From: Dave Taht <dave.taht@bufferbloat.net>
To: Vincent Frentzel <zcecc22@c3r.es>
Cc: cerowrt-devel@lists.bufferbloat.net
Subject: Re: [Cerowrt-devel] saner defaults for config/firewall
Date: Sun, 23 Feb 2014 09:21:40 -0800 [thread overview]
Message-ID: <20140223172140.GB24483@lists.bufferbloat.net> (raw)
In-Reply-To: <CACCCjEXdFP40pa_4L3gAK8kyCq_Qj2tZF-VEFqNGp9=jS4JpYg@mail.gmail.com>
On Fri, Feb 21, 2014 at 12:25:23AM +0100, Vincent Frentzel wrote:
> Hi everyone,
>
> After installing ceroWRT the first thing I did was to reconfigure the
> firewall as shown attached. My router is used as home gateway and I wanted
> to lock down the device a bit.
>
> The changes are introduced are as follow:
>
> - LAN (s+) to/from GUEST (g+) is not allowed.
> - GUEST to ROUTER is restricted to DNS/DHCP/NTP.
I note that even dns is a problem in terms of leaking information about
your network, so is mdns.
the "g+" convention can simplify access to the internet in the rules too.
There are also potential problems in enabling the polipo proxy.
Note that the mesh networking interfaces are also "g", and there is
something of a conflict between allowing the mesh network and guest
access.
I used to solve this somewhat with the babel authentication extensions.
http://tools.ietf.org/id/draft-ovsienko-babel-hmac-authentication-06.html
at the moment that code had landed in the quagga branch of babel,
not babel itself.
> - I've tuned the basic IPV6 rules to take the above changes into account
> and allow proto 41 INPUT for 6to/in4 tunnels.
> - LAN to/from ROUTER everything is allowed.
>
> This could be a nice default config.
>
> Feedback welcome.
After getting the last release out I took a break from email, and didn't
get to this.
There are certainly conflicting desires for how to do firewalling. Historically
we run fairly open by default due to cerowrt's origin as a research project.
In the case where we want to open the network somewhat to house guests, being
able to have reasonably secure (ssh and printing) protocols open to them
is a help.
In the case where I want to share my network with the neighborhood,
locking things down as per the above makes more sense. I'd argue for even
stronger measures, actually, something that an org like openwireless.org
could recomend so that people can feel safe in sharing their wifi again.
I think we should put up alternet configs like this somewhere on the wiki,
or in a git tree...
I have a few other desirable configs on the list.
-1) gui support for the + syntax would be good.
0) I really, really, really want bcp38 support, using ipset. I wouldn't
mind a complete switch to ipset for a variety of things, but some
benchmarking along the way would be good to compare the existing schemes
one problem I've run into in turning on bcp38 by default is dealing
with double nat on the dhcp'd interfaces.
1) a more "normal", bridged implementation more like people are used to.
2) vlan support (I've never managed to make vlans work with babel, btw)
3) ?
> _______________________________________________
> Cerowrt-devel mailing list
> Cerowrt-devel@lists.bufferbloat.net
> https://lists.bufferbloat.net/listinfo/cerowrt-devel
next prev parent reply other threads:[~2014-02-23 17:21 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-02-20 23:25 Vincent Frentzel
2014-02-23 17:21 ` Dave Taht [this message]
2014-02-23 19:10 ` J. Daniel Ashton
2014-02-24 8:07 ` Vincent Frentzel
2014-02-24 9:29 ` Sebastian Moeller
2014-02-24 10:05 ` Vincent Frentzel
2014-02-24 10:18 ` Fred Stratton
2014-02-24 11:03 ` Fred Stratton
2014-02-24 11:35 ` Vincent Frentzel
2014-02-24 12:45 ` Fred Stratton
2014-02-24 12:54 ` Robert Bradley
2014-02-24 13:05 ` Vincent Frentzel
2014-02-24 13:48 ` Robert Bradley
2014-02-24 13:35 ` Sebastian Moeller
2014-02-24 13:29 ` Sebastian Moeller
2014-02-24 16:24 ` Dave Taht
2014-03-03 19:41 ` David Lang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.bufferbloat.net/postorius/lists/cerowrt-devel.lists.bufferbloat.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140223172140.GB24483@lists.bufferbloat.net \
--to=dave.taht@bufferbloat.net \
--cc=cerowrt-devel@lists.bufferbloat.net \
--cc=zcecc22@c3r.es \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox