public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
@ 2021-10-10 17:13 Peter Müller
  2021-10-12 11:30 ` Michael Tremer
  0 siblings, 1 reply; 8+ messages in thread
From: Peter Müller @ 2021-10-10 17:13 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2189 bytes --]

This enables creating firewall rules using the special country code "XD"
for hostile networks safe to drop and ipinfo.cgi to display a meaningful
text for IP addresses having this flag set.

At the moment, the "LOC_NETWORK_FLAG_DROP" is not yet populated, but
will be in the future (as soon as libloc 0.9.9 is released and running
in production).

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 config/cfgroot/location-functions.pl | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/config/cfgroot/location-functions.pl b/config/cfgroot/location-functions.pl
index fb97eb589..4d44ce24d 100644
--- a/config/cfgroot/location-functions.pl
+++ b/config/cfgroot/location-functions.pl
@@ -2,7 +2,7 @@
 ###############################################################################
 #                                                                             #
 # IPFire.org - A linux based firewall                                         #
-# Copyright (C) 2007-2020  IPFire Team  <info(a)ipfire.org>                     #
+# Copyright (C) 2007-2021  IPFire Team  <info(a)ipfire.org>                     #
 #                                                                             #
 # This program is free software: you can redistribute it and/or modify        #
 # it under the terms of the GNU General Public License as published by        #
@@ -29,6 +29,7 @@ my %not_iso_3166_location = (
 	"A1" => "Anonymous Proxy",
 	"A2" => "Satellite Provider",
 	"A3" => "Worldwide Anycast Instance",
+	"XD" => "Hostile networks safe to drop",
 );
 
 # Hash which contains possible network flags and their mapped location codes.
@@ -36,10 +37,11 @@ my %network_flags = (
 	"LOC_NETWORK_FLAG_ANONYMOUS_PROXY" => "A1",
 	"LOC_NETWORK_FLAG_SATELLITE_PROVIDER" => "A2",
 	"LOC_NETWORK_FLAG_ANYCAST" => "A3",
+	"LOC_NETWORK_FLAG_DROP" => "XD",
 );
 
 # Array which contains special country codes.
-my @special_locations = ( "A1", "A2", "A3" );
+my @special_locations = ( "A1", "A2", "A3", "XD" );
 
 # Directory where the libloc database and keyfile lives.
 our $location_dir = "/var/lib/location/";
-- 
2.26.2

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
  2021-10-10 17:13 [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP Peter Müller
@ 2021-10-12 11:30 ` Michael Tremer
  2021-10-13 16:21   ` Peter Müller
  0 siblings, 1 reply; 8+ messages in thread
From: Michael Tremer @ 2021-10-12 11:30 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2526 bytes --]

Thank you.

Do we want to make this is a more convenient option somewhere in the UI in the future?

-Michael

Reviewed-by: Michael Tremer <michael.tremer(a)ipfire.org>

> On 10 Oct 2021, at 18:13, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> This enables creating firewall rules using the special country code "XD"
> for hostile networks safe to drop and ipinfo.cgi to display a meaningful
> text for IP addresses having this flag set.
> 
> At the moment, the "LOC_NETWORK_FLAG_DROP" is not yet populated, but
> will be in the future (as soon as libloc 0.9.9 is released and running
> in production).
> 
> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
> ---
> config/cfgroot/location-functions.pl | 6 ++++--
> 1 file changed, 4 insertions(+), 2 deletions(-)
> 
> diff --git a/config/cfgroot/location-functions.pl b/config/cfgroot/location-functions.pl
> index fb97eb589..4d44ce24d 100644
> --- a/config/cfgroot/location-functions.pl
> +++ b/config/cfgroot/location-functions.pl
> @@ -2,7 +2,7 @@
> ###############################################################################
> #                                                                             #
> # IPFire.org - A linux based firewall                                         #
> -# Copyright (C) 2007-2020  IPFire Team  <info(a)ipfire.org>                     #
> +# Copyright (C) 2007-2021  IPFire Team  <info(a)ipfire.org>                     #
> #                                                                             #
> # This program is free software: you can redistribute it and/or modify        #
> # it under the terms of the GNU General Public License as published by        #
> @@ -29,6 +29,7 @@ my %not_iso_3166_location = (
> 	"A1" => "Anonymous Proxy",
> 	"A2" => "Satellite Provider",
> 	"A3" => "Worldwide Anycast Instance",
> +	"XD" => "Hostile networks safe to drop",
> );
> 
> # Hash which contains possible network flags and their mapped location codes.
> @@ -36,10 +37,11 @@ my %network_flags = (
> 	"LOC_NETWORK_FLAG_ANONYMOUS_PROXY" => "A1",
> 	"LOC_NETWORK_FLAG_SATELLITE_PROVIDER" => "A2",
> 	"LOC_NETWORK_FLAG_ANYCAST" => "A3",
> +	"LOC_NETWORK_FLAG_DROP" => "XD",
> );
> 
> # Array which contains special country codes.
> -my @special_locations = ( "A1", "A2", "A3" );
> +my @special_locations = ( "A1", "A2", "A3", "XD" );
> 
> # Directory where the libloc database and keyfile lives.
> our $location_dir = "/var/lib/location/";
> -- 
> 2.26.2


