February 1, 2026

Packets, Popcorn, and Petty Fights

The Book of PF, 4th edition

Beloved firewall book returns; fans cheer, Linux crowd sparks a ‘PF vs nftables’ feud

TLDR: A new edition of a firewall guide for BSD lands with modern tips for safer, smoother networks. Comments erupt into a PF vs nftables debate, with fans praising No Starch and Linux users begging for a fresh nftables book—because staying secure shouldn’t be stuck in 2008.

Cue the confetti: the 4th edition of Peter Hansteen’s “The Book of PF” just dropped in Early Access, and the BSD crowd is treating it like a hometown parade. PF (that’s “Packet Filter,” aka the firewall brain in OpenBSD/FreeBSD/NetBSD) gets a modern refresh—think IPv6 (the new internet addressing), dual-stack setups, smarter traffic shaping to keep video calls smooth, spam defense, backups that kick in automatically, and better logging. But the comments? Pure popcorn. dhruv3006 opens with publisher love—No Starch Press is the rock star—and the thread quickly pivots to a showdown. gspr asks for a similarly modern book for Linux’s nftables (the newer firewall system), noting the old 2008 iptables era feels like flip phones. Then iyn drops the spicy line: “not to start a holy war,” but PF vs nftables—who wins? The room splits: BSD vets keep praising PF’s clean rules and reliability, while Linux folks want a current bible of their own. For comic relief, skywal_l chirps “PF = Packet Filter,” prompting jokes that PF now stands for “People Fighting.” One old-school pro reminisces that the book “helped me a lot professionally,” before confessing they ditched paper for minimalist digital life—cue the print vs PDF debate. Need the deep cut? Check Hansteen’s PF tutorial and his blog for nerd fuel.

Key Points

  • The Book of PF (4th edition) updates coverage of OpenBSD’s packet filter with modern topics including IPv6, dual stack, and traffic shaping.
  • It provides guidance on building PF rulesets for IPv4/IPv6 across LANs, NAT, DMZs, bridges, and wider networks.
  • Wireless setup and security are detailed, including access points and restrictions via authpf.
  • Redundancy and availability are addressed using CARP, relayd, and redirection; adaptive firewall techniques counter attackers and spammers.
  • Monitoring and performance topics include logging, visualization, NetFlow, and traffic shaping via OpenBSD queues or FreeBSD’s ALTQ/Dummynet; supports OpenBSD 7.x, FreeBSD 14.x, and NetBSD 10.x.

Hottest takes

Lot of admiration for no starch - your books are great ! — dhruv3006
I'd love something similarly scoped centered around nftables. — gspr
not to start a holy war, but what people think about modern PF vs nftables? — iyn
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.