!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

900 Members
on your Router! Declaratively manage your switching, routing, wireless, tunneling and more.262 Servers

Load older messages


SenderMessageTime
2 Dec 2025
@sandro:supersandro.deSandro 🐧first as in the one with highest default route, as first doesn't make much sense otherwise14:47:25
@k900:0upti.meK900 Do you control the route metrics? 14:48:56
@k900:0upti.meK900 You can just push the correct metric over DHCP 14:49:22
@k900:0upti.meK900If you control the DHCP14:49:30
@k900:0upti.meK900 (you probably should do that anyway) 14:49:41
4 Dec 2025
@i-am-logger:matrix.orgIdo Samuelson joined the room.01:46:10
@isabel:isabelroses.comisabel changed their profile picture.16:41:36
@tanja:catgirl.cloudTanja (she/her) - ☎️ 4201 changed their display name from Tanja (she/her) to Tanja (she/her) - ☎️ 4201.18:10:30
6 Dec 2025
@hosaidenpwd:matrix.orgP J joined the room.07:45:51
8 Dec 2025
@okamis:matrix.orgokamis joined the room.14:22:46
@okamis:matrix.orgokamisIm using runnixostest interactive as a playground environment. I would like it to be a bit similar as non-interactive, so I would like ssh access but not access to the internet, whats a good way to achieve that? Currently im running "ip route del default" in the testscript.14:24:11
@k900:0upti.meK900Could just firewall all outgoing connections14:24:36
@okamis:matrix.orgokamisI had a rule drop all outgoing, and it screwed up kubectl connecting to k3s using localhost:8080,14:26:38
@k900:0upti.meK900Well that depends on how you implemented it14:27:32
@okamis:matrix.orgokamis iptables -t filter -I FORWARD 1 -m state --state NEW -j DROP 14:29:10
@k900:0upti.meK900 Yeah that's not all outgoing connections 14:29:28
@okamis:matrix.orgokamisoh sorry should be OUTGOING instead of forward14:29:28
@k900:0upti.meK900That is also a bad idea14:29:35
@k900:0upti.meK900You want to match on interface14:29:40
@k900:0upti.meK900Or explicitly exclude loopback I guess14:29:45
@okamis:matrix.orgokamis

is this reasonable?

iptables -A OUTPUT -o lo -j ACCEPT
iptables -A OUTPUT -o eth0 -m conntrack --ctstate NEW -j DROP
15:21:45
@k900:0upti.meK900Probably15:22:48
@k900:0upti.meK900I don't remember iptables well enough15:22:54
9 Dec 2025
@adam:robins.wtfadamcstephens changed their profile picture.17:25:09
@adam:robins.wtfadamcstephens changed their profile picture.17:48:29
10 Dec 2025
@truelle_trash_queen:matrix.orgTheodora changed their display name from Theodora The Absurdist Schizotisticoball to Theodora.12:17:46
@adam:robins.wtfadamcstephens changed their profile picture.14:49:51
@denkn:denkn.atDenKnthese rules are a little bit strange. typicaly first via contrack established connections are allowed, and at the end of the table anything else is REJECT (do not use DROP, you not know, which effects it has, right?).21:56:03
@denkn:denkn.atDenKnSo, first use simple rules with ACCEPT, and at the end REJECT anything, which was not accepted.21:56:44
@denkn:denkn.atDenKnIf you do not used firewalls, yet, use nftables instead of iptables. iptables is not dead, but nftables ist better.21:58:23

Show newer messages


Back to Room ListRoom Version: 6