14
submitted 5 months ago by irmadlad@lemmy.world to c/privacy@lemmy.ml

What do you run; Opnsense, pfsense, Smoothwall, maybe a WAF like wazuh?

Today was update/audit firewall day. I'm running a standalone instance of pFsense on a Protectli Vault FW4B - 4 Port - Intel Quad Core - 8GB RAM - 120GB mSATA SSD with unbound, pfBlockerNG, Suricata, ntopng, and heavily filtered. I did bump the swap to 8 GB as I've previously noticed a few 'out of swap' errors under load.

Before I signed off, I ran it through a couple porn sites to see if my adblocking strategy was working. Not one intrusive ad. Sweet!

Show me what you got.

all 50 comments
sorted by: hot top controversial new old
[-] MangoPenguin@lemmy.blahaj.zone 4 points 5 months ago

OpenWRT on a Linksys router, with adguard home for DNS blocking.

I used to run OPNSense on some older x86 hardware, but wanted to move to something simpler and less power hungry.

[-] ScoffingLizard@lemmy.dbzer0.com 1 points 3 weeks ago* (last edited 3 weeks ago)

I was going to hack my Linksys, but they locked some things for my model in the US apparently, and needed a flash with firmware I couldn't find.

I just got OpenWRT One. Its a dev router, but hope fully can handle a firewall, VPN server, and maybe a reverse proxy. It's based off banana pi.

I just want my Linux notes in one place (nextcloud) and synced (syncthing), and Jellyfin. Got a Raspberry Pi 5 with a NVMe hat and 16 GB of RAM for that. Then add more later.

[-] ki9@lemmy.gf4.pw 4 points 5 months ago

I think I have the same protectli as you and it is awesome. Need it for my 2.5gb uplink. I use openwrt on it... Didn't really like opnsense. I am more used to linux than bsd.

I host lots of services and get bombarded by scrapers, scanners, and skids both at home and on my VPSs.

I use ipset for the usual blocklists which I download regularly. I also have tarpits on 22/tcp (endlessh). I pipe the IPs from the endlessh logs into fail2ban which feeds the ipsets. I have ipset blocks and fail2ban on my home firewall and all VPSs and coordinate over mqtt. So any fail2ban trigger > mqtt > every ipset block. Touch my 22/tcp anywhere and you get banned instantly everywhere. The program I use for this is called vallumd and it runs on openwrt.

I also put maltrail everywhere but I'm not totally sure how to interpret and respond to the results. Probably will implement a pipe from maltrail to my mqtt > blocklist setup.

I don't do any network-level adblocking... Might be a future project.

[-] irmadlad@lemmy.world 0 points 5 months ago* (last edited 5 months ago)

I think I have the same protectli as you and it is awesome

Yes it is. It was a little more than I wanted to spend, and I'm sure I could have gone with a cheaper configuration, but I figured I'd get something with a little ass to it as to not create a bottleneck right at the firewall.

I host lots of services and get bombarded by scrapers, scanners, and skids both at home and on my VPSs. Touch my 22/tcp anywhere and you get banned instantly everywhere.

I too host most of the services I use on a couple of VPS I run. It has always amazed me as to the thickness of the bot layer on the internet. Clearnet experiences something like 2+ zetabytes per 24 hours. Around 50% of that is bot traffic, and they are very sophisticated bots as well. Open port 22 and here they come by the thousands like a feeding frenzy. I went as far as blocking everything with hosts.allow (do first) & hosts.deny (do last). I've set f2b on aggressive mode with only one shot. LOL UFW rocks in the background along with Crowdsec. I probably go overboard with security. LOL

[-] ki9@lemmy.gf4.pw 2 points 5 months ago

Largest ddos attack of all time? 12 tb/sec.

But yeah, I believe it when you say you get 24,855 tb/sec on your VPS.

[-] irmadlad@lemmy.world 1 points 5 months ago

Beg pardon? I am going to need clarification.

[-] ScoffingLizard@lemmy.dbzer0.com 2 points 3 weeks ago

When you say open 22, do you mean with just password access with multiple users? I recently made mine only allow entry using ssh certs iirc. And then just blocked incoming for the time being. Guess I'll need to fix that before another git pull request.

[-] irmadlad@lemmy.world 2 points 2 weeks ago

I think when I said open port 22, I was giving an illustration of the hordes of bots that will show up at your doorstep. Best practice is to use ssh keys and rotate them.

[-] thermal_shock@lemmy.world 3 points 5 months ago

Nothing fancy, old ubiquiti gateway with a dedicated pihole server for my DNS.

[-] PlutoniumAcid@lemmy.world 4 points 5 months ago

Same. What's the deal with having elaborate firewall stuff for a normal family home anyway?

If the built in stuff isn't good enough then 99.9% of households would be compromised a long time ago already.