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
  2021-10-12 11:30 ` Michael Tremer
@ 2021-10-13 16:21   ` Peter Müller
  2021-10-14 18:28     ` Michael Tremer
  0 siblings, 1 reply; 8+ messages in thread
From: Peter Müller @ 2021-10-13 16:21 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 3491 bytes --]

Hello Michael,

thanks for your reply.

> Thank you.
> 
> Do we want to make this is a more convenient option somewhere in the UI in the future?

Yes. My imagination of bug #12031 is to have three new checkboxes on the firewall options CGI
to drop all traffic from and to
(a) IP networks not being globally routable ("martians")
(b) publicly routable yet unallocated IP networks ("bogons")
(c) and IP networks having the LOC_NETWORK_FLAG_DROP flag set
on the RED interface.

I think it is wise to split this up, since some people might need (a), but not (b) - Arne
told me yesterday some mobile ISPs use public IP space internally -, and might not want
to enable (c) for whatever reason. One size never fits all.

(a) is something we (I) can implement straight away. As soon as this patch has been merged,
(c) is no longer an issue, too. (b) is currently blocked due to bug #12691.

And of course there will be a blog article about this. \o/

Thanks, and best regards,
Peter Müller

> 
> -Michael
> 
> Reviewed-by: Michael Tremer <michael.tremer(a)ipfire.org>
> 
>> On 10 Oct 2021, at 18:13, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>
>> This enables creating firewall rules using the special country code "XD"
>> for hostile networks safe to drop and ipinfo.cgi to display a meaningful
>> text for IP addresses having this flag set.
>>
>> At the moment, the "LOC_NETWORK_FLAG_DROP" is not yet populated, but
>> will be in the future (as soon as libloc 0.9.9 is released and running
>> in production).
>>
>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>> ---
>> config/cfgroot/location-functions.pl | 6 ++++--
>> 1 file changed, 4 insertions(+), 2 deletions(-)
>>
>> diff --git a/config/cfgroot/location-functions.pl b/config/cfgroot/location-functions.pl
>> index fb97eb589..4d44ce24d 100644
>> --- a/config/cfgroot/location-functions.pl
>> +++ b/config/cfgroot/location-functions.pl
>> @@ -2,7 +2,7 @@
>> ###############################################################################
>> #                                                                             #
>> # IPFire.org - A linux based firewall                                         #
>> -# Copyright (C) 2007-2020  IPFire Team  <info(a)ipfire.org>                     #
>> +# Copyright (C) 2007-2021  IPFire Team  <info(a)ipfire.org>                     #
>> #                                                                             #
>> # This program is free software: you can redistribute it and/or modify        #
>> # it under the terms of the GNU General Public License as published by        #
>> @@ -29,6 +29,7 @@ my %not_iso_3166_location = (
>> 	"A1" => "Anonymous Proxy",
>> 	"A2" => "Satellite Provider",
>> 	"A3" => "Worldwide Anycast Instance",
>> +	"XD" => "Hostile networks safe to drop",
>> );
>>
>> # Hash which contains possible network flags and their mapped location codes.
>> @@ -36,10 +37,11 @@ my %network_flags = (
>> 	"LOC_NETWORK_FLAG_ANONYMOUS_PROXY" => "A1",
>> 	"LOC_NETWORK_FLAG_SATELLITE_PROVIDER" => "A2",
>> 	"LOC_NETWORK_FLAG_ANYCAST" => "A3",
>> +	"LOC_NETWORK_FLAG_DROP" => "XD",
>> );
>>
>> # Array which contains special country codes.
>> -my @special_locations = ( "A1", "A2", "A3" );
>> +my @special_locations = ( "A1", "A2", "A3", "XD" );
>>
>> # Directory where the libloc database and keyfile lives.
>> our $location_dir = "/var/lib/location/";
>> -- 
>> 2.26.2
> 

