* Forcing DNS/NTP V2 - new approach
@ 2020-12-30 8:28 Matthias Fischer
2021-01-06 15:50 ` Stefan Schantl
2021-01-07 11:47 ` Michael Tremer
0 siblings, 2 replies; 4+ messages in thread
From: Matthias Fischer @ 2020-12-30 8:28 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1945 bytes --]
Hi,
since restarting the *whole* firewall through '/etc/rc.d/init.d/firewall
restart' as I did before is NOT an option, I'm thinking about another -
simpler way - to do this.
As Michael wrote "There are plenty of temporary rules that are being
created and which simply will get lost after restarting the firewall.
Mainly this affects IPsec, but also QoS."
For me - and of course for everybody who uses IPSec or QoS - this is a
showstopper. Saving the affected - temporary rules - is too complicated
(for me). I'm trying to make this as simple as possible.
So I'm thinking about separating the DNS/NTP-commands and use them in a
another init-file, apart from the firewall initscript.
I just want to "go out of the way". ;-)
As I see it, IPSec and QoS (e.g) would not be affected and furthermore
we would perhaps have the choice to control some other settings through
this file.
E.g., the settings from '/var/ipfire/optionsfw/settings' are processed
in various control files, see:
https://community.ipfire.org/t/forcing-all-dns-traffic-from-the-lan-to-the-firewall/3512/89
And perhaps that would give us the chance to tidy things up. Just a thought.
So what about using an 'optionsfw' initscript for the DNS/NTP rules?
This and *only* this file would be started through "Save and Restart' on
'optionsfw.cgi', using a new binary. As before, this would be
'optionsfwctrl(.c)', now just containing a call of
'/etc/rc.d/init.d/optionsfw'. Controlling other settings could be added
as needed. A complete firewall restart is NOT initiated.
In this init, the existence of the needed values is first checked, and
only processed if they exist (e.g.):
...
if [ -z "$DNS_FORCE_ON_GREEN" ] && [ "$DNS_FORCE_ON_GREEN" == "on" ]; then
...
The only affected chain is CUSTOMPREROUTING, so other
functionalities/chains (IPSec, QoS) should not be affected.
May I ask for your opinions? ;-)
Best,
Matthias
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Forcing DNS/NTP V2 - new approach
2020-12-30 8:28 Forcing DNS/NTP V2 - new approach Matthias Fischer
@ 2021-01-06 15:50 ` Stefan Schantl
2021-01-06 18:32 ` Matthias Fischer
2021-01-07 11:47 ` Michael Tremer
1 sibling, 1 reply; 4+ messages in thread
From: Stefan Schantl @ 2021-01-06 15:50 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 3616 bytes --]
Hello Matthias,
in general I like the possibility to force the usage of the local DNS
server by just redirecting all queries to it. This is way more elegant
instead of blocking the requests to any nameservers by firewall rules,
except the local unbound to force it's usage.
I reviewed your last patch and want to give you some thoughts - may the
can help you:
> Hi,
>
> since restarting the *whole* firewall through
> '/etc/rc.d/init.d/firewall
> restart' as I did before is NOT an option, I'm thinking about another
> -
> simpler way - to do this.
>
> As Michael wrote "There are plenty of temporary rules that are being
> created and which simply will get lost after restarting the firewall.
> Mainly this affects IPsec, but also QoS."
>
> For me - and of course for everybody who uses IPSec or QoS - this is
> a
> showstopper. Saving the affected - temporary rules - is too
> complicated
> (for me). I'm trying to make this as simple as possible.
>
Yes, this is the reason, why reloading / restarting the whole firewall
should be avoided if possible.
> So I'm thinking about separating the DNS/NTP-commands and use them in
> a
> another init-file, apart from the firewall initscript.
> I just want to "go out of the way". ;-)
>
> As I see it, IPSec and QoS (e.g) would not be affected and
> furthermore
> we would perhaps have the choice to control some other settings
> through
> this file.
> E.g., the settings from '/var/ipfire/optionsfw/settings' are
> processed
> in various control files, see:
> https://community.ipfire.org/t/forcing-all-dns-traffic-from-the-lan-to-the-firewall/3512/89
>
> And perhaps that would give us the chance to tidy things up. Just a
> thought.
>
> So what about using an 'optionsfw' initscript for the DNS/NTP rules?
>
This would be a possible solution, but ends in multiple files which are
doing the same - dealing with firewall rules.