[-] irmadlad@lemmy.world 4 points 5 months ago

The last stats I remember reading cited some 1.5 million home networks are compromised on a daily basis. Some people, such as myself, run more complex services on their local servers that are perhaps tied into remotes such as VPS. You'll see a lot of selfhosters with rather elaborate firewall defenses set up. I self host a lot of services I use that the 'normal family home' would outsource to public entities. I have a rack in the closet and several VPS, so I need something more than just Windows Firewall, or similar, that I can dial in to my unique environment.

Also, because I can.

[-] PlutoniumAcid@lemmy.world 2 points 5 months ago

Valid! I also tinker with selfhosting using Docker containers, didn't think of firewalls the same way. Thank you.

[-] irmadlad@lemmy.world 1 points 5 months ago

No worries mate. What do you host?

[-] PlutoniumAcid@lemmy.world 2 points 5 months ago* (last edited 5 months ago)

Nothing spectacular.

Git, Paperless, UniFi Controller, Pihole, Mattermost chat, Immich, Home Assistant, Frigate, Syncthing, Hoarder. Just stuff for myself, my home, and my friends. And 🏴‍☠️

And you?

[-] irmadlad@lemmy.world 2 points 5 months ago

The usual. Might be a few I've missed:

  • Homarr
  • Code-server
  • Netdata
  • Searxng
  • Change-detection
  • Readeck
  • Checkcle
  • Duckdns
  • Obsidian
  • Dozzle
  • Loki-promtail-1
  • Loki-loki-1
  • Root-influxdb2-1
  • Cadvisor-redis
  • Dbeaver
  • Pairdrop
  • Speedtest-tracker
  • Btop-plus-plus
  • Portainer
  • Grocy
  • Loki-grafana-1
  • Cup
  • Web-check
  • Omni-tools
  • Cadvisor-prometheus
  • Watchtower-fork
  • Barcode-buddy
  • Ittools
  • Nessus
  • Dockerbot
  • Fusion
  • Bytestash
  • Uptime-kuma
  • Karakeep-web
  • Karakeep-chrome
  • Karakeep-meili
  • Cadvisor
  • Gitlab
  • RocketChat
  • Anonaddy
  • Etherpad
  • Archivebox
  • FreshRSS
  • FileStash
  • piHole
  • LAMP Stack
  • UnRaid
  • Proxmox
[-] thermal_shock@lemmy.world 3 points 5 months ago

Some of it is for fun and testing, learning. Which I used to do. I used to have an old watchdog that I put pfsense on, just don't need it nowadays.

Once i learn how it works and have run through the setup, I move on. Just need to spend my time in other areas, but now I have an understanding of it and can apply that logic or idea to other things and troubleshooting.

[-] PlutoniumAcid@lemmy.world 1 points 5 months ago

This is perfectly valid! I to a lot of tinkering with selfhosting using Docker containers, and I have learned a ton from that. I feel a bit silly that I didn't make the connection with firewalls - just tinkering for fun!

[-] eleitl@lemmy.zip 2 points 5 months ago

Opnsense on a thin client, riser with a quad port Intel NIC.

[-] weewkron@lemmy.world 2 points 5 months ago

Pfsense guy here, and professionally Palo alto guy. Can someone tl;dr the purpose of blockerng and suricata? I thought I remember the Lawrence systems folks mentioning using it for IPS but with segmentation at home "human" IPS seems more relevant than digital

[-] irmadlad@lemmy.world 2 points 5 months ago
  • Suricata: Open source IDS/IPS
  • PfBlockerNG: Used to block ads, malicious content, and manage access based on IP geolocation and domain names. It provides features like DNS-based blocking

Some of the features of both overlap which might not be a bad thing.

[-] weewkron@lemmy.world 2 points 5 months ago

Thanks for the succinct reply!

[-] swelter_spark@reddthat.com 2 points 5 months ago

I use firewalld with a script that automatically updates a blocklist of known shady IPs.

[-] Sxan@piefed.zip 1 points 5 months ago

nftables. Deny all, start adding stuff until þings work.

My firewalls are simple, b/c I run a private VPN and just shut off all traffic except over WG. I've got one exposed VPS reverse proxying services from oþer VPSes over WG.

But: nftables, and only nftables. I'm a big believer in understanding how stuff works, and þe rulesets created by firewalld and ilk are convoluted - complexity adds risk.

[-] warbond@lemmy.world 2 points 5 months ago

Haha, I thought that said "until pings work"

[-] Sxan@piefed.zip 3 points 5 months ago

Also an accurate reading.

[-] Hobbes_Dent@lemmy.world 1 points 5 months ago* (last edited 5 months ago)

OpenBSD pf

Edit: just home/hobby now, I’m not in tech anymore.

[-] irmadlad@lemmy.world 0 points 5 months ago

OpenBSD pf

I'd never heard of it so I went and checked it out. It seems to have a lot of pFsense/Opnsense features just managed from the cli. Cool.

