• 20 Posts
  • 171 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle
  • That’s how it works, the bridge makes it possible to post your content to both. And if people who interact with it also use the bridge, it will be visible on both as well. The only downside is that you can’t interact with people who don’t use the bridge and at the same time are not reacting to your post on the same platform you are. For example, I have Mastodon account and use the bridge, if someone who only uses Bluesky, but not the bridge, comments a post by me, I have no way to react.







    1. For all the mentioned cases, if your firewall blocks incoming packets by default, no one can access it, no matter what is the source of the port being open.

    2. You don’t configure it on the docker level, at least if you care about outside connections. If you mean from your local computer to a docker container, by default you cannot connect, unless you expose the port to the system. If you mean from other docker containers, just create your own separate network to run the container in and even docker containers cannot access the ports.

    3. I usually use netstat -tulpn, it lists all ports, not only docker, but docker is included. docker ps should also show all exposed ports and their mappings.

    In general, all docker containers run on some internal docker network. Either the default or a custom one. The network’s ports don’t interfere with your own, that’s why you can have 20 nginx servers running in a docker container on the same port. When you bind a port in docker, you basically create a bridge from the docker network to your PC’s local network. So now anything that can connect to your PC can also connect to the service. And if you allow connection to the port from outside the network, it will work as well. Note that port forwarding on your router must be set up.

    So in conclusion, to actually make a service running in docker visible to the public internet, you need to do quite a few steps!

    • bind a port to your local host
    • have your local firewall allow connection to the port
    • have your router set up to forward connections on the port to your machine

    On Linux, local firewall is usually disabled by default, but the other two steps require you to actively change the default config. And you mention that all incoming traffic is dropped using UFW, so all three parts should be covered.





  • That just won’t work. First and foremost, I won’t be hosting illegal stuff, just so you can have your freedom. Think child porn and stuff. Happened multiple times on Lemmy and probably will happen again. If you haven’t seen it, your admin most likely has and dealt with it.

    And with stuff like Hexbear and other troll instances, I just don’t want to deal with tens of reports a day, I simply block them because they’re trolls.

    If you want that kind of freedom, you have to create your own. I’m not gonna spend a significant amount of time on reports that can be avoided. And definitely not going to prison.