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
  2021-10-13 16:21   ` Peter Müller
@ 2021-10-14 18:28     ` Michael Tremer
  2021-10-14 19:08       ` Tom Rymes
  2021-10-15  9:16       ` Peter Müller
  0 siblings, 2 replies; 8+ messages in thread
From: Michael Tremer @ 2021-10-14 18:28 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 4959 bytes --]

Hello,

> On 13 Oct 2021, at 17:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Hello Michael,
> 
> thanks for your reply.
> 
>> Thank you.
>> 
>> Do we want to make this is a more convenient option somewhere in the UI in the future?
> 
> Yes. My imagination of bug #12031 is to have three new checkboxes on the firewall options CGI
> to drop all traffic from and to
> (a) IP networks not being globally routable ("martians")

Okay. I like this, but in existing setups this will break a lot.

I have no idea what to expect from this being a default on new setups.

> (b) publicly routable yet unallocated IP networks ("bogons")

I don’t think this would break much and I would be interested to have statistics on this since we would not expect many firewall hits.

People who will have issues with this will likely have broken their location database that it won’t update any more.

> (c) and IP networks having the LOC_NETWORK_FLAG_DROP flag set
> on the RED interface.

Mentally I am putting this into the same category as bogons (“I am never going to communicate to this network”).

I believe this won’t break anything either.

> I think it is wise to split this up, since some people might need (a), but not (b) - Arne
> told me yesterday some mobile ISPs use public IP space internally -, and might not want
> to enable (c) for whatever reason. One size never fits all.

> (a) is something we (I) can implement straight away. As soon as this patch has been merged,


(a) will need a lot of exceptions:

* Networks that are locally connected (GREEN, BLUE, ORANGE, RED)
* All VPNs (OpenVPN, IPsec, H2N and N2N)
* All static routes
* Maybe some SNAT/DNAT rules?

These will have to be auto-generated and not bother the admins.

Maybe it would be better to solve this in another way than using iptables.

(b) If ISPs use unallocated address space they are on their own. I am sorry. Just stupid. But of course we can add exemptions.

> (c) is no longer an issue, too. (b) is currently blocked due to bug #12691.

We could generally work on this and only release it after #12691 is fixed. It is not a blocker for development. Just for release.

> And of course there will be a blog article about this. \o/

Let’s get this on the list first and then think about that.

-Michael

> Thanks, and best regards,
> Peter Müller
> 
>> 
>> -Michael
>> 
>> Reviewed-by: Michael Tremer <michael.tremer(a)ipfire.org>
>> 
>>> On 10 Oct 2021, at 18:13, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>> 
>>> This enables creating firewall rules using the special country code "XD"
>>> for hostile networks safe to drop and ipinfo.cgi to display a meaningful
>>> text for IP addresses having this flag set.
>>> 
>>> At the moment, the "LOC_NETWORK_FLAG_DROP" is not yet populated, but
>>> will be in the future (as soon as libloc 0.9.9 is released and running
>>> in production).
>>> 
>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>> ---
>>> config/cfgroot/location-functions.pl | 6 ++++--
>>> 1 file changed, 4 insertions(+), 2 deletions(-)
>>> 
>>> diff --git a/config/cfgroot/location-functions.pl b/config/cfgroot/location-functions.pl
>>> index fb97eb589..4d44ce24d 100644
>>> --- a/config/cfgroot/location-functions.pl
>>> +++ b/config/cfgroot/location-functions.pl
>>> @@ -2,7 +2,7 @@
>>> ###############################################################################
>>> #                                                                             #
>>> # IPFire.org - A linux based firewall                                         #
>>> -# Copyright (C) 2007-2020  IPFire Team  <info(a)ipfire.org>                     #
>>> +# Copyright (C) 2007-2021  IPFire Team  <info(a)ipfire.org>                     #
>>> #                                                                             #
>>> # This program is free software: you can redistribute it and/or modify        #
>>> # it under the terms of the GNU General Public License as published by        #
>>> @@ -29,6 +29,7 @@ my %not_iso_3166_location = (
>>> 	"A1" => "Anonymous Proxy",
>>> 	"A2" => "Satellite Provider",
>>> 	"A3" => "Worldwide Anycast Instance",
>>> +	"XD" => "Hostile networks safe to drop",
>>> );
>>> 
>>> # Hash which contains possible network flags and their mapped location codes.
>>> @@ -36,10 +37,11 @@ my %network_flags = (
>>> 	"LOC_NETWORK_FLAG_ANONYMOUS_PROXY" => "A1",
>>> 	"LOC_NETWORK_FLAG_SATELLITE_PROVIDER" => "A2",
>>> 	"LOC_NETWORK_FLAG_ANYCAST" => "A3",
>>> +	"LOC_NETWORK_FLAG_DROP" => "XD",
>>> );
>>> 
>>> # Array which contains special country codes.
>>> -my @special_locations = ( "A1", "A2", "A3" );
>>> +my @special_locations = ( "A1", "A2", "A3", "XD" );
>>> 
>>> # Directory where the libloc database and keyfile lives.
>>> our $location_dir = "/var/lib/location/";
>>> -- 
>>> 2.26.2
>> 


