Thanks Tom.

>> Suddenly I started getting Shorewall DROPs on my LAN members from
>> various _public_ IPs to ports 80, 443, and so on!  This has never
>> happened in 10+ years of using Shorewall.  I realized that it must be my
>> Frontier Communications fiber ONT that has 10.1.1.1 and it's letting
>> everyone and their brother into my LAN.
> Internet hosts can't send requests to your local LAN members, without
> there being DNAT somewhere along the line. Are you sure that you have
> the correct DNAT rules in place since you have renumbered your local subnet?

These are my only DNATs in the router:

Web(DNAT)       net             dmz:10.1.10.2   -       -       -      
-       3/sec:10
Web(DNAT)       local           dmz:10.1.10.2   -       -       -      
&eth0

DNAT            net             local:10.1.2.1  udp     wgin    -       
# WireGuard Port In

... and yet somehow several public IPs were trying 80 and 443 on
10.1.2.2, given the Shorewall DROPs on that machine.  Maybe they were
coming in through my phone on the VPN server?  DNAT for that is above,
and in the WG server:

ACCEPT  net:10.1.2.0/24,10.1.5.0/24 outWG       tcp    
backups,dash,ftp,ftps,git,hkp,http,https,ircd,ircmoz,ircssl,imaps,radio,remote,rtsp,smtp,submission,svn,whois,xmpp-client
      
-
ACCEPT  net:10.1.2.0/24,10.1.3.1/32,10.1.5.0/24 $FW udp domain,ntp      -

I had the phone's AFWall+ on with only relevant apps enabled.


>
>> So now I have to change everything to something else.  But I also want
>> to exclude any possibility of outsiders getting in.  Studying the docs
>> it seems the right way is in the router:
>>
>> ?SECTION ALL
>> DROP            all   
>> local:10.0.0.0/8,local:172.0.0.0/8,local:192.168.0.0/16           
>> all     all
>>
>> Am I on the right track here?
> The above will break all connections that you allow from the net via
> DNAT. What policy/rules do you currently have in place from the internet
> zone to your local zone?

lol, Ok so much for my ingenious interpretation of the docs...

$FW     all     REJECT          info(uid,tcp_options)
net     all     DROP            info(uid,tcp_options)
inWG    all     DROP            info(uid,tcp_options)
outWG   all     DROP            info(uid,tcp_options)
#local  all     REJECT          info(uid,tcp_options)
all     all     REJECT          info(uid,tcp_options)

> Have you looked at these requests as they enter your firewall using a
> packet sniffer (tcpdump -ni <interface> dst host 10.1.1.0/24)? If the
> above produces no output while your local systems are logging DROPs,
> then the problem is on your own firewall.

I didn't.  I immediately got on changing my subnets and trying to figure
out how to block everything but.


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to