WHY2025

๐Ÿ”— Networking your (Linux) Machines
2025-08-09 โ€“, Cassiopeia
Language: English

Let's learn about L2 isolation with VLANs and dive into basic network architecture with OPNsense. After playing a bit with IPv4, let's discuss unicorn-issues IPv6 for your homelab-ing. Then expanding with WireGuard for simple inter-machine networks. Continuing, we will take a look into Linux network namespaces and a few tricks you can do with your systems to bypass "security" - and also how to defend against it.


This talk will discuss the security considerations one should make for their own network at home. The first step, to achieve network segmentation, is the use of VLANs - but how do they work? Then advancing into isolated networks using OPNsene and how to configure routing between them (in a more or less scalable way, purely based on experience).
After breaking up (with) your networks, we will take a look into IPv6 troubles you'll likely encounter when you begin applying more strict rulesets onto your network and start leaving NAT-ting behind you. This will also include a quick summary of the most important IPv6-terms you'll need.
Instead of exposing your services publicly, one can also establish site-to-site (S2S) links with well-known parties, so we will take a quick look into getting WireGuard up and running - once again with some pitfalls you may encounter.
In the end, we will take a brief detour into Linux namespaces for networking and learn how one could exploit one of my own mistakes (DNS-based routing without application of source-ip filtering).

Nerd, Software- and Hardware-Engineer at day โ€“ Hacker and Serveroperator at night. If you have read BOFH, you know me already ;)

Living life after "Destroying the universe": This means I like to disassemble things down to their smallest components to understand them, but this does not imply that I can reassemble your smartphone again...

This speaker also appears in: