The Linux Thread - The Autist's OS of Choice

Arch with USEFLAGS would be fucking perfect imo, I do not enjoy using emerge whatsoever. pacman is probably the best package manager available and it's usage is piss easy.

Idk, I could install Gentoo again but Arch just works for the most part.

I assume I could edit PKGBUILD's though eh?
PKGBUILDs are the go-to, but they're usually the most accessible only from the AUR with a good enough helper program for that. Do recall that Arch is a binary-release distro and the official packages will have already been built in advance of you installing them.

The wiki does provide some info on how to retrieve PKGBUILD sources from the official repos thoughbeit.
 
I have 4 VLANs and it's all to isolate shit from devices that have my sensitive and valuable data on them. One for user devices, one for servers, one for fileshares, and one for IOT shit,.
I got a similar setup. These days if you use random amazon IOT devices and IP cameras, using VLANS is pretty much necessary if you want to prevent them from phoning home and keeping trusted devices safe.
 
I don't want to shell out 3k for a Bosch IP camera when a similar camera from Chinese brand exists for $50 that fits 99% of my needs as the fancy Bosch camera.
I mean, the actual threat to you goes in order of:
1) Amazon Ring doorbell
2) Bosch camera
3) Random Chinese IP camera
But yes, if your Chinese cams don't support completely local operation, using a VLAN wouldn't hurt. Wheras if you'd use a Ring camera you should just kill yourself now.
 
I have 4 VLANs and it's all to isolate shit from devices that have my sensitive and valuable data on them. One for user devices, one for servers, one for fileshares, and one for IOT shit,.
I got a similar setup. These days if you use random amazon IOT devices and IP cameras, using VLANS is pretty much necessary if you want to prevent them from phoning home and keeping trusted devices safe.
I just run two networks. When I pulled fiber between different rooms of my house, I also pulled two regular Ethernet cables. One network is built off 10G fiber and cheap MikroTik switches. One is just for my IP cameras, the other a disconnected backup. I don't really have any Internet-of-Trash stuff other than cameras, but if I did I'd just add a Wi-Fi access point to the cctv network (which can't route to the Internet, or even the internal network).

I don't want to shell out 3k for a Bosch IP camera
You can get some decent AXIS cameras off of eBay occasionally. Some of their older discontinued stuff sells as new and has 1080p. Even the stuff that is suppose to only work with their trash data appliances can be used with your own software by appending ?Axis-Orig-Sw=true to the URL (e.g. http://10.10.10.10/axis-media/media.amp?Axis-Orig-Sw=true).
 
Last edited:
I agree I think pacman is one of the best ones I've tried. Portage might be the most impressive package manager. It might not be the fastest, and maybe not even that intuitive (though it's not hard to learn), it might be the most powerful one I have tried. At least now it works with the entirety of dealing with a source based distro. Since that means dealing with use flags, as well as dependencies.


Came here to say, I hate this. Btw. Not what the primagen is saying. The other guy.
 
What makes Gentoo shine are USE flags. Want FFMPEG built with some weird feature? Add an "ffmpeg" file to /etc/portage/package.use with one line of configuration and your system uses that. End of. Stick your dwm patches in a folder, they get used. If you customize your system at all, there's so little else like it. Maybe Nix.
 
I'm looking into setting up an ipv6 address for my server which should help with the reliability of some services, but I'm unsure how to firewall my server for that.

I want to ensure that my server can only be contacted through ports 80 and 443 from outside the network, and nothing else can be contacted without previously announcing itself
my modem has this page which i'm not sure if i should change anything. i'm unfamiliar with IDS and I don't know how well it works.

1737425831169.png
 
Last edited:
I'm looking into setting up an ipv6 address for my server which should help with the reliability of some services, but I'm unsure how to firewall my server for that.

I want to ensure that my server can only be contacted through ports 80 and 443 from outside the network, and nothing else can be contacted without previously announcing itself
my modem has this page which i'm not sure if i should change anything. i'm unfamiliar with IDS and I don't know how well it works.

View attachment 6883249
I gather you have Comcast Cable with a SMCD3GNV modem?

You would want to be very careful with that. 'IDS' typically refers to 'Intrusion Detection System'. On a dedicated enterprise firewall, that would include features like monitoring for signatures of malware communicating with a C&C server, detecting port scans, blah blah blah and alerting an administrator or SOC. On a consumer cable modem, it means absolutely nothing.

I have no experience with your particular cable modem, and how it's set up to work with Comcast, but if it's enabled for IPv6 it will get an IPv6 prefix, probably a /64 and then allocate addresses to machines within your network prefix on some basis. That might be random, that might be based off MAC addresses. It will include computers, it will include phones, it will likely include lightbulbs and other 'smart' shit if you have them. Port scanners are really really fast nowadays so those addresses can be guessed (especially if they're MAC-based and thus more predictable), or (if they're stable) anyone with legitimate or illegitimate access to logs anywhere (for example, from dumps of Wikipedia edit history where you edited without being logged in) can just port scan IPs they know were used at one point in the past and see what answers.

The problem is that your firewall options- assuming that Comcast's modem provider even implemented them properly- don't look sufficiently restrictive. All they do is let you block some stuff, and only for ALL machines on your local network. So you couldn't block HTTP/HTTPS access to your server, without blocking it for other laptops/PCs on the network.

And any ports that don't happen to fall within their various random shitty options are presumably exposed- so if there's something that you don't INTEND to expose like a Redis server running on 6379 or 9443 on any machine on your network, you no longer have the protection of home NAT routing where you people on the internet can't access that unless you DELIBERATELY expose it, it is now just freely exposed to the internet for anyone who finds the right IP.

Also, many ISPs don't give you a stable IPv6 allocation, so you aren't necessarily going to be that much better off.

Please consider leaving native IPv6 off and using something like Tailscale, you get all the advantages of IPv6 but you can have your own private network shared between your devices and shared with anyone who should have access to it, without accidentally sharing potentially vulnerable services with the whole internet.
 
but at least it's less likely to tell you that using Arch would solve your problems (what Arch users don't tell you is that they simply don't ever use their computers for anything but reinstalling and reconfiguring Arch,
Okay, serious question, I've always observed Arch being made fun of, the classic fat retard picture with Arch t-shirt, hell, even in my IT class years ago we installed Arch for the lulz

But now I'm checking stuff around and weirdly Arch is one of the systems that get most support of? More documentation and more compatible software, weirdly enough? I'm extremely confused. I'm completely clueless as I've always observed this from the outside so I know nothing other than Ubuntu = most used, Kubuntu its Ubuntu but KDE DE for Windows users, Mint being recommended for being performant and fast (compared to what??) And some other stupid shit. Hell I didn't even know about systemd autism bullshit before I checked tech threads here. I guess this is a request to get spoonfed so take it as a way to defend your distro to death, I assume.

Already had some bumps today like the reboot and shutdown commands not working for some reason, I assume it was fastboot still being enabled. Or installing Nvidia drivers and struggling to get steam open. Or how any reboot ends me in BusyBox for some reason. Or how turning on from sleep mode doesnt make the PC send any video to the monitor. Fun stuff.
 
Last edited:
Okay, serious question, I've always observed Arch being made fun of, the classic fat retard picture with Arch t-shirt, hell, even in my IT class years ago we installed Arch for the lulz

But now I'm checking stuff around and weirdly Arch is one of the systems that get most support of? More documentation and more compatible software, weirdly enough? I'm extremely confused. I'm completely clueless as I've always observed this from the outside so I know nothing other than Ubuntu = most used, Kubuntu its Ubuntu but KDE DE for Windows users, Mint being recommended for being performant and fast (compared to what??) And some other stupid shit. Hell I didn't even know about systemd autism bullshit before I checked tech threads here. I guess this is a request to get spoonfed so take it as a way to defend your distro to death, I assume.

