fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#iptables

1 post1 participant0 posts today
DaveB<p>Addendum to the <a href="https://mastodon.au/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> setup post:<br>If you want the device in question to be able to access anything world-wide, add a rule to accept related &amp; established connections. I got most things updated to Aussie sites, but not everything.</p><p>Adding this rule once you know what can't be found in the allowed / unrestricted countries also helps make you a good Netizen by keeping to local servers.</p><p><a href="https://mastodon.au/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a></p>
AskUbuntu<p>Confusing default iptables rules on Oracle VM <a href="https://ubuntu.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://ubuntu.social/tags/server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>server</span></a> #2404 <a href="https://ubuntu.social/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a></p><p><a href="https://askubuntu.com/q/1553068/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1553068/612</span><span class="invisible"></span></a></p>
Habr<p>Получаем root через iptables</p><p>Полагаю, что большинство читателей знают, о том, что команда sudo может быть использована для выполнения других команд с правами другого пользователя, которым обычно является root.</p><p><a href="https://habr.com/ru/companies/otus/articles/928050/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/otus/art</span><span class="invisible">icles/928050/</span></a></p><p><a href="https://zhub.link/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://zhub.link/tags/privilege_escalation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privilege_escalation</span></a> <a href="https://zhub.link/tags/sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sudo</span></a> <a href="https://zhub.link/tags/iptables_exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables_exploit</span></a> <a href="https://zhub.link/tags/iptables_root_escalation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables_root_escalation</span></a> <a href="https://zhub.link/tags/Linux_privilege_escalation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux_privilege_escalation</span></a> <a href="https://zhub.link/tags/iptablessave_%D1%83%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D1%8C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptablessave_уязвимость</span></a> <a href="https://zhub.link/tags/%D1%83%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D1%8C_sudo_iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>уязвимость_sudo_iptables</span></a></p>
AskUbuntu<p>Organising download traffic tc qdisc script do not forward data to the right leaf classes <a href="https://ubuntu.social/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://ubuntu.social/tags/downloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>downloads</span></a> <a href="https://ubuntu.social/tags/traffic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>traffic</span></a></p><p><a href="https://askubuntu.com/q/1552997/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1552997/612</span><span class="invisible"></span></a></p>
Diego Córdoba 🇦🇷<p>Les aviso que quedan 2 días de la promoción de precios mínimos de Julio en todos los cursos de <a href="https://mstdn.io/tags/JuncoTIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JuncoTIC</span></a> en <a href="https://mstdn.io/tags/Udemy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Udemy</span></a>!</p><p>Si quieren aprender algo de <a href="https://mstdn.io/tags/gnu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gnu</span></a> <a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redes</span></a> <a href="https://mstdn.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpip</span></a> <a href="https://mstdn.io/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mstdn.io/tags/wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireshark</span></a> <a href="https://mstdn.io/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://mstdn.io/tags/flask" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flask</span></a> <a href="https://mstdn.io/tags/vim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vim</span></a> <a href="https://mstdn.io/tags/lpic1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lpic1</span></a> <a href="https://mstdn.io/tags/firealling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firealling</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>, esta es la oportunidad 🙂 </p><p>Como siempre, los enlaces promocionales en nuestro sitio, los esperamos! 👇 </p><p><a href="https://juncotic.com/cursos/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">juncotic.com/cursos/</span><span class="invisible"></span></a> </p><p>(Cualquier duda me escriben 💬)</p>
Naty<p>My homelab lesson of the day:</p><p>DO NOT `sudo iptables -P INPUT DROP` while SSH-ing your server or else you&#39;ll be locked out.</p><p>Luckily I had a micro-HDMI and the Pi recognized cltr+alt+del to reboot (monitor was not detected at first). Flushed the rules and regained access. Phew! </p><p>Silly noob mistake—lesson learnt! </p><p><a href="https://fosstodon.org/tags/iptables" class="mention hashtag" rel="tag">#<span>iptables</span></a> <a href="https://fosstodon.org/tags/dietpi" class="mention hashtag" rel="tag">#<span>dietpi</span></a> <a href="https://fosstodon.org/tags/homelab" class="mention hashtag" rel="tag">#<span>homelab</span></a> <a href="https://fosstodon.org/tags/selfhosting" class="mention hashtag" rel="tag">#<span>selfhosting</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="tag">#<span>firewall</span></a></p>