This is not very intuitive and hard to maintain.
> This and *only* this file would be started through "Save and Restart'
> on
> 'optionsfw.cgi', using a new binary. As before, this would be
> 'optionsfwctrl(.c)', now just containing a call of
> '/etc/rc.d/init.d/optionsfw'. Controlling other settings could be
> added
> as needed. A complete firewall restart is NOT initiated.
>
> In this init, the existence of the needed values is first checked,
> and
> only processed if they exist (e.g.):
> ...
> if [ -z "$DNS_FORCE_ON_GREEN" ] && [ "$DNS_FORCE_ON_GREEN" == "on" ];
> then
> ...
>
> The only affected chain is CUSTOMPREROUTING, so other
> functionalities/chains (IPSec, QoS) should not be affected.
Please do not use one of the CUSTOM firewall chains, they only should
be used by the users to customize their systems.
I would suggest to use a new chain like "FORCEDREDIRECT" or similar
before the CUSTOMPREROUTING chain.
This would have the advantage, that you safely can flush this chain and
directly can insert you redirect rules for the network zones and
desired the protocol. So you not need to check each time if the rule
already exists.
This will speeds up the whole process and keeps the code clear.
Instead of writing an additional init script for adding the rules you
directly can execute the iptables calls by your new optionsfw binary.
This allows you to easily call the binary from the CGI file and perform
all required operations inside the single chain without touching
anything else on the running firewall.
Best regards,
-Stefan
>
> May I ask for your opinions? ;-)
>
> Best,
> Matthias
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Forcing DNS/NTP V2 - new approach
2021-01-06 15:50 ` Stefan Schantl
@ 2021-01-06 18:32 ` Matthias Fischer
0 siblings, 0 replies; 4+ messages in thread
From: Matthias Fischer @ 2021-01-06 18:32 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 3612 bytes --]
On 06.01.2021 16:50, Stefan Schantl wrote:
> Hello Matthias,
Hi Stefan,
> in general I like the possibility to force the usage of the local DNS
> server by just redirecting all queries to it. This is way more elegant
> instead of blocking the requests to any nameservers by firewall rules,
> except the local unbound to force it's usage.
>
> I reviewed your last patch and want to give you some thoughts - may the
> can help you:
>> ...
>> For me - and of course for everybody who uses IPSec or QoS - this is
>> a
>> showstopper. Saving the affected - temporary rules - is too
>> complicated
>> (for me). I'm trying to make this as simple as possible.
>>
>
> Yes, this is the reason, why reloading / restarting the whole firewall
> should be avoided if possible.
I completely dropped this - got a new solution which works, but it could
be better. It still uses a new init-file as mentioned below.
>> So I'm thinking about separating the DNS/NTP-commands and use them in
>> a
>> another init-file, apart from the firewall initscript.
>> I just want to "go out of the way". ;-)
>>
>> As I see it, IPSec and QoS (e.g) would not be affected and
>> furthermore
>> we would perhaps have the choice to control some other settings
>> through
>> this file.
>> E.g., the settings from '/var/ipfire/optionsfw/settings' are
>> processed
>> in various control files, see:
>> https://community.ipfire.org/t/forcing-all-dns-traffic-from-the-lan-to-the-firewall/3512/89
>>
>> And perhaps that would give us the chance to tidy things up. Just a
>> thought.
>>
>> So what about using an 'optionsfw' initscript for the DNS/NTP rules?
>>
>
> This would be a possible solution, but ends in multiple files which are
> doing the same - dealing with firewall rules.
Ok. Thats right. I'm now using a new '/etc/rc.d/init.d/dnsntp'-file for
this, but...:
> This is not very intuitive and hard to maintain.
Ok. I see your point.
>> ...
>>
>> The only affected chain is CUSTOMPREROUTING, so other
>> functionalities/chains (IPSec, QoS) should not be affected.
>
> Please do not use one of the CUSTOM firewall chains, they only should
> be used by the users to customize their systems.
>
> I would suggest to use a new chain like "FORCEDREDIRECT" or similar
> before the CUSTOMPREROUTING chain.
I see two possibilities doing this in '/etc/rc,d/init.d/firewall'.
Inserting at line 169:
...
iptables -t nat -N FORCEREDIRECT
iptables -t nat -A PREROUTING -j FORCEREDIRECT
iptables -t nat -N CUSTOMPREROUTING
iptables -t nat -A PREROUTING -j CUSTOMPREROUTING
...
