Album on lemmy.ca, beehaw.org, shit.itjust.works & lemmy.world

  • 0 Posts
  • 18 Comments
Joined 3 years ago
cake
Cake day: June 7th, 2023

help-circle


  • Wrt lan deny all for the fam, it’s mostly hard on gamers cuz games tend to use wide port ranges and outbound IPs are potentially home isp networks not the game servers. But yeah it takes some time and research to really lock it down.

    Most stuff is running through web protocols though. So right off the bat you create allow rules for any LAN device to hit ports: 80, 8080, 443, 8443 which are your common http and https ports. That’s gonna get most ppl what they need.

    I do ASN based allows for certain applications like Google, Facebook, etc.

    For consoles they’re pretty locked down so just give them full allow to the Internet. I don’t do that actually but it’s probably the better way.

    IOT devices get only the ports they need to the IPs they need.

    when you said you are using unbound instead of using DoT forwarding, you mean instead of allowing clients to DoT forward, right?

    No I mean my unbound resolves DNS for something like microsoft.com all by itself. It calls up the root name servers, finds the com nameservers, then asks the com nameservers for Microsoft. And for any subdomains it asks the MS name servers. This is instead of relying on external forwarding services like 8.8.8.8 or 1.1.1.1 or quad 9 or whatever. At least the former two are sure to be aggregating this data.

    Additionally I do not allow devices on my network to reach out to external port 53, or 853 to circumvent lookups on my unbound by reaching out directly, which would then bypass the DNSBL. Anything for port 53 gets NAT’d to the unbound server. You can’t redirect TLS attempts so those get hard blocked.

    Curious to your IDS solution

    Securicata is what opnsense uses. Pretty easy to set up.


  • I have an n100 box that I put opnsense on for routing, firewall, DHCP, DNS and IDS. It uses unbound for DNS and so I’m leveraging the blocklist functionality in unbound. And then I use unbound to resolve instead of using DoT forwarding.

    Dnsbl is only a small component of effective network security. Arguably the firewall is most important and so I have a default deny all for any device on my LAN trying to reach the Internet.

    All applications need specific allows. Thus internally no device can use dns over tls because 853 is blocked by default. Then I use a DNSBL to catch known DoH by domain since the cert is provided by domain name.



  • You clearly don’t know what you’re talking about. You don’t even seem to understand what a non sequitur is. Good luck moving cash in material volumes in any way that’s meaningful. You can’t. No one is going to let you buy your yacht or your house in cash unless you can prove it’s Source because of AML controls. They won’t be able to deposit it into their banks so they won’t let you deposit it with them either.


  • I feel like the link you just provided completely invalidates the way you started “if you are a giant bank you can ml all you want” but then you show the fines that show you can’t do this all you want.

    Keep in mind the banks are profiting from others laundering money not from laundering their own money.

    “It’s big brothers attempt to monitor capital flows.”…yes exactly…



  • Lmao who writes this shit. The solution to KYC is just no KYC! And then offer nothing to explain how to implement AML controls!

    If you want to use a kycless network you then have to know and accept that it’s going to be used for money laundering and that others are not going to transact with you or that platform because you accept that kind of risk.

    The banks are obligated by the govt to not take that risk. It doesn’t benefit the banks… We’ve seen they’d much rather not do KYC and take on the money laundering risk because it’s far more profitable.




  • Do you understand what an analogy is?

    Yes, hence it being a shit one.

    Anyways, Firefox is the project. All of those other “projects” are mostly configuration changes of the upstream project- not even code changes.

    No, for example fennec for fdroid which is the base for mull or ironfox has multiple code deletes to remove unsolicited data sent to Google.

    When Firefox decides to become hostile to those “other” browsers you use- they’ll be able to do fuck all about it.

    That’s not how open Source works…