Diego Córdoba 🇦🇷<p>Preparando clases del nuevo curso de <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> de <a href="https://mstdn.io/tags/JuncoTIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JuncoTIC</span></a>, sólo puedo decir que es hermosa la forma en la que el comando <a href="https://mstdn.io/tags/nft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nft</span></a> puede cargar configuraciones de forma rápida.</p><p>O es que estoy demasiado acostumbrado a un shell script para configurar reglas de <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>... también puede ser 😅 </p><p><a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/gnu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gnu</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/ciberseguridad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ciberseguridad</span></a> <a href="https://mstdn.io/tags/curso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curso</span></a> <a href="https://mstdn.io/tags/course" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>course</span></a></p>
Diego Córdoba 🇦🇷<p>1/3<br>Por cierto, sin ánimo de hacer spam, les cuento que tenemos todos los cursos de <a href="https://mstdn.io/tags/juncotic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juncotic</span></a> en descuento por 5 días en <a href="https://mstdn.io/tags/Udmey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Udmey</span></a> :-)</p><p>Si les interesa <a href="https://mstdn.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mstdn.io/tags/redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redes</span></a> <a href="https://mstdn.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpip</span></a> <a href="https://mstdn.io/tags/comandos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>comandos</span></a> <a href="https://mstdn.io/tags/scripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scripting</span></a>, <a href="https://mstdn.io/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a>, <a href="https://mstdn.io/tags/flask" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flask</span></a> y relacionados, tal vez les interese!</p><p>Les dejo los enlaces, cualquier duda me escriben: 👇</p>
Diego Córdoba 🇦🇷<p>Nueva tarde de grabación para <a href="https://mstdn.io/tags/JuncoTIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JuncoTIC</span></a>!! 🎙️ 📹 </p><p>Media hora más de video, hoy todo práctico! ✨</p><p>Esquema de red virtualizado, y configuración desde cero del firewall nftables, creando tablas, cadenas de input, output, forward, y reglas para varias cositas 😉 </p><p>Hace mucho que no armaba tanto escenario para grabar, ahora a aprovecharlo para todas las prácticas que se puedan! En el curso no s vamos a cansar de ejecutar comandos 😃 🖥️ </p><p><a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/curso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curso</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/nft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nft</span></a> <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> <a href="https://mstdn.io/tags/redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redes</span></a> <a href="https://mstdn.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpip</span></a></p>
Diego Córdoba 🇦🇷<p>Bueno, ahora a organizar diapositivas y ejemplos de <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> que hoy se graba para el nuevo curso! <a href="https://mstdn.io/tags/juncotic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juncotic</span></a> </p><p><a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/nft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nft</span></a> <a href="https://mstdn.io/tags/netfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netfilter</span></a></p>
Gonçalo Ribeiro<p>Next, I had the theory that maybe the game was checking the source IP address of the packet to see it if matched the expected player's address based on the DirectPlay protocol phase.</p><p>So I added the following <a href="https://infosec.exchange/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> rule such that any traffic coming from the host towards Sarah's VM (192.168.1.242) would appear as if had come from James' VM (192.168.1.243).</p><p><code>iptables -t nat -A POSTROUTING -p udp -s &lt;my ip&gt; -d 192.168.1.242 -j SNAT --to-source 192.168.1.243</code></p><p>In the packet captures I could see that the source IP changed as intended and Sarah's game responded to these messages, but no trains were produced.</p><p><a href="https://infosec.exchange/tags/games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>games</span></a> <a href="https://infosec.exchange/tags/pcgaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcgaming</span></a> <a href="https://infosec.exchange/tags/trains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trains</span></a> <a href="https://infosec.exchange/tags/LEGO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LEGO</span></a></p>
Daniel ツ<p>Finally switched from iptables to nftables on my Docker setup.<br>Had to wrestle a bit with bridge networks and rules, but it’s working now.<br>Wrote down the steps here 👉 <a href="https://www.schwitzd.me/posts/from-iptables-to-nftables-with-docker/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schwitzd.me/posts/from-iptable</span><span class="invisible">s-to-nftables-with-docker/</span></a></p><p><a href="https://infosec.exchange/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> <a href="https://infosec.exchange/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://infosec.exchange/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://infosec.exchange/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://infosec.exchange/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a></p>
Diego Córdoba 🇦🇷<p>Nueva tarde de grabación para <a href="https://mstdn.io/tags/juncoTIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juncoTIC</span></a>!!</p><p>Entre trabajo y trabajo se me complicó, pero esta semana realmente tenía ganas de grabar 😃 </p><p>Y hoy llegó el momento, media hora más de video sumado al nuevo curso de firewalls con <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> en <a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> 💪 </p><p>Ya van casi 3hr de video! 😮 </p><p>Hoy tocó jugar con los comandos ⌨️ 🖥️ </p><p>La semana que viene cierro con otras obligaciones, y ya termino de grabar y editar este curso! (y sumo contenido al de <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>)</p><p>Los voy teniendo al tanto por si les interesa 🙂</p>