[-] Hobbes_Dent@lemmy.world 1 points 5 months ago* (last edited 5 months ago)

It’s the ‘pf’ in pfSense.

pf is developed as part of the OpenBSD project and is the built in packet filter/firewall.

[-] JovialSodium@lemmy.sdf.org 0 points 5 months ago* (last edited 5 months ago)

Also this. On some unremarkable HP office PC that's probably about a decade old. No ad filtering or anything as it interferes with others in the house. I've thought about trying a second unbound service with adblocking for me, but haven't gotten around to it.

[-] irmadlad@lemmy.world 1 points 5 months ago

No ad filtering or anything as it interferes with others in the house

Ahhh the WAF (Wife Aceptance Factor). I made a seperate Vlan for my lady friend so when she comes over to visit, I don't have to reinvent the wheel for her. She can have all the ads and slop she can stomach, just keep it on your seperate branch and we'll both be happy.

[-] trailee@sh.itjust.works 1 points 5 months ago

I run a secondary wifi network with “Ads” in its name, whose vlan doesn’t get forced into pihole DNS. It mostly prevents me from having to hear complaints from others in the house, and they barely ever use it.

[-] JovialSodium@lemmy.sdf.org 2 points 5 months ago

I quite like this idea, thanks! If I did this I could adblock all the rest of my network, which might help with blocking ads on things like smart TV's. I could also DMZ that wireless network. I would consider their devices untrusted (not malicious, just not careful), and they wouldn't notice the difference.

[-] bhamlin@lemmy.world 1 points 5 months ago

Hiding behind my firewalls. Shhhhh.

[-] kylian0087@lemmy.dbzer0.com 1 points 5 months ago

Nock nock, someone's home?

[-] bhamlin@lemmy.world 1 points 5 months ago
[-] irmadlad@lemmy.world 1 points 5 months ago* (last edited 5 months ago)

Sitting in my bunker

Hid behind my wall.....

In perfect isolation here behind my wall

Waiting for the worms to come

[-] irmadlad@lemmy.world 0 points 5 months ago

I've always wondered about OpenWRT. In my uneducated thinking, running an access point/wifi, firewall, router, etc, all in the same package would create a bottleneck right at the point you wouldn't want it. What has been your experience?

Everything works fine. It's super handy having such fine control over my router.

[-] ScoffingLizard@lemmy.dbzer0.com 1 points 3 weeks ago* (last edited 3 weeks ago)

Just got OpenWRT One router. I have never set up a VPN server, but the wireguard API didn't seem too bad. I've never used an API either though. What do you think about OpenWRT running Wireguard, firewall, and reverse proxy (Caddy)? My firewall experience is with nftables and ufw back in the day.

My selfhost plans for now are just nextcloud and Jellyfin.

[-] s3rvant@lemmy.ml 0 points 5 months ago

pfSense on this:
https://a.co/d/6WpafWQ

I also block outgoing port 53 only allowing my Pihole through.

I use Tailscale to access the network while away.

[-] irmadlad@lemmy.world 0 points 5 months ago

Do you run unbound on pFsense?

[-] s3rvant@lemmy.ml 1 points 5 months ago

No my pfSense setup is fairly minimal

[-] kalpol@lemmy.ca 0 points 5 months ago* (last edited 5 months ago)

Pfsense with pfblocker in a VM. Works wonders. Pipe fail2ban to pfblocker for extra goodness.

[-] HotChickenFeet@sopuli.xyz 0 points 5 months ago

Opnsense on dedicated device, several built in filters + several github backed filters for unbounddns.

Haven't tested it heavily, but the times I am on an outside network not using VPN into my network, or using TOR, etc, i am inundated with ads... So i guess successful internally.

[-] irmadlad@lemmy.world 1 points 5 months ago

outside network not using VPN ........ i am inundated with ads…

I swear I do not know how the regular Joe Schmoe internet user deals with all that clutter. Sometimes I am called by a friend to look at their computer for some issue they are having. It is mind bogglingly frustrating for me.

[-] hellfire103@lemmy.ca 0 points 5 months ago* (last edited 5 months ago)

My firewall varies from installation-to-installation, as it's always client-side with a custom DNS provider. Right now, I'm using YaST Firewall on my main machine, iptables on my old ThinkPad, and my other machines are currently between operating systems. In the past, I have also dabbled in ufw, pf, and awall.

In addition to that, I generally use NextDNS (though I also get excellent results with Mullvad DNS).

My policy is simple: reject all incoming connections, except for Torrent and Syncthing.

[-] irmadlad@lemmy.world -1 points 5 months ago

NextDNS

I hear a lot of good things about NextDNS.

My policy is simple:

Do you call your network Virgin, because that's pretty tight.

this post was submitted on 17 Sep 2025
14 points (100.0% liked)

Privacy

46604 readers
1110 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS