diff --git a/how-to-configure-hardened-raspberry-pi/README.md b/how-to-configure-hardened-raspberry-pi/README.md index 5db1e2b..24f97a3 100644 --- a/how-to-configure-hardened-raspberry-pi/README.md +++ b/how-to-configure-hardened-raspberry-pi/README.md @@ -313,7 +313,7 @@ apt update #### Install `iptables-persistent` and Vim -When asked to save current IPv4 or IPv6 rules, answer `Yes`. +When asked to save current IPv4 or IPv6 rules, answer “Yes”. ```shell apt install -y iptables-persistent vim @@ -371,7 +371,7 @@ EOF sysctl -p ``` -### Step 28: configure iptables +### Step 28: configure firewall ```shell iptables -N SSH_BRUTE_FORCE_MITIGATION @@ -434,7 +434,7 @@ ip6tables -P INPUT DROP ip6tables -P OUTPUT DROP ``` -### Step 29: log out and log in to confirm iptables didn’t block SSH +### Step 29: log out and log in to confirm firewall didn’t block SSH #### Log out @@ -457,7 +457,7 @@ ssh pi@10.0.1.248 -i ~/.ssh/pi sudo su - ``` -### Step 31: make iptables rules persistent +### Step 31: make firewall rules persistent ```shell iptables-save > /etc/iptables/rules.v4 diff --git a/how-to-configure-strongswan-client-on-headless-debian-based-linux-computer/README.md b/how-to-configure-strongswan-client-on-headless-debian-based-linux-computer/README.md index 42181e5..3d54083 100644 --- a/how-to-configure-strongswan-client-on-headless-debian-based-linux-computer/README.md +++ b/how-to-configure-strongswan-client-on-headless-debian-based-linux-computer/README.md @@ -105,7 +105,7 @@ ssh pi@10.0.1.248 -i ~/.ssh/pi su - ``` -### Step 4: configure iptables +### Step 4: configure firewall > Heads-up: input rules are likely already configured (run `iptables-save` and `ip6tables-save` to check). @@ -125,7 +125,7 @@ ip6tables -A OUTPUT -p udp --dport 500 -m state --state NEW -j ACCEPT ip6tables -A OUTPUT -p udp --dport 4500 -m state --state NEW -j ACCEPT ``` -#### Make iptables rules persistent +#### make firewall rules persistent ```shell iptables-save > /etc/iptables/rules.v4 diff --git a/how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md b/how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md index e3fd90f..23787f8 100644 --- a/how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md +++ b/how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md @@ -249,13 +249,13 @@ $ source ~/.bashrc ### Step 17: install iptables-persistent -When asked to save current IPv4 or IPv6 rules, answer `Yes`. +When asked to save current IPv4 or IPv6 rules, answer “Yes”. ```shell apt install -y iptables-persistent ``` -### Step 18: configure iptables +### Step 18: configure firewall ```shell iptables -N SSH_BRUTE_FORCE_MITIGATION @@ -334,7 +334,7 @@ ip6tables -P INPUT DROP ip6tables -P OUTPUT DROP ``` -### Step 19: log out and log in to confirm iptables didn’t block SSH +### Step 19: log out and log in to confirm firewall didn’t block SSH #### Log out @@ -361,7 +361,7 @@ When asked, enter root password. su - ``` -### Step 20: make iptables rules persistent +### Step 20: make firewall rules persistent ```shell iptables-save > /etc/iptables/rules.v4 diff --git a/how-to-use-trezor-wallet-on-tails/README.md b/how-to-use-trezor-wallet-on-tails/README.md index ab11c79..0b7030d 100644 --- a/how-to-use-trezor-wallet-on-tails/README.md +++ b/how-to-use-trezor-wallet-on-tails/README.md @@ -102,7 +102,7 @@ Setting up trezor-bridge (2.0.30) ... Created symlink /etc/systemd/system/multi-user.target.wants/trezord.service → /usr/lib/systemd/system/trezord.service. ``` -### Step 9: configure iptables +### Step 9: configure firewall ```console $ sudo iptables -I OUTPUT 3 -o lo -s 127.0.0.1/32 -d 127.0.0.1/32 -p tcp --dport 21325 --syn -m owner --uid-owner amnesia -m conntrack --ctstate NEW -j ACCEPT