At EuroBSDcon 2025 in Zagreb: "Network Management with the OpenBSD Packet Filter Toolset" by Peter N. M. Hansteen, Tom Smyth, Max Stucchi, see https://events.eurobsdcon.org/2025/talk/FW39CX/
Schedule at https://events.eurobsdcon.org/2025/schedule/
To register https://2025.eurobsdcon.org/registration.html
oh, my "Yes, The Book of PF, 4th Edition Is Coming Soon" blog post https://bsdly.blogspot.com/2025/07/yes-book-of-pf-4th-edition-is-coming.html is on hackernews: https://news.ycombinator.com/item?id=44657803 #bookofpf #pf #packetfilter #openbsd #freebsd #networking (non-tracked: https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html)
Today, early access reader feedback for The Book of PF, 4th edition proved to me that early access is worth doing.
Get yours at https://nostarch.com/book-of-pf-4th-edition, or read about the work at https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html #bookofpf #newedition #freebsdd #openbsd #pf #packetfilter #networking #security #freesoftware #libresoftware
Fellow network nerds, at EuroBSDcon 2025 in Zagreb, there will be a Network Management with the OpenBSD Packet Filter Toolset" https://events.eurobsdcon.org/2025/talk/FW39CX/ session, a full day tutorial starting at 2025-09-25 10:30 CET. You can register for the conference and tutorial by following the links from the conference Registration and Prices https://2025.eurobsdcon.org/registration.html page. #openbsd #freebsd #networking #security #eurobsdcon #conference #pf #packetfilter #freesoftware #libresoftware #zagreb
Yes, The Book of PF, 4th Edition Is Coming Soon https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html
Long rumored and eagerly anticipated by some, the fourth edition of The Book of PF is now available for preorder https://nostarch.com/book-of-pf-4th-edition #openbsd #pf #packetfilter #freebsd #networking #security #tcpip #ipv6 #ipv4 #bookofpf
... and of course somebody had to ask, "when can we expect a fifth edition", to which the answer was "let's get this one out the door first"
That said, watch this space for further announcements!
Long rumored, eagerly anticipated by some, "The Book of PF, 4th edition" https://nostarch.com/book-of-pf-4th-edition is now available for PREORDER. The most up to date guide to the OpenBSD and FreeBSD networking toolset #openbsd #freebsd #networking #pf #packetfilter #firewall #preorder #security (again for the CEST-ish crowd)
Confirmed: There will be a full day PF tutorial "Network Management with the OpenBSD Packet Filter Toolset" at #eurobsdcon 2025 in #zagreb.
Details to emerge via https://2025.eurobsdcon.org/, and expect more goodies to be announced!
Network Management with the OpenBSD Packet Filter Toolset https://www.bsdcan.org/2025/timetable/timetable-Network-Management-with.html at #bsdcan starts in 5 minutes, new slides up at https://nxdomain.no/~peter/pf_fullday.pdf (labs available for attendees only, sorry)
After 20 years of using #pf on #BSD and only dabbling in iptables when I absolutely had to in #Linux, nftables looks like an unreadable, incomprehensible shitshow; A crayon scrawl by a toddler of weird nat and mangle chains that make no sense.
The Linux developers would have been much better off porting pf to Linux.
for i in *.conf; do
wg-quick up $i
curl -s4 https://zx2c4.com/ip | sed 1q
# the connect timeout is there because a few of the endpoints had a not-working IPv6 address
curl --connect-timeout -s6 https://zx2c4.com/ip | sed 1q
wg-quick down $i
done
```
Now in my pf.conf I just had to do something like this which didn't seem that complicated after all. I just modelled it after my existing rule that I used for opening ports (I removed ssh from that rule in favour of this one). This can most definitely be made better, but at least it works!
explicitly allow home and vpn ip addresses
ssh_whitelist_ipv4 = "{ipv4 addresses here
I put my home address at the top as is and then /24 ranges for the mullvad IPs because I was told they may change frequently
}"ipv6 addresses here from mullvad
I figured that they won't change often so I simply pasted them as is without specifying prefix
}"allow public ssh only to my normal home address and mullvad ips
pass in log on $ext_if inet proto tcp from $ssh_whitelist_ipv4 to ($ext_if) \saklas$ zgrep preauth /var/log/authlog.0.gz | grep -v vin | wc -l
After running for over a day, my /var/log/authlog still only shows my own connections and not some people across the globe spamming connections to invalid users.
I was previously using pf-badhost in place of fail2ban due to the latter not being available on OpenBSD, but pf-badhost didn't prevent active attacks while both of them still allowed those (initial) connections in the first place.
There's a much smaller likelihood of an attacker using the same Mullvad endpoints I use, and if they do I probably have bigger problems to worry about. I'm also pretty much always connected to my Wireguard VPN (separate post on my website for this later) and that would let me bypass this anyways. This setup is more of a failsafe if I'm unable to connect through the VPN, and a failsafe of that failsafe if things really go wrong is just using the Hetzner web console I guess.
After writing all this, I think it's better to just post this on my website and syndicate here.
#openbsd #mullvad #pf
That Grumpy BSD Guy: A Short Reading List https://nxdomain.no/~peter/the_short_reading_list.html A collection of pointers to things I have written and that I think may be of value to you too (with conference teasers) #openbsd #packetfilter #pf #cybercrime #antispam #security #networking #freesoftware #libresoftware #eurobsdcon #bsdcan
As previously announced, there will be a PF tutorial at BSDCan 2025 -
For Upcoming PF Tutorials, We Welcome Your Questions
https://nxdomain.no/~peter/pf_tutorial_upcoming_questions_welcome.html
Registration: https://www.bsdcan.org/2025/registration.html
#BSDCan #EuroBSDcon #OpenBSD #PF #tutorial, #packetfilter #Ottawa #BookofPF #BSDCan #conferences #networking #security
With #bsdcan now less than a month away https://www.bsdcan.org/2025/index.html we invite your questions and input on the upcoming PF tutorials, see
"For Upcoming PF Tutorials, We Welcome Your Questions" https://nxdomain.no/~peter/pf_tutorial_upcoming_questions_welcome.html
#EuroBSDCon #OpenBSD #PF #tutorial, #packetfilter #Ottawa #BookofPF #BSDCan #conferences #networking #security