Or after (e.g):
...
# Added for DNS REDIRECTS
iptables -t nat -N FORCEREDIRECTS
iptables -t nat -I PREROUTING 1 -j FORCEREDIRECTS
...
Am I right doing it this way?
> This would have the advantage, that you safely can flush this chain and
> directly can insert you redirect rules for the network zones and
> desired the protocol. So you not need to check each time if the rule
> already exists.
>
> This will speeds up the whole process and keeps the code clear.
Makes sense. Thanks for the hints.
> Instead of writing an additional init script for adding the rules you
> directly can execute the iptables calls by your new optionsfw binary.
I didn't do this before: I'll take a look.
> This allows you to easily call the binary from the CGI file and perform
> all required operations inside the single chain without touching
> anything else on the running firewall.
Yep. I see. Good point. Thanks again. ;-)
Best,
Matthias
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Forcing DNS/NTP V2 - new approach
2020-12-30 8:28 Forcing DNS/NTP V2 - new approach Matthias Fischer
2021-01-06 15:50 ` Stefan Schantl
@ 2021-01-07 11:47 ` Michael Tremer
1 sibling, 0 replies; 4+ messages in thread
From: Michael Tremer @ 2021-01-07 11:47 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 2977 bytes --]
Hi,
> On 30 Dec 2020, at 08:28, Matthias Fischer <matthias.fischer(a)ipfire.org> wrote:
>
> Hi,
>
> since restarting the *whole* firewall through '/etc/rc.d/init.d/firewall
> restart' as I did before is NOT an option, I'm thinking about another -
> simpler way - to do this.
>
> As Michael wrote "There are plenty of temporary rules that are being
> created and which simply will get lost after restarting the firewall.
> Mainly this affects IPsec, but also QoS."
>
> For me - and of course for everybody who uses IPSec or QoS - this is a
> showstopper. Saving the affected - temporary rules - is too complicated
> (for me). I'm trying to make this as simple as possible.
Independently from all of this DNS stuff, I would still be interested in this feature.
It would be possible to stop IPsec, then flush the firewall and start it again.
Tunnels would of course be gone for a brief moment, but that should not be too disruptive. I am not sure how we can make this clear when someone hits the “Save” button that this could disrupt things.
> So I'm thinking about separating the DNS/NTP-commands and use them in a
> another init-file, apart from the firewall initscript.
> I just want to "go out of the way". ;-)
>
> As I see it, IPSec and QoS (e.g) would not be affected and furthermore
> we would perhaps have the choice to control some other settings through
> this file.
> E.g., the settings from '/var/ipfire/optionsfw/settings' are processed
> in various control files, see:
> https://community.ipfire.org/t/forcing-all-dns-traffic-from-the-lan-to-the-firewall/3512/89
>
> And perhaps that would give us the chance to tidy things up. Just a thought.
I like tidying things up.
> So what about using an 'optionsfw' initscript for the DNS/NTP rules?
>
> This and *only* this file would be started through "Save and Restart' on
> 'optionsfw.cgi', using a new binary. As before, this would be
> 'optionsfwctrl(.c)', now just containing a call of
> '/etc/rc.d/init.d/optionsfw'. Controlling other settings could be added
> as needed. A complete firewall restart is NOT initiated.
That would be possible, too. Right now we simply do not have some things in separate functions that we could only reload the parts that we want. Most of the firewall is static anyways and wherever we have dynamic rules, those are in a chain that could be flushed and then recreated.
> In this init, the existence of the needed values is first checked, and
> only processed if they exist (e.g.):
> ...
> if [ -z "$DNS_FORCE_ON_GREEN" ] && [ "$DNS_FORCE_ON_GREEN" == "on" ]; then
> ...
This is very redundant. If you want to check for “on”, that implies that the variable isn’t empty. It if it empty, you do not care.
> The only affected chain is CUSTOMPREROUTING, so other
> functionalities/chains (IPSec, QoS) should not be affected.
>
> May I ask for your opinions? ;-)
>
> Best,
> Matthias
-Michael
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2021-01-07 11:47 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-12-30 8:28 Forcing DNS/NTP V2 - new approach Matthias Fischer
2021-01-06 15:50 ` Stefan Schantl
2021-01-06 18:32 ` Matthias Fischer
2021-01-07 11:47 ` Michael Tremer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox