On Mon, 2023-06-19 at 13:07 -0500, Chris Adams wrote:
> One quirk of fireall-cmd is that there are two distinct modes - one that
> operates on the stored configuration (with --permanent) and one that
> operates on the running config (without --permanent).
While the logic of the above makes sense
On 6/19/23 14:39, Chris Adams wrote:
I think it only does the rewrite for p=reject and p=quarantine, not
p=none, since by definition, p=none is for monitoring. If you don't
want to monitor, then don't set DMARC or set a policy that would require
rewrites.
ISTR that I was getting tons of reports
On 6/19/23 11:07, Chris Adams wrote:
Once upon a time, Amadeus WM said:
2. The command that I tried
firewall-cmd --permanent --add-rich-rule="rule family='ipv4' protocol
value="tcp" destination address='aa.bb.0.0/16' reject"
One quirk of fireall-cmd is that there are two distinct modes - one
Once upon a time, Thomas Cameron said:
> As far as I can tell, the Fedora mailing list doesn't do this,
> either.
I think it only does the rewrite for p=reject and p=quarantine, not
p=none, since by definition, p=none is for monitoring. If you don't
want to monitor, then don't set DMARC or set a
On 6/19/23 12:17, Richard wrote:
Another issue on this relates to DMARC. If the mailing list doesn't
rewrite the From: header and your mail service provider's servers
enforce DMARC (DKIM/SPF), your mail service provider's servers will
reject messages from list senders whose domains have DMARC set
On 6/19/23 12:33, Jonathan Billings wrote:
On Mon, Jun 19, 2023 at 11:55:26AM -0500, Thomas Cameron wrote:
I have a dedicated Fedora 38 KVM hypervisor that I use for testing, and I
also use my desktop to run VMs. When I leave the virtualization manager app
open (typically overnight), it has disc
Once upon a time, Amadeus WM said:
> 2. The command that I tried
>
> firewall-cmd --permanent --add-rich-rule="rule family='ipv4' protocol
> value="tcp" destination address='aa.bb.0.0/16' reject"
One quirk of fireall-cmd is that there are two distinct modes - one that
operates on the stored con
On Mon, Jun 19, 2023 at 11:55:26AM -0500, Thomas Cameron wrote:
> I have a dedicated Fedora 38 KVM hypervisor that I use for testing, and I
> also use my desktop to run VMs. When I leave the virtualization manager app
> open (typically overnight), it has disconnected from the remote hypervisor
> an
> Date: Monday, June 19, 2023 07:19:33 -0700
> From: stan via users
>
> On Sat, 17 Jun 2023 10:49:48 -0400
> Robert McBroom via users wrote:
>
>> Received a strange message from the kde list.
>>
>> -
>>
>> Your membership in the mailing list kde-linux has been disabled
>>
I have a dedicated Fedora 38 KVM hypervisor that I use for testing, and
I also use my desktop to run VMs. When I leave the virtualization
manager app open (typically overnight), it has disconnected from the
remote hypervisor and from my local hypervisor. When I double click the
connection, it j
On Jun 19, 2023, at 12:20, Barry wrote:
>
> That is configurable. It defaults to the nftables backend on new installs.
> I force it to iptables because i force in an iptables rule in my setup.
>
> In the kernel iptables is implemented by a compatibility layer by nftables i
> think.
Regardless
> On 19 Jun 2023, at 13:27, Amadeus WM via users
> wrote:
>
> Under the hood, by default, firewalld uses the newer nftables instead of
> iptables. I don't know how these two interact, if anything maybe we should
> do this in nftables.
That is configurable. It defaults to the nftables backen
On Mon, 2023-06-19 at 07:45 -0700, ToddAndMargo via users wrote:
> On 6/19/23 06:49, Patrick O'Callaghan wrote:
> > On Mon, 2023-06-19 at 05:54 -0700, ToddAndMargo via users wrote:
> > > Hi All,
> > >
> > > I just noticed I have two wines installed:
> > >
> > > $ rpm -qa wine
> > > wine-6.13-1.fc
On 6/19/23 06:49, Patrick O'Callaghan wrote:
On Mon, 2023-06-19 at 05:54 -0700, ToddAndMargo via users wrote:
Hi All,
I just noticed I have two wines installed:
$ rpm -qa wine
wine-6.13-1.fc33.i686
wine-6.13-1.fc33.x86_64
yes, I know it is out of date. The current version
does not print.
Ar
On Jun 19, 2023, at 09:08, Amadeus WM via users
wrote:
>
> So after digging a bit more into this,
>
> firewall-cmd --get-active-zone
> FedoraWorkstation
> interfaces: enp8s0
> docker
> interfaces: docker0
>
> firewall-cmd --get-default-zone
> FedoraWorkstation
>
>
> firewall-cmd --permane
On Sat, 17 Jun 2023 10:49:48 -0400
Robert McBroom via users wrote:
> Received a strange message from the kde list.
>
> -
>
> Your membership in the mailing list kde-linux has been disabled due to
> excessive bounces The last bounce received from you was dated
> 09-Jun-2023.
On Mon, 2023-06-19 at 05:54 -0700, ToddAndMargo via users wrote:
> Hi All,
>
> I just noticed I have two wines installed:
>
> $ rpm -qa wine
> wine-6.13-1.fc33.i686
> wine-6.13-1.fc33.x86_64
>
> yes, I know it is out of date. The current version
> does not print.
>
> Are two versions normal?
So after digging a bit more into this,
firewall-cmd --get-active-zone
FedoraWorkstation
interfaces: enp8s0
docker
interfaces: docker0
firewall-cmd --get-default-zone
FedoraWorkstation
firewall-cmd --permanent --add-rich-rule="rule family='ipv4' protocol
value="tcp" destination address='aa.
Hi All,
I just noticed I have two wines installed:
$ rpm -qa wine
wine-6.13-1.fc33.i686
wine-6.13-1.fc33.x86_64
yes, I know it is out of date. The current version
does not print.
Are two versions normal?
Many thanks,
-T
___
users mailing list -- us
Sure, like I said, it can be done with iptables. But:
1. Why do we have firewalld then? It seems to me that such a trivial thing
should be configurable with firewalld.
2. The command that I tried
firewall-cmd --permanent --add-rich-rule="rule family='ipv4' protocol
value="tcp" destination addr
On 19/6/23 10:10, Wolfgang Pfeiffer wrote:
On Sat, Jun 17, 2023 at 12:56:54PM -0400, Max Pyziur wrote:
I made some changes to /etc/default/grub, and here is what my current
version looks like:
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR="$(sed 's, release .*$,,g' /etc/system-release)"
GRUB_DEFAULT=saved
> On 18 Jun 2023, at 23:26, Mike Wright wrote:
>
> How about bypassing firewalld and using iptables directly to add a rule to
> the kernel?
Does firewalld not remove that rule or otherwise make this unreliable?
___
users mailing list -- users@lists
22 matches
Mail list logo