Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

The FreeBSD platform was merged into the OCI runtime spec!

Uncategorized
1 1 11

Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    1 Posts
    12 Views
    New blog post: GeoIP-Aware Firewalling with PF on FreeBSDRunning a mail server means constant brute-force attempts. My solution: geographic filtering. SMTP stays open for global mail delivery, but client ports (IMAP, Submission, webmail) are restricted to Central European IP ranges only.Result: ~90% reduction in attack logs, cleaner signal-to-noise ratio, smaller attack surface.Using MaxMind GeoLite2 + PF tables with ~273k CIDR blocks.https://blog.hofstede.it/geoip-aware-firewalling-with-pf-on-freebsd/#FreeBSD #InfoSec #SysAdmin #pf #DevOps
  • 0 Votes
    1 Posts
    7 Views
    New blog post: Managing FreeBSD Jails with Ansible.I wrote jailexec - an Ansible connection plugin that lets you manage FreeBSD jails without running SSH inside each one. It connects to the jail host via SSH and uses jexec to run commands, just like you would manually. Features: • Single Python file, easy install • Supports doas and sudo • Secure two-stage file transfers • Works with any jail managerBlog: https://blog.hofstede.it/managing-freebsd-jails-with-ansible-the-jailexec-connection-plugin/Code: https://github.com/chofstede/ansible_jailexec#FreeBSD #Ansible #DevOps #SysAdmin #Jails #Automation
  • Today I learned that uname

    Uncategorized freebsd
    1
    0 Votes
    1 Posts
    7 Views
    Today I learned that uname.c on #FreeBSD is a light wrapper around sysctl nodes. For example, uname -r is equal to kern.osrelease.https://github.com/freebsd/freebsd-src/blob/main/usr.bin/uname/uname.c
  • 0 Votes
    1 Posts
    8 Views
    Hot take: pf's built-in connection tracking beats fail2ban/sshguard hands down.One simple ruleset gives you automatic brute-force protection with ZERO userland daemons. No log parsing, no reaction delays, no additional attack surface.table <bruteforce> persistpass in proto tcp to port 22 flags S/SA (max-src-conn 5, max-src-conn-rate 3/30, overload <bruteforce> flush global)Kernel-level enforcement, instant blocking, survives reboots with persist.Why spawn Python processes when your firewall already knows?#bsd #freebsd #runbsd #firewall #pf #sysadmin