the core of the network management toolset available to professionals working with the OpenBSD and FreeBSD operating systems. Understanding the PF subsystem and the set of networking tools that interact with it is essential to building and maintaining a functional environment. The present session will both teach networking and security principles and provide opportunity for hands-on operation of the extensive network tools available on OpenBSD and FreeBSD in a lab environment. Basic to intermediate understanding of TCP/IP networking is expected and required for this session. Topics covered include The basics of and network design and taking it a bit further Building rulesets Keeping your configurations readable and maintainable Seeing what your traffic is really about with your friend tcpdump(8) Filtering, diversion, redirection, Network Address Translation Handling services that require proxying (ftp-proxy and others) Address tables and daemons that interact with your setup through them The whys and hows of network segmentation, DMZs and other separation techniques Tackling noisy attacks and other pattern recognition and learning tricks Annoying spammers with spamd Basics of and not-so basic traffic shaping Monitoring your traffic Resilience, High Availability with CARP and pfsync Troubleshooting: Discovering and correcting errors and faults (tcpdump is your friend) Your network and its interactions with the Internet at large Common mistakes in internetworking and peering Keeping the old IPv4 world in touch with the new of IPv6 The tutorial is lab centered and fast paced. Time allowing and to the extent necessary, we will cover recent developments in the networking tools and variations between the implementations in the OpenBSD and FreeBSD operating systems. Participants should bring a laptop for the hands on labs part and for note taking. The format of the session will be compact lectures interspersed with hands-on lab excercises based directly on the theory covered in the lecture parts. This session is an evolutionary successor to previous sessions. Slides for the most recent version of the PF tutorial session are up at https://nxdomain.no/~peter/pf_fullday.pdf, to be updated with the present version when the session opens.

Yes, The Book of PF, 4th Edition Is Coming Soon nxdomain.no/~peter/yes_the_boo

Long rumored and eagerly anticipated by some, the fourth edition of The Book of PF is now available for preorder nostarch.com/book-of-pf-4th-ed #openbsd #pf #packetfilter #freebsd #networking #security #tcpip #ipv6 #ipv4 #bookofpf

... and of course somebody had to ask, "when can we expect a fifth edition", to which the answer was "let's get this one out the door first"

That said, watch this space for further announcements!

nxdomain.noYes, The Book of PF, 4th Edition Is Coming Soon

After 20 years of using #pf on #BSD and only dabbling in iptables when I absolutely had to in #Linux, nftables looks like an unreadable, incomprehensible shitshow; A crayon scrawl by a toddler of weird nat and mangle chains that make no sense.

The Linux developers would have been much better off porting pf to Linux.

Over the past few weeks I have been switching off of NixOS and going back to the previous OSes and distros I was using. Last week I migrated my VPS back to OpenBSD and I now feel like I can appreciate its simplicity even more. That's not the point of this though.

When migrating I was reminded of something @nemo@camp.crates.im previously said about only allowing ssh access to the IP addresses he know he uses. I thought I should try doing something similar especially because to me pf is way saner to use and manage than iptables.

The addresses I know I'll use are my home IPv4 address and the IPv4+6 addresses of the Mullvad enpoints I am likely to use.
Unfortunately I don't know what those public addresses are before connecting.

A quick script containing something like below (I didn't save it >_<) later, I was able to get all the addresses I needed for passing to pf.
for i in *.conf; do
wg-quick up $i
curl -s4 https://zx2c4.com/ip | sed 1q
# the connect timeout is there because a few of the endpoints had a not-working IPv6 address
curl --connect-timeout -s6 https://zx2c4.com/ip | sed 1q
wg-quick down $i
done
```

Now in my pf.conf I just had to do something like this which didn't seem that complicated after all. I just modelled it after my existing rule that I used for opening ports (I removed ssh from that rule in favour of this one). This can most definitely be made better, but at least it works!

explicitly allow home and vpn ip addresses

ssh_whitelist_ipv4 = "{

ipv4 addresses here

I put my home address at the top as is and then /24 ranges for the mullvad IPs because I was told they may change frequently

}"
ssh_whitelist_ipv6 = "{

ipv6 addresses here from mullvad

I figured that they won't change often so I simply pasted them as is without specifying prefix

}"

...

allow public ssh only to my normal home address and mullvad ips

pass in log on $ext_if inet proto tcp from $ssh_whitelist_ipv4 to ($ext_if) \
port ssh flags S/SA keep state
pass in log on $ext_if inet6 proto tcp from $ssh_whitelist_ipv6 to ($ext_if) \
port ssh flags S/SA keep state

After running for over a day, my /var/log/authlog still only shows my own connections and not some people across the globe spamming connections to invalid users.

saklas$ zgrep preauth /var/log/authlog.0.gz | grep -v vin | wc -l
3918
saklas$ grep preauth /var/log/authlog | grep -v vin | wc -l
1

I was previously using pf-badhost in place of fail2ban due to the latter not being available on OpenBSD, but pf-badhost didn't prevent active attacks while both of them still allowed those (initial) connections in the first place.
There's a much smaller likelihood of an attacker using the same Mullvad endpoints I use, and if they do I probably have bigger problems to worry about. I'm also pretty much always connected to my Wireguard VPN (separate post on my website for this later) and that would let me bypass this anyways. This setup is more of a failsafe if I'm unable to connect through the VPN, and a failsafe of that failsafe if things really go wrong is just using the Hetzner web console I guess.

After writing all this, I think it's better to just post this on my website and syndicate here.

#openbsd #mullvad #pf
Comparing firewall syntax for SSH (port 22) with default-deny:
================================================

#iptables (Linux)
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
iptables -P INPUT DROP

#nftables (Linux)
nft add rule inet my_filter input tcp dport 22 accept
nft add rule inet my_filter input drop

#ufw (Linux - simplified frontend to iptables)
ufw allow 22/tcp
ufw default deny incoming

#pf (OpenBSD)
pass in proto tcp to port 22
block all

pf’s syntax feels so elegant, human-readable, & minimal!

After 20years scripting iptables, I’m ready to try UFW on my laptop.
#firewall #sysadmin #pf #iptables #ufw #nftables