====== Network ====== ===== Map ===== {{sketch>map.svg}} ===== Addresses ===== Prefix is **192.168.0.** * **1** : gateway (FB) * **2-63** : DHCP range * **64** : YPC * **65-127** : fixed address range for production devices * **128** : YS * **129-199** : experimental fixed address range * **200-254** : home automation devices with fixed addresses ===== Peggy private network ===== * YS:eth0 : ypn * YS:eth1 : peggy (cross, ip = 10.0.0.1 static) CF : gate:/etc/init.d/firewall ==== System security config ==== # Spoof protection (reverse path filter) net.ipv4.conf.default.rp_filter = 1 net.ipv4.conf.all.rp_filter = 1 # Log malformed IP addresses net.ipv4.conf.all.log_martians = 1 # Do not disable ICMP redirects ! (Peggy router) #net.ipv4.conf.all.send_redirects = 0 # Do not disable source routed packets (Peggy router) #net.ipv4.conf.all.accept_source_route = 0 #net.ipv6.conf.all.accept_source_route = 0 # Disable acceptance of ICMP redirects net.ipv4.conf.all.accept_redirects = 0 net.ipv6.conf.all.accept_redirects = 0 # Turn on protection from Denial of Service (DOS) attacks net.ipv4.tcp_syncookies = 1 # Do not disable responding to ping broadcasts #net.ipv4.icmp_echo_ignore_broadcasts = 1 # Enable IP routing. Required if your firewall is protecting a # network, NAT included net.ipv4.ip_forward = 1 ==== DNSMasq config ==== # Don't forward queries for names, only for full domains domain-needed # Eth interface interface=eth1 # Local domain domain=peggy.private.network # DNS cache size cache-size=256 # DHCP range dhcp-range=10.0.0.2,10.0.0.31,24h # NetMask dhcp-option=1,255.255.255.0 # Local domain dhcp-option=40,peggy.private.network # Release on shutdown for M$ clients dhcp-option=vendor:MSFT,2,li # We are the only DHCP on this network dhcp-authoritative ==== IPTables config script (@startup / eth1 up) ==== #!/bin/bash ## Reset iptables -F iptables -X ## User chains iptables -N valid-src iptables -N valid-dst ## Allow open connection to receive RX data iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT ## Allow open connection to receive TX data iptables -A OUTPUT -m state ! --state INVALID -j ACCEPT ## Loopback iptables -I INPUT -i lo -j ACCEPT ## Verify src/dest iptables -A INPUT -i eth1 -j valid-src iptables -A FORWARD -i eth1 -j valid-src iptables -A OUTPUT -o eth1 -j valid-dst iptables -A FORWARD -o eth1 -j valid-dst ## Drops # Broadcast (RFC 1700) "this" network iptables -A valid-src -d 0.0.0.0/8 -j DROP # Local network gateway iptables -A valid-src -d 10.0.0.1 --dport 23 -j DROP iptables -A valid-src -d 10.0.0.1 --dport 25 -j DROP iptables -A valid-src -d 10.0.0.1 --dport 26912 -j DROP # Local network (RFC 1918) iptables -A valid-src -d 10.0.0.0/8 -j DROP # Loopback iptables -A valid-src -d 127.0.0.0/8 -j DROP # Autoconfig iptables -A valid-src -d 169.254.0.0/16 -j DROP # Local network (RFC 1918) iptables -A valid-src -d 172.16.0.0/12 -j DROP # Local network (RFC 1918) iptables -A valid-src -d 192.168.0.0/16 -j DROP # Multicast (RFC 5771) iptables -A valid-src -d 224.0.0.0/4 -j DROP # Local network (RFC 1918) iptables -A valid-src -d 240.0.0.0/5 -j DROP # Local network (RFC 1918) iptables -A valid-src -s 255.255.255.255 -j DROP iptables -A valid-dst -s 224.0.0.0/4 -j DROP