• 0 Posts
  • 11 Comments
Joined 6 months ago
cake
Cake day: May 20th, 2024

help-circle

  • I’ve never played DND so I don’t know if this is something you could pull off or anything but I’d probably be like

    “I snort the fine pile of dust” and then, I don’t know, there’s some latent personality or intention there, so now we have to alternate playing my character between turns/minutes or something. It’d probably make for some great RP moments, especially if each personality couldn’t remember very well what the other was doing previously. Maybe the class and abilities change with each person, which makes arming up appropriately interesting or a pain depending on how we handle it I suppose.




  • Having a NAT on a consumer router is indeed the norm. I don’t even see how you could say it is not.

    I never said NAT = security. As a matter of fact, I even said

    It was not designed for security but coincidentally blah blah

    But hey, strawmanning didn’t stop your original comment to me either, so why stop there?

    Let me tell you: All. Modern. Routers. include a stateful firewall.

    I never even implied the opposite.

    To Linux at least, NAT is just a special kind of firewall rule called masquerade.

    Right, because masquerade is NAT…specifically Source NAT.

    I’m just going to go ahead an unsubscribe from this conversation.




  • Because, as I said:

    layer 7 firewalls for the network which are going to be where most the majority of attacks are concentrated.

    The NAT doesn’t have to operate at layer 7 to be effective for this because

    coincidentally it is doing the heavy lifting for home network security because it is dropping packets from connections originating from outside the network, barring of course, forwarded ports and DMZ hosts because the router has no idea where to route them.

    The point is that the SPI firewalls are not protecting against the majority of the attacks we’ve seen for decades now from botnets and other arbitrary sources of attacks, except, perhaps targeted DDoSing which isn’t the big problems for most home networks. They must worry about having their OS’ and software exploited and owned in the background, which doesn’t get much of an assist from a router’s firewall.

    Obviously, this is however true for the NAT since the NAT are going to drop connections originating from outside the network attempting to communicate with that software to exploit it

    barring of course, forwarded ports and DMZ hosts because the router has no idea where to route them.



  • The word you are looking for is firewall not NAT.

    No the word I’m looking for is the NAT. It was not designed for security but coincidentally it is doing the heavy lifting for home network security because it is dropping packets from connections originating from outside the network, barring of course, forwarded ports and DMZ hosts because the router has no idea where to route them.

    Consumer router firewalls are generally trash, certainly aren’t layer 7 firewalls protecting from all the SMB, printer, AD, etc etc vulnerabilities and definitely are not doing the heavy lifting.

    By and large automated attacks are not thwarted by the firewall but by the one-way NAT.