https://github.com/thayerw

My Lemmy themes at UserStyles.world:

  • 2 Posts
  • 38 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle

  • thayer@lemmy.catoLinux@lemmy.mlCan you help me with firewalld?
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    16 hours ago

    I can’t provide specific advice for tailscale, but I can share my notes for my own use case, which is for PCs that are safely behind the home firewall. You’d want to adjust your ssh/smb settings accordingly. You shouldn’t need any rules for ProtonVPN, as you’re likely just trying to block incoming connections, not outbound.

    It’s my understanding that Fedora opens ports 1025-65535/tcp and 1025-65535/udp by default.

    To lock down to sane defaults (--permanent saves the settings directly, avoiding the need to run firewall-cmd --runtime-to-permanent separately):

    sudo firewall-cmd --permanent --remove-port=1025-65535/tcp
    sudo firewall-cmd --permanent --remove-port=1025-65535/udp
    sudo firewall-cmd --permanent --add-port=27031/udp  # steam remote play
    sudo firewall-cmd --permanent --add-port=27036/udp  # steam remote play
    sudo firewall-cmd --permanent --add-port=27036/tcp  # steam remote play
    sudo firewall-cmd --permanent --add-port=27037/tcp  # steam remote play
    

    Ensure that ssh and samba-client are listed as allowed services too (sudo firewall-cmd --list-all).

    • Firewalld must be reloaded before rule changes will take effect: firewall-cmd --reload
    • Changes will reset upon reboot unless made persistent by using --permanent or by committing all changes with --runtime-to-permanent

    Common commands:

    sudo systemctl enable --now firewalld   # enable and start firewalld service
    sudo systemctl disable firewalld
    sudo systemctl stop firewalld
    
    sudo firewall-cmd --state               # show running state of firewalld
    sudo firewall-cmd --get-active-zones    # list active zones
    sudo firewall-cmd --get-zones           # list all zones
    sudo firewall-cmd --get-default-zone    # list default zone
    sudo firewall-cmd --list-ports          # list allowed ports in current zone
    sudo firewall-cmd --list-all            # list all settings
    sudo firewall-cmd --reload              # reload firewall rules to activate any rule modifications
    

    Add/remove ports, services, IPs:

    sudo firewall-cmd --add-port=port-number/port-type      # allow incoming port  (tcp,udp,sctp,dccp)
    sudo firewall-cmd --remove-port=port-number/port-type   # block incoming port
    sudo firewall-cmd --add-service=<service-name>          # allow incoming service (see /etc/services)
    sudo firewall-cmd --remove-service=<service-name>       # block incoming service (see /etc/services)
    sudo firewall-cmd --add-source=192.168.1.100 (or 192.168.1.0/24)    # whitelist incoming IP or IP range
    sudo firewall-cmd --remove-source=192.168.1.100 (or 192.168.1.0/24) # remove whitelisted IP or IP range
    

    Block an IP or IP range (rich rules):

    sudo firewall-cmd --permanent --add-rich-rule="rule family='ipv4' source address='192.168.1.100' reject"
    sudo firewall-cmd --permanent --add-rich-rule="rule family='ipv4' source address='192.168.1.0/24' reject"
    

    Whitelist IP for specific port (rich rule):

    sudo firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.100" port protocol="tcp" port="3306" accept'
    

    Removing a Rich Rule

    sudo firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.100" port protocol="tcp" port="3306" accept'
    

  • thayer@lemmy.catoLinux@lemmy.mlAm I overthinking it?
    link
    fedilink
    English
    arrow-up
    15
    ·
    edit-2
    2 days ago

    As a fellow Atomic user, my completely biased opinion is that you’ve made a good choice of distro for switching from Windows.

    Don’t sweat the need or desire to layer a few packages. I see a lot of folks stress over this as if it’s a hard rule they are breaking. It’s a general recommendation and little more. I would be surprised if most users don’t layer at least one package (or even a few).

    On my main workstation, running Kinoite at the moment, some of the layered packages include:

    • distrobox
    • gdm (sddm refuses to respect autologin)
    • kate
    • ksystemlog
    • syncthing
    • vim-enhanced
    • virt-manager
    • virt-viewer





  • I’m happy to see it’s finally happening, and I hope they left its implementation flexible.

    What I’d really love to see (aside from triple buffer) is a real solution to the system tray situation. AppIndicator is problematic for some apps and under certain X11/Wayland desktops, and even when it works well it is cumbersome to use compared to traditional tray implementations. Hoping we see a new approach soon.

    In the meantime, I’ve been enjoying a revisit to KDE Plasma under Kinoite and I have to say I’m really impressed with both DEs!














  • I can’t speak to Nobara, but Arch with KDE would be my vote if tweaking, documentation, and freshness (with potential instability) are the priorities.

    Arch wins with respect to documentation; hands down, it’s the best documented Linux distro in existence. KDE provides a ton of customization via GUI, and gaming is easily obtainable and quite good on any distro, largely due to Flatpak.

    Where you might run afoul is the command line. I couldn’t imagine running Arch without regular terminal use, but I’m sure you could get by for most tasks once KDE is up and running.