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
  2021-10-14 18:28     ` Michael Tremer
@ 2021-10-14 19:08       ` Tom Rymes
  2021-10-14 19:26         ` Michael Tremer
  2021-10-15  9:16       ` Peter Müller
  1 sibling, 1 reply; 8+ messages in thread
From: Tom Rymes @ 2021-10-14 19:08 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1111 bytes --]



> On Oct 14, 2021, at 2:28 PM, Michael Tremer <michael.tremer(a)ipfire.org> wrote:
> 
> Hello,
> 
>> On 13 Oct 2021, at 17:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>> 
[ snip]

>> Yes. My imagination of bug #12031 is to have three new checkboxes on the firewall options CGI
>> to drop all traffic from and to
>> (a) IP networks not being globally routable ("martians")

[snip]

>> (a) is something we (I) can implement straight away. As soon as this patch has been merged,
> 
> 
> (a) will need a lot of exceptions:
> 
> * Networks that are locally connected (GREEN, BLUE, ORANGE, RED)
> * All VPNs (OpenVPN, IPsec, H2N and N2N)
> * All static routes
> * Maybe some SNAT/DNAT rules?
> 
> These will have to be auto-generated and not bother the admins.
> 
> Maybe it would be better to solve this in another way than using iptables.

[snip]

Is “carrier-grade NAT” no longer a thing?

Also, users behind a NAT router/modem/whatever will run into issues, though that’s maybe handled by excluding Locally connected networks as mentioned above?

Tom



^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
  2021-10-14 19:08       ` Tom Rymes
@ 2021-10-14 19:26         ` Michael Tremer
  0 siblings, 0 replies; 8+ messages in thread
From: Michael Tremer @ 2021-10-14 19:26 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1457 bytes --]

Hello,

> On 14 Oct 2021, at 20:08, Tom Rymes <tom(a)rymes.net> wrote:
> 
> 
> 
>> On Oct 14, 2021, at 2:28 PM, Michael Tremer <michael.tremer(a)ipfire.org> wrote:
>> 
>> Hello,
>> 
>>> On 13 Oct 2021, at 17:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>> 
> [ snip]
> 
>>> Yes. My imagination of bug #12031 is to have three new checkboxes on the firewall options CGI
>>> to drop all traffic from and to
>>> (a) IP networks not being globally routable ("martians")
> 
> [snip]
> 
>>> (a) is something we (I) can implement straight away. As soon as this patch has been merged,
>> 
>> 
>> (a) will need a lot of exceptions:
>> 
>> * Networks that are locally connected (GREEN, BLUE, ORANGE, RED)
>> * All VPNs (OpenVPN, IPsec, H2N and N2N)
>> * All static routes
>> * Maybe some SNAT/DNAT rules?
>> 
>> These will have to be auto-generated and not bother the admins.
>> 
>> Maybe it would be better to solve this in another way than using iptables.
> 
> [snip]
> 
> Is “carrier-grade NAT” no longer a thing?

It is, but there is address space that is allocated for that.

Bogons would be address space that isn’t allocated to anyone - of which there probably isn’t much.

> Also, users behind a NAT router/modem/whatever will run into issues, though that’s maybe handled by excluding Locally connected networks as mentioned above?

Yes, that is an absolute necessity.

> 
> Tom
> 
> 


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
  2021-10-14 18:28     ` Michael Tremer
  2021-10-14 19:08       ` Tom Rymes
@ 2021-10-15  9:16       ` Peter Müller
  2021-10-15 14:49         ` Michael Tremer
  1 sibling, 1 reply; 8+ messages in thread
From: Peter Müller @ 2021-10-15  9:16 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 6533 bytes --]

Hello Michael,

> Hello,
> 
>> On 13 Oct 2021, at 17:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>
>> Hello Michael,
>>
>> thanks for your reply.
>>
>>> Thank you.
>>>
>>> Do we want to make this is a more convenient option somewhere in the UI in the future?
>>
>> Yes. My imagination of bug #12031 is to have three new checkboxes on the firewall options CGI
>> to drop all traffic from and to
>> (a) IP networks not being globally routable ("martians")
> 
> Okay. I like this, but in existing setups this will break a lot.

It depends. Perhaps it might be a good idea to split this feature up:

Martians belonging to networks used by IPFire (GREEN, BLUE, ORANGE, etc.), yet arriving
on different interfaces, are spoofing attempts. Dropping these should cause relatively little
harm, unless users run completely crappy setups.

Martians on RED are different, and I would hesitate from enabling this by default on new
installations, since it causes trouble if IPFire is used for internal segmentation (which
I guess we have a lot of installations in companies) or behind existing routers, or ISPs
doing things like DS-lite.

What do you think of this proposal?

> I have no idea what to expect from this being a default on new setups.
> 
>> (b) publicly routable yet unallocated IP networks ("bogons")
> 
> I don’t think this would break much and I would be interested to have statistics on this since we would not expect many firewall hits.

Since the location database is updated weekly by default, very new BGP announcements will
probably cause hits here. On the other hand, network operators usually do not set up their
AS and expect to gain a lot of traffic an hour after.

> People who will have issues with this will likely have broken their location database that it won’t update any more.
> 
>> (c) and IP networks having the LOC_NETWORK_FLAG_DROP flag set
>> on the RED interface.
> 
> Mentally I am putting this into the same category as bogons (“I am never going to communicate to this network”).

I can relate to that, but still would make a difference here, in case people do not want
their internet access to be filtered by an opinionated source. So, a dedicated switch for
this makes sense to me.

> I believe this won’t break anything either.

Me neither.

> 
>> I think it is wise to split this up, since some people might need (a), but not (b) - Arne
>> told me yesterday some mobile ISPs use public IP space internally -, and might not want
>> to enable (c) for whatever reason. One size never fits all.
> 
>> (a) is something we (I) can implement straight away. As soon as this patch has been merged,
> 
> 
> (a) will need a lot of exceptions:
> 
> * Networks that are locally connected (GREEN, BLUE, ORANGE, RED)

But only on their respective interface, right? GREEN traffic should not appear on BLUE.

> * All VPNs (OpenVPN, IPsec, H2N and N2N)
> * All static routes
> * Maybe some SNAT/DNAT rules?
> 
> These will have to be auto-generated and not bother the admins.

ACK.

> Maybe it would be better to solve this in another way than using iptables.

You are thinking about routing here, aren't you? I like it, but we would have no logging
possibility then, which makes troubleshooting tedious.

> (b) If ISPs use unallocated address space they are on their own. I am sorry. Just stupid. But of course we can add exemptions.
> 
>> (c) is no longer an issue, too. (b) is currently blocked due to bug #12691.
> 
> We could generally work on this and only release it after #12691 is fixed. It is not a blocker for development. Just for release.

ACK.

Thanks, and best regards,
Peter Müller

> 
>> And of course there will be a blog article about this. \o/
> 
> Let’s get this on the list first and then think about that.
> 
> -Michael
> 
>> Thanks, and best regards,
>> Peter Müller
>>
>>>
>>> -Michael
>>>
>>> Reviewed-by: Michael Tremer <michael.tremer(a)ipfire.org>
>>>
>>>> On 10 Oct 2021, at 18:13, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>
>>>> This enables creating firewall rules using the special country code "XD"
>>>> for hostile networks safe to drop and ipinfo.cgi to display a meaningful
>>>> text for IP addresses having this flag set.
>>>>
>>>> At the moment, the "LOC_NETWORK_FLAG_DROP" is not yet populated, but
>>>> will be in the future (as soon as libloc 0.9.9 is released and running
>>>> in production).
>>>>
>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>>> ---
>>>> config/cfgroot/location-functions.pl | 6 ++++--
>>>> 1 file changed, 4 insertions(+), 2 deletions(-)
>>>>
>>>> diff --git a/config/cfgroot/location-functions.pl b/config/cfgroot/location-functions.pl
>>>> index fb97eb589..4d44ce24d 100644
>>>> --- a/config/cfgroot