diff --git a/_posts/2015-06-12-ufw.md b/_posts/2015-06-12-ufw.md index 250072c..6b934fd 100644 --- a/_posts/2015-06-12-ufw.md +++ b/_posts/2015-06-12-ufw.md @@ -9,18 +9,26 @@ redirect_from: /ufw/ *This post describes my UFW config and is here so I find it from somewhere and with hope that I am told if someone notices something terriby insecure - here and is able to offer suggestions.* + here and is able to offer suggestions. This probably will never be + perfect.* Having firewall is important as you aren't always in your trusted home -network and with IPv6 your devices have public IPv6 addresses. +network (that can also be broken into especially if you have WLAN) and +with IPv6 your devices have public IPv6 addresses. Theoretically your +router should include a firewall, but at least the Huawei mobile broadband +routers or MiFis don't include one (and I might be annoyed by it enough +to disable it anyway and configure everything on host level if it was +my network). *Threat model: service I am not aware of or that I accidentally make - listen wider than intended and with UFW I am aware of what ports are - allowed. I assume any host is going to move randomly and not - whitelisting only from certain addresses as that address can be - encountered anywhere.* + listen wider than intended, with UFW I am aware of what ports are + allowed. I assume any mobile host is going to move randomly and while + some whitelists (especially link-local and IPv4 LANs) will overlap and + possibly allow access, it's still better than being open to the internet + and overlay networks that I have interacted with recently.* -This post first has list of commands, then explanations. +This post first has list of commands, then explanations that won't be +repeated with IPvX ranges. ``` ufw allow 22/tcp @@ -29,9 +37,12 @@ ufw default allow outgoing systemctl enable ufw && systemctl start ufw ufw enable ufw reject 113/tcp -ufw allow 631 -ufw allow 5353/udp -ufw allow from 172.16.0.0/16 to any port 9091 proto tcp +#ufw allow from 192.168.8.0/24 to any port 631 proto tcp +ufw allow from fe80::/10 to any port 631 +#ufw allow from 192.168.8.0/24 to any port 5353 proto udp +ufw allow from fe80::/10 to any port 5353 proto udp +#ufw allow from to any port 5900 +ufw allow from fe80::/10 to any port 9001 ufw allow 60000:61000/udp ``` @@ -50,17 +61,22 @@ ufw allow 60000:61000/udp allow this instead. And if you don't use IRC or don't care about having to wait for the check to timeout, don't do this as you may leave yourself visible to random port scanners. -* 631 both/cups — Allow access to cups for printer sharing. +* 631 both/cups — Allow access to cups for printer sharing from 192.168.8.xxx + * fe80:://10 is link-local address existing _everywhere_ IPv6 is enabled, + check your `ip addr` or on Windows `ipconfig /all` for fun. * 5353 UDP/mdns/Avahi — used for `.local` addresses. -* 9091 TCP/transmission web interface and also example on how to allow - access to port only from specific addresses, only for devices that - aren't going anywhere and if IPv6 isn't cared about. (TODO: How to do - it IPv6? I have faint idea of UFW not supporting it). - * Transmission file transfer uses TCP and DHT UDP. Default port for - both is: 51413. [Source](https://trac.transmissionbt.com/ticket/2265) +* 5900 — VNC port at least for `krfb kdrc` (KDE Remote Desktop server & client). + I tend to only allow it from specific Yggdrasil address(es). +* 9001 — [Yggdrasil](https://yggdrasil-network.github.io/) automatic peering + port only on link-local. * 60000:61000 UDP/mosh — I feel this is the most insecure part of this setup and there should be something bettter instead of this. As something evil could run and listen on these ports. *If some host doesn't run some of the mentioned service, it's not open in the firewall.* + +* * * * * + +Last updated: 2018-11-03T12:40 | [GitHub changelog](https://github.com/Mikaela/mikaela.github.io/commits/master/_posts/2015-06-12-ufw.md) | +[Blesmrt Gitea changelog](https://gitea.blesmrt.net/mikaela/mikaela-info/commits/branch/master/_posts/2015-06-12-ufw.md)