On 1/20/19 1:15 PM, C. Cook wrote:
>
> Thanks Tom.
>
>
>>> Suddenly I started getting Shorewall DROPs on my LAN members from
>>> various _public_ IPs to ports 80, 443, and so on!  This has never
>>> happened in 10+ years of using Shorewall.  I realized that it must be my
>>> Frontier Communications fiber ONT that has 10.1.1.1 and it's letting
>>> everyone and their brother into my LAN.
>> Internet hosts can't send requests to your local LAN members, without
>> there being DNAT somewhere along the line. Are you sure that you have
>> the correct DNAT rules in place since you have renumbered your local subnet?
>
> These are my only DNATs in the router:
>
> Web(DNAT)       net             dmz:10.1.10.2   -       -      
> -       -       3/sec:10
> Web(DNAT)       local           dmz:10.1.10.2   -       -      
> -       &eth0
>
> DNAT            net             local:10.1.2.1  udp     wgin    -   
>     # WireGuard Port In
>
> ... and yet somehow several public IPs were trying 80 and 443 on
> 10.1.2.2, given the Shorewall DROPs on that machine.  Maybe they were
> coming in through my phone on the VPN server?  DNAT for that is above,
> and in the WG server:
>
> ACCEPT  net:10.1.2.0/24,10.1.5.0/24 outWG       tcp    
> backups,dash,ftp,ftps,git,hkp,http,https,ircd,ircmoz,ircssl,imaps,radio,remote,rtsp,smtp,submission,svn,whois,xmpp-client
>       
> -
> ACCEPT  net:10.1.2.0/24,10.1.3.1/32,10.1.5.0/24 $FW udp domain,ntp      -
>
> I had the phone's AFWall+ on with only relevant apps enabled.
>
>
>>
>>> So now I have to change everything to something else.  But I also want
>>> to exclude any possibility of outsiders getting in.  Studying the docs
>>> it seems the right way is in the router:
>>>
>>> ?SECTION ALL
>>> DROP            all   
>>> local:10.0.0.0/8,local:172.0.0.0/8,local:192.168.0.0/16           
>>> all     all
>>>
>>> Am I on the right track here?
>> The above will break all connections that you allow from the net via
>> DNAT. What policy/rules do you currently have in place from the internet
>> zone to your local zone?
>
> lol, Ok so much for my ingenious interpretation of the docs...
>
> $FW     all     REJECT          info(uid,tcp_options)
> net     all     DROP            info(uid,tcp_options)
> inWG    all     DROP            info(uid,tcp_options)
> outWG   all     DROP            info(uid,tcp_options)
> #local  all     REJECT          info(uid,tcp_options)
> all     all     REJECT          info(uid,tcp_options)
>
>> Have you looked at these requests as they enter your firewall using a
>> packet sniffer (tcpdump -ni <interface> dst host 10.1.1.0/24)? If the
>> above produces no output while your local systems are logging DROPs,
>> then the problem is on your own firewall.
>
> I didn't.  I immediately got on changing my subnets and trying to
> figure out how to block everything but.
>
Strangers are still getting in to the interior of my network!  How is
this possible?

Wed Jan 23 15:28:18 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.192
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=28760 DF PROTO=TCP
SPT=60772 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC0174E60000000001030307)
[Wed Jan 23 15:28:19 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.192
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=28761 DF PROTO=TCP
SPT=60772 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC0178D00000000001030307)
[Wed Jan 23 15:28:21 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.192
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=28762 DF PROTO=TCP
SPT=60772 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC0180A40000000001030307)
[Wed Jan 23 15:28:25 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.192
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=28763 DF PROTO=TCP
SPT=60772 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC0190500000000001030307)
[Wed Jan 23 15:28:33 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.192
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=28764 DF PROTO=TCP
SPT=60772 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC01AFA00000000001030307)
[Wed Jan 23 15:28:42 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=37.49.229.107
DST=10.2.10.2 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=12605 PROTO=TCP
SPT=58028 DPT=443 WINDOW=1024 RES=0x00 SYN URGP=0
[Wed Jan 23 15:28:49 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.181
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=42737 DF PROTO=TCP
SPT=60561 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC01EE110000000001030307)
[Wed Jan 23 15:28:50 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.181
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=42738 DF PROTO=TCP
SPT=60561 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC01F1FC0000000001030307)
[Wed Jan 23 15:28:52 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.181
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=42739 DF PROTO=TCP
SPT=60561 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC01F9D00000000001030307)
[Wed Jan 23 15:28:56 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.181
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=42740 DF PROTO=TCP
SPT=60561 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC0209780000000001030307)
[Wed Jan 23 15:29:04 2019] net-fw DROP IN=wlp3s0 OUT=
MAC=34:02:86:43:de:1f:52:54:00:3e:56:2a:08:00 SRC=95.163.255.181
DST=10.2.10.2 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=42741 DF PROTO=TCP
SPT=60561 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 OPT
(020405B40402080AAC0228C00000000001030307)



_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to