| 8 Dec 2025 |
K900 | Well that depends on how you implemented it | 14:27:32 |
okamis | iptables -t filter -I FORWARD 1 -m state --state NEW -j DROP | 14:29:10 |
K900 | Yeah that's not all outgoing connections | 14:29:28 |
okamis | oh sorry should be OUTGOING instead of forward | 14:29:28 |
K900 | That is also a bad idea | 14:29:35 |
K900 | You want to match on interface | 14:29:40 |
K900 | Or explicitly exclude loopback I guess | 14:29:45 |
okamis | is this reasonable?
iptables -A OUTPUT -o lo -j ACCEPT
iptables -A OUTPUT -o eth0 -m conntrack --ctstate NEW -j DROP
| 15:21:45 |
K900 | Probably | 15:22:48 |
K900 | I don't remember iptables well enough | 15:22:54 |
| 9 Dec 2025 |
| adamcstephens changed their profile picture. | 17:25:09 |
| adamcstephens changed their profile picture. | 17:48:29 |
| 10 Dec 2025 |
| Theodora changed their display name from Theodora The Absurdist Schizotisticoball to Theodora. | 12:17:46 |
| adamcstephens changed their profile picture. | 14:49:51 |
DenKn | these rules are a little bit strange. typicaly first via contrack established connections are allowed, and at the end of the table anything else is REJECT (do not use DROP, you not know, which effects it has, right?). | 21:56:03 |
DenKn | So, first use simple rules with ACCEPT, and at the end REJECT anything, which was not accepted. | 21:56:44 |
DenKn | If you do not used firewalls, yet, use nftables instead of iptables. iptables is not dead, but nftables ist better. | 21:58:23 |
| JManch joined the room. | 23:23:19 |
| 11 Dec 2025 |
| TG × ⊙ joined the room. | 20:21:50 |
| 12 Dec 2025 |
| whispers (it/fae) changed their profile picture. | 04:51:30 |
| Alex Epelde joined the room. | 21:47:11 |