uvok cheetah<p>...<br>For some reason, <a href="https://woof.tech/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> logging doesn't appear in /var/log/syslog nor /var/log/kern.log nor journalctl.<br>What am I missing?</p><p>(Debian, rsyslog is installed, the log rule definitely is hit, the rule line looks like </p><p>-A FORWARD -j LOG --log-prefix "Dropped Packet: "</p><p>edit: does it matter that I'm running this in a Linux network namespace?</p><p>edit2: Uhh, yeah. <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=2851940ffee313e0ff12540a8e11a8c54dea9c65" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.kernel.org/pub/scm/linux/k</span><span class="invisible">ernel/git/torvalds/linux.git/commit?id=2851940ffee313e0ff12540a8e11a8c54dea9c65</span></a> <br>Apparently it's disabled by defait</p><p><a href="https://woof.tech/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
uvok cheetah<p>I did a mistake with my <a href="https://woof.tech/tags/dn42" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dn42</span></a> network namespace <a href="https://woof.tech/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> setup! I made some crucial mistakes with the rules!</p><p>This should be better:</p><p>```<br>-A FORWARD -s fd00::/8 -d fd00::/8 -j ACCEPT<br>-A FORWARD -i eth0 -d fd00::/8 -j ACCEPT<br>-A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT<br>```</p>
Verfassungklage@troet.cafe<p><a href="https://troet.cafe/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>-Regeln erstellen und dauerhaft speichern (Iptables Teil 2) </p><p><a href="https://gnulinux.ch/iptables-regeln-erstellen-und-dauerhaft-speichern-iptables-teil-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/iptables-regeln-er</span><span class="invisible">stellen-und-dauerhaft-speichern-iptables-teil-2</span></a></p>
GNU/Linux.ch<p>iptables-Regeln erstellen und dauerhaft speichern (Iptables Teil 2)</p><p>In diesem Artikel erkläre ich, wie man eigene Firewall-Regeln mit iptables erstellt und dauerhaft speichert. Mit dabei: eine Einführung in die wichtigsten Begriffe wie INPUT, OUTPUT, DROP und conntrack. </p><p><a href="https://social.anoxinon.de/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://social.anoxinon.de/tags/iptables_persistent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables_persistent</span></a> <a href="https://social.anoxinon.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.anoxinon.de/tags/Netzwerksicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerksicherheit</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p><p><a href="https://gnulinux.ch/iptables-regeln-erstellen-und-dauerhaft-speichern-iptables-teil-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/iptables-regeln-er</span><span class="invisible">stellen-und-dauerhaft-speichern-iptables-teil-2</span></a></p>
Diego Córdoba 🇦🇷<p>Nueva tarde de grabación!! 😃 </p><p>Ya empecé a grabar el contenido propio del curso de <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> (intro de firewalls terminada 💪)</p><p>Ahora, a divertirse y jugar con los comandos y archivos de configuración! 🎉 </p><p>No hay mejor forma de aprender que practicando, y jugando con la tecnología, sí, viva la <a href="https://mstdn.io/tags/CulturaHacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CulturaHacker</span></a> ;-)</p><p><a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/nft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nft</span></a> <a href="https://mstdn.io/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a> <a href="https://mstdn.io/tags/curso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curso</span></a> <a href="https://mstdn.io/tags/juncotic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juncotic</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a></p>
Diego Córdoba 🇦🇷<p>1/3<br>🔥 ¡Nueva promoción de precios mínimos por tiempo limitado!</p><p>¿Querés aprender Linux, Redes, Python/Flask, shell scripting, Wireshark, SSH, iptables y más?</p><p>Todos nuestros cursos a sólo USD 9.99 por 5 días!</p><p>Acá los descuentos. Te esperamos!! 👇 👇 </p><p>(Por otras formas de pago: info@juncotic.com)</p><p><a href="https://mstdn.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mstdn.io/tags/Redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Redes</span></a> <a href="https://mstdn.io/tags/TCPIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCPIP</span></a> <a href="https://mstdn.io/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mstdn.io/tags/Flask" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flask</span></a> <a href="https://mstdn.io/tags/shellscripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellscripting</span></a> <a href="https://mstdn.io/tags/Wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireshark</span></a> <a href="https://mstdn.io/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> </p><p>🧵</p>
Verfassungklage@troet.cafe<p>Was ist <a href="https://troet.cafe/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a>-persistent? </p><p>Und wie unterscheidet es sich von <a href="https://troet.cafe/tags/UFW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UFW</span></a>? (Iptables Teil 1)</p><p>Wer mit der <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>-Firewall iptables arbeitet, trifft früher oder später auf das Paket iptables-persistent. Was ist das genau – und worin unterscheidet es sich von der einfacheren Alternative UFW? </p><p>Die integrierte <a href="https://troet.cafe/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://troet.cafe/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> ist auf den meisten GNU/#Linux-Systemen verfügbar und bietet eine leistungsfähige Möglichkeit, Netzwerkzugriffe zu kontrollieren. </p><p><a href="https://gnulinux.ch/was-ist-iptables-persistent-und-wie-unterscheidet-es-sich-von-ufw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/was-ist-iptables-p</span><span class="invisible">ersistent-und-wie-unterscheidet-es-sich-von-ufw</span></a></p>