I am only replying to this in the interest of closure since I am
already part of this thread, but disclaimer here is some tough love.

You need to stop being lazy and actually understand your network
topology, the security/privacy real or contrived-I see you adhere to
the whole security by obscurity nonsense with the masking of the last
2 octets of that IPv4 address-and pf. Besides your first attempt at
"magically" fixing your problem which was doomed to fail for the
reasons I gave, you are now asking for people to guess what rules you
need.

Do you "really need to block 'martians'"? Seriously? Ignoring the
philosophical trap of what you mean by "need", do you even know what a
"martian" is; and if not, then why are you blindly blocking them? If you
don't know what you are doing, then just don't do it. I don't even know
what a "martian" is other than an alien thing from outer space. In the
interest of providing a modicum of constructive criticism as opposed to
just criticism, here you go:
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml.
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
Not sure if that is what "martians" refer to, but your "martians"
appear to be a proper subset of what is listed there or at least close.
With that information, seek out what those blocks mean and decide based
on your topology and security/privacy needs if you should block
them.

Should I block 192.168.3.2 on my laptop? What about
ingress traffic from 2343:24ad:afde:8224::23 destined to UDP port 764
on my VPS? Those are obviously rhetorical questions as only I know (or
at least _should_ know) what my network topology is like, what
services I run, to whom I want to serve, etc.

You clearly blindly copied and pasted some rules you found without
knowing what they do or why you are doing it as evidenced by the rather
embarrassing blocking of your DHCP server. If you are going to be lazy
and just want stuff to magically work, then disable pf. Bam. Don't need
to worry about anything. If you plan to block stuff though, then
actually learn about what you are blocking and why.

Here is a tiny olive branch: I would allow all egress traffic from your
VPS since that is within _my_ wheel of trust. If my VPS is trying to
talk to an IP, then either it is already compromised or at least running
software it shouldn't at which point I have bigger problems; or it
needs to. Does that "magical" rule apply to you? I don't know, and it
sounds like you don't either. Even if it does, you will still need to
decide if you want to allow other IPs to send traffic; but that requires
you to learn more about your topology, pf, and security/privacy needs.

Reply via email to