▲ | dijit 5 days ago | |
I’m concerned that this is output generated by an LLM (specifically chatgpt) as the writing style is eerily similar. iptables conntrack is indeed a huge menace, but you should bypass conntrack entirely for local network connections as you don’t need it. The only thing conntrack would give you for local requests is better logging, but YAGNI. | ||
▲ | dotancohen 5 days ago | parent | next [-] | |
Doesn't seem like LLM output to me. Rather, it seems like unnecessary text padding with pseudo stories to please (possibly outdated) SEO strategies. | ||
▲ | zamadatix 4 days ago | parent | prev [-] | |
The original page is near identical to the 2020 version https://web.archive.org/web/20200812150324/https://kb.isc.or... (change from some units going from e.g. M to MB and the console snippets going from being labeled as "Plain text" rather than "Shell") and it certainly wasn't written with a GPT-2 quality system. I'm concerned when enough time passes it'll be impossible to do that kind of back-checking proof so "it seems like an LLM"-isms will become a self-confirming prophecy which can't reasonably be disproven. If one feels an article is bad it's sufficient to talk about how the article itself is bad. Hypothesizing of how the bad article came to be written doesn't offer insight to what's wrong with the article, it does instead introduce prejudices based on expectations from perceived style of writing rather than content though. > iptables conntrack is indeed a huge menace, but you should bypass conntrack entirely for local network connections as you don’t need it. > The only thing conntrack would give you for local requests is better logging, but YAGNI. Some people and places don't like the idea an internal device should unilaterally be able to communicate to anything internal and vice versa. Particularly for devices hosting external services. Many even go as far as to host external DNS as a fully isolated service in a DMZ with no internal access allowed by both self and connected FW filters. Not everyone goes full hog with it though but those that do will want to keep not only attempted connection logging but also that multiple layers of security beyond "internal vs external conversation source/destination". |