Already had some bumps today like the reboot and shutdown commands not working for some reason, I assume it was fastboot still being enabled. Or installing Nvidia drivers and struggling to get steam open. Fun stuff.
I guess it has a big community and thus gets the support. It still has a pretty steep learning curve, but what's available is pretty damn solid.
It's not actually a bad system at all, I just absolutely hate the users who can't ever shut up about using it, even recommending it as a great beginner's system for Linux noobs.
 
I'm looking into setting up an ipv6 address for my server which should help with the reliability of some services, but I'm unsure how to firewall my server for that.

I want to ensure that my server can only be contacted through ports 80 and 443 from outside the network, and nothing else can be contacted without previously announcing itself
my modem has this page which i'm not sure if i should change anything. i'm unfamiliar with IDS and I don't know how well it works.
Are you using your modem/gateway as your router? If you are using your own discrete router/firewall, then would still handle port forwarding. The only thing you are losing the need for when going to IPv6 is PAT (port address translation, where going to (WAN Address):80 actually redirects to your locally assigned LAN address). Instead your router/firewall will see a packet bound for a device on your LAN and determine if the traffic is allowed to pass based on your ACL (access control list). An ACL will have an implicit deny, so if you allow everything past your gateway, then it'll hit your router/firewall and it will go through the ACL and look for a matching allow entry to pass the traffic along or deny it otherwise.

No idea what Comcast is using for their IDS though. It's probably just them trying to make sure your shit isn't compromised and working as part of a botnet.
 
It still has a pretty steep learning curve, but what's available is pretty damn solid.
I'm thinking of giving NixOS a chance, the rolling updates thing seems like a good idea in the case I fuck up my PC and brick everything, though it looks like more commercial solution than a consumer one.

I don't really care about the learning curve, but I'm not kneen in fucking around and wiping my system more than once.
 
Are you using your modem/gateway as your router? If you are using your own discrete router/firewall, then would still handle port forwarding. The only thing you are losing the need for when going to IPv6 is PAT (port address translation, where going to (WAN Address):80 actually redirects to your locally assigned LAN address). Instead your router/firewall will see a packet bound for a device on your LAN and determine if the traffic is allowed to pass based on your ACL (access control list). An ACL will have an implicit deny, so if you allow everything past your gateway, then it'll hit your router/firewall and it will go through the ACL and look for a matching allow entry to pass the traffic along or deny it otherwise.

No idea what Comcast is using for their IDS though. It's probably just them trying to make sure your shit isn't compromised and working as part of a botnet.
I'll try to figure out access control lists. Generally I don't want anything contacting my server except for a few defined ports. I definitely want ssh blocked but I guess there's a couple ways to do that separately
 
I'm thinking of giving NixOS a chance, the rolling updates thing seems like a good idea in the case I fuck up my PC and brick everything
Rolling release is generally less reliable because there's more package churn, but insofar as rolling goes, NixOS is generally good because everything is versioned and multiple versions coexist happily in a Nix system.
 
NixOS can be rolling release, but it also does stable versions. They very heavily market themselves towards corporate uses, for instance setting up employee laptops by booting a live distro, linking to a master.nix file from your server, and running the install script.

It's a very interesting distro, I still use it on my home server. When using it as a rolling release, one very nice feature is that old configurations are kept until you delete them (or enable the service to automatically clean old configurations after a certain time/number of new ones. So if your latest update fails or something causes issues, you can just pick the previous configuration in GRUB and effortlessly roll the system back.
 
I'm thinking of giving NixOS a chance, the rolling updates thing seems like a good idea in the case I fuck up my PC and brick everything, though it looks like more commercial solution than a consumer one.

I don't really care about the learning curve, but I'm not kneen in fucking around and wiping my system more than once.
I'm using OpenSUSE Tumbleweed, it's also rolling release and so far it's rock solid.
 
Back