bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

247
active users

#PF

0 posts0 participants0 posts today
Farooq | فاروق<p>Lost <a href="https://cr8r.gg/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> access to my <a href="https://cr8r.gg/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> VPS after enabling <a href="https://cr8r.gg/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> :D</p><p><a href="https://cr8r.gg/tags/BSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSD</span></a> <a href="https://cr8r.gg/tags/dailyNote" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dailyNote</span></a> <a href="https://cr8r.gg/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://cr8r.gg/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
Fa<p>Áudios: <a href="https://mastodon.social/tags/PF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PF</span></a> divulga mensagens de <a href="https://mastodon.social/tags/militares" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>militares</span></a> de alta patente tramando o <a href="https://mastodon.social/tags/Golpe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Golpe</span></a> de Estado para impor uma <a href="https://mastodon.social/tags/Ditadura" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ditadura</span></a> - </p><p><a href="https://cartacampinas.com.br/2025/02/audios-policia-federal-divulga-mensagens-de-militares-de-alta-patente-tramando-o-golpe-de-estado-para-impor-uma-ditadura/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cartacampinas.com.br/2025/02/a</span><span class="invisible">udios-policia-federal-divulga-mensagens-de-militares-de-alta-patente-tramando-o-golpe-de-estado-para-impor-uma-ditadura/</span></a> - <br>Via ‪@cartacampinas.bsky.social‬ -</p>
jhx<p>New video out! 😎 </p><p>Setting up a basic <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> with <a href="https://mastodon.bsd.cafe/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> on <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> :freebsd: </p><p>Enjoy 🙂 </p><p><a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.bsd.cafe/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> </p><p>On <a href="https://mastodon.bsd.cafe/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a> <br><a href="https://youtu.be/W3LLuCb8VAs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/W3LLuCb8VAs</span><span class="invisible"></span></a></p><p>On <a href="https://mastodon.bsd.cafe/tags/Odysee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Odysee</span></a> <br><a href="https://odysee.com/@YetanotherSysAdmin:0/Setting-up-a-basic-firewall-with-pf-on-FreeBSD:d" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">odysee.com/@YetanotherSysAdmin</span><span class="invisible">:0/Setting-up-a-basic-firewall-with-pf-on-FreeBSD:d</span></a></p>
Junicast<p>After a couple of years of abstence I have to try <a href="https://chaos.social/tags/vyos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vyos</span></a> once again. I have been also trying to go back to <a href="https://chaos.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opnsense</span></a> lately but it seems I like <a href="https://chaos.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> based firewalls better, even though somehow <a href="https://chaos.social/tags/BSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSD</span></a>'s <a href="https://chaos.social/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> is really good.</p>
Martin Pugh<p>What do the clever OpenBSD firewall folks use to put up a reasonable defence against known bad actors?</p><p>I have an SSH bastion host that gest spammed with connection attempts (it only accepts key authentication but even so...) as well as web server for my blog that gets requests for dot files, PHP, cpanel, etc...</p><p>On both I'm currently running a shell script that greps the logs for keywords and feeds those IP's into a temporary blocklist but I'm sure there must be a better way, plus some way to feed in a reputable source of bad IP's before they become a problem would be nice.</p><p><a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://bsd.network/tags/PF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PF</span></a></p>
Anders Gulden Olstad<p>When looking at different instructions how to set up <a href="https://infosec.exchange/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> <a href="https://infosec.exchange/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> on <a href="https://infosec.exchange/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>, it is required to add the <a href="https://infosec.exchange/tags/PF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PF</span></a> rule "pass out on egress inet from (wg0:network) nat-to (vio0:0)". Is this really needed for a road warrior client setup? It tend to obstruct my outgoing traffic over wg0 (0.0.0.0/0)</p>
Kevin Karhan :verified:<p><a href="https://infosec.space/tags/FriendlyReminder" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FriendlyReminder</span></a> for people using <a href="https://infosec.space/tags/pfBlockerNG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pfBlockerNG</span></a> on <a href="https://infosec.space/tags/pfSense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pfSense</span></a> / <a href="https://infosec.space/tags/OPNsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPNsense</span></a> or any other <a href="https://infosec.space/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>-based <a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a>|ing-<a href="https://infosec.space/tags/distro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>distro</span></a>: </p><p>Clean up ´´´/var/log/pfblockerng´´´ regularly, or else it'll fill up with disrespectful quickness depending on your setup.</p><ul><li><em>Ask me how I know!</em></li></ul><p><a href="https://infosec.space/tags/Sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sysadmin</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/Maintenance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Maintenance</span></a> <a href="https://infosec.space/tags/DigitalJanitor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalJanitor</span></a> <a href="https://infosec.space/tags/BSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSD</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://infosec.space/tags/Netgate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netgate</span></a> <a href="https://infosec.space/tags/Decisio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Decisio</span></a> <a href="https://infosec.space/tags/Router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Router</span></a> <a href="https://infosec.space/tags/Filtering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Filtering</span></a> <a href="https://infosec.space/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> <a href="https://infosec.space/tags/logging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logging</span></a> <a href="https://infosec.space/tags/logs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logs</span></a> <a href="https://infosec.space/tags/log" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>log</span></a> <a href="https://infosec.space/tags/syslog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>syslog</span></a></p>
napierge<p>Finally run debian12 with gui thanks to vm-bhyve on freebsd14 after several month of tweaking and learning. Really big thank to <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@vermaden" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vermaden</span></a></span> and his article <a href="https://vermaden.wordpress.com/2023/08/18/freebsd-bhyve-virtualization/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vermaden.wordpress.com/2023/08</span><span class="invisible">/18/freebsd-bhyve-virtualization/</span></a> ❤️</p><p>But one thing I still dont get it. I have a problem with resolving a DNS on the VM. IP addreses works well but domain names like google.com not at all. I solved it by adding "nameserver 8.8.8.8" in /etc/resolv.conf in VM, but I am not sure if I solve it well and dont understabd why I have to solve it anyway, I do not remeber that I would have to set it.<br>I se vm-bhyve with host wifi wlan interface so I had to set NAT in PF, in article it is a section laptop wifi nat. Is it normal to set resolv.conf file in VM?</p><p><a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/bhyve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bhyve</span></a> <a href="https://mastodon.bsd.cafe/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://mastodon.bsd.cafe/tags/nat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nat</span></a> <a href="https://mastodon.bsd.cafe/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> <a href="https://mastodon.bsd.cafe/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a></p>
Latte macchiato :blobcoffee: :ablobcat_longlong:<p><span>[ 53.590742] BUG: kernel NULL pointer dereference, address: 0000000000000000<br>[ 53.590748] </span><a href="https://plasmatrap.com/tags/PF" rel="nofollow noopener noreferrer" target="_blank">#PF</a><span>: supervisor read access in kernel mode<br>[ 53.590751] </span><a href="https://plasmatrap.com/tags/PF" rel="nofollow noopener noreferrer" target="_blank">#PF</a><span>: error_code(0x0000) - not-present page<br></span>​:akko_huh:​</p>
Marcel Stritzelberger<p>It continues in my article series: <a href="https://mastodon.online/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> as a server. I went through all the previous articles again and made minor adjustments here and there. Network settings and preparations and <a href="https://mastodon.online/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> Firewall added.</p><p><a href="https://bsdbox.de/en/blog/2024-12-01-freebsd-server-teil3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsdbox.de/en/blog/2024-12-01-f</span><span class="invisible">reebsd-server-teil3</span></a></p><p>Part 4 offers finally Bastille. Stay tuned.</p>
Marcel Stritzelberger<p>Es geht weiter in meiner Artikelreihe: <a href="https://mastodon.online/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> als Server. Alle bisherigen Artikel wurden nochmal an einer frischen Installation durchgespielt und hier und da kleinere Anpassungen vorgenommen. Netzwerk Einstellungen und <a href="https://mastodon.online/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> Firewall hinzugefügt.</p><p><a href="https://bsdbox.de/blog/2024-12-01-freebsd-server-teil3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsdbox.de/blog/2024-12-01-free</span><span class="invisible">bsd-server-teil3</span></a></p><p>Mit Teil 4 kommt dann offiziell Bastille dazu. Bleibt dran.</p>
Fa<p>'Segundo a <a href="https://mastodon.social/tags/PF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PF</span></a>, Alexandre Ramagem ( <a href="https://mastodon.social/tags/PL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PL</span></a> RJ) atuou no comando da <a href="https://mastodon.social/tags/Abin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Abin</span></a> para produzir desinformação com objetivo de subsidiar B0Is0nar0 com ataques ao sistema eleitoral, às urnas eletrônicas, ao Poder Judiciário e seus membros' - </p><p><a href="https://agenciabrasil.ebc.com.br/justica/noticia/2024-11/ex-diretor-da-abin-municiou-bolsonaro-com-dados-para-produzir-desinformacao-diz-pf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">agenciabrasil.ebc.com.br/justi</span><span class="invisible">ca/noticia/2024-11/ex-diretor-da-abin-municiou-bolsonaro-com-dados-para-produzir-desinformacao-diz-pf</span></a> - <br>Via Agência Brasil -</p>
Um otário de sorte... ∞ ⁂<p>Guardem para a posteridade:<br><a href="https://noticias-stf-wp-prd.s3.sa-east-1.amazonaws.com/wp-content/uploads/wpallimport/uploads/2024/11/26160436/Relatorio-Final-PF-Site-2024-1.pdf" rel="nofollow noopener noreferrer" target="_blank">https://noticias-stf-wp-prd.s3.sa-east-1.amazonaws.com/wp-content/uploads/wpallimport/uploads/2024/11/26160436/Relatorio-Final-PF-Site-2024-1.pdf</a></p><p><a href="https://goto.arles.social/tags/bolsonaro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bolsonaro</span></a> <a href="https://goto.arles.social/tags/golpe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>golpe</span></a> <a href="https://goto.arles.social/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PF</span></a></p>
Fa<p>Não há mais sigilo no relatório sobre a tentativa de executar <a href="https://mastodon.social/tags/Lula" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lula</span></a>, Alckmin e Moraes - </p><p><a href="https://bsky.app/profile/brasil247.bsky.social/post/3lbuhlnvpz22t" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsky.app/profile/brasil247.bsk</span><span class="invisible">y.social/post/3lbuhlnvpz22t</span></a> - </p><p>Via ‪Brasil 247‬ ‪@brasil247.bsky.social‬ - </p><p>A <a href="https://mastodon.social/tags/PF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PF</span></a> concluiu que os indiciados no inquérito que apura a tentativa de <a href="https://mastodon.social/tags/Golpe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Golpe</span></a> de Estado se organizaram em 6 núcleos -</p>
Fa<p>MP do TCU pede <a href="https://mastodon.social/tags/Suspens%C3%A3o" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suspensão</span></a> de <a href="https://mastodon.social/tags/Sal%C3%A1rios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Salários</span></a> de <a href="https://mastodon.social/tags/militares" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>militares</span></a> indiciados pela <a href="https://mastodon.social/tags/PF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PF</span></a> - </p><p><a href="https://www.correiodopovo.com.br/not%C3%ADcias/pol%C3%ADtica/mp-do-tcu-pede-suspens%C3%A3o-de-sal%C3%A1rios-de-militares-indiciados-pela-pf-1.1555030" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">correiodopovo.com.br/not%C3%AD</span><span class="invisible">cias/pol%C3%ADtica/mp-do-tcu-pede-suspens%C3%A3o-de-sal%C3%A1rios-de-militares-indiciados-pela-pf-1.1555030</span></a> - <br> <br>Via ‪@marcelodpatricio.bsky.social‬ - <a href="https://mastodon.social/tags/Dinheiro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dinheiro</span></a> - <br> <br><a href="https://mastodon.social/tags/militares" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>militares</span></a> recebem <a href="https://mastodon.social/tags/Sal%C3%A1rios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Salários</span></a> <a href="https://mastodon.social/tags/Alt%C3%ADssimos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Altíssimos</span></a> pra dar <a href="https://mastodon.social/tags/Golpe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Golpe</span></a> ? -</p>
Stefan Sperling<p>I will be hosting <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> and <a href="https://bsd.network/tags/PF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PF</span></a> firewall courses at <span class="h-card"><a href="https://linuxhotel.social/@linuxhotel" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>linuxhotel</span></a></span> in the city of Essen, Germany.</p><p>OpenBSD: <a href="https://www.linuxhotel.de/course/openbsd-de" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linuxhotel.de/course/openbsd-d</span><span class="invisible">e</span></a></p><p>PF: <a href="https://www.linuxhotel.de/course/pf-de" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">linuxhotel.de/course/pf-de</span><span class="invisible"></span></a></p><p>Currently there are no dates set for either course, but it is possible to send Linuxhotel a proposal for the next date.</p><p>The target audience are system administrators who would like to learn about OpenBSD and PF in order to use them as part of their network security tool set.</p><p>(Do not be afraid to sign up if you do not understand German. While the courses are advertised in German, written course material will be in English and the presentation will be entirely in English if preferred by participants.)</p>
Tiago F<p>PF deflagra a Operação Moringa, com busca e apreensão na casa do miliciano cabeça de caixa dágua.</p><p><a href="https://bolha.us/tags/pf" class="mention hashtag" rel="tag">#<span>pf</span></a> <a href="https://bolha.us/tags/SemAnistia" class="mention hashtag" rel="tag">#<span>SemAnistia</span></a></p>
Tomáš<p>Enjoy this special treat from the pile of storyboards! Episode PLUG, pt1.</p><p><a href="https://merveilles.town/tags/technomage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technomage</span></a> meets Puffy's last student for the first time... during unforeseen consequences, as she attempts to interface with a machine for the first time via the freshly installed OpenWellington HeadSocket.</p><p><a href="https://merveilles.town/tags/unix_surrealism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unix_surrealism</span></a> <a href="https://merveilles.town/tags/comic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>comic</span></a> <a href="https://merveilles.town/tags/fediart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediart</span></a> <a href="https://merveilles.town/tags/mastoart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastoart</span></a> <a href="https://merveilles.town/tags/runbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>runbsd</span></a> <a href="https://merveilles.town/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://merveilles.town/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> <a href="https://merveilles.town/tags/storyboard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>storyboard</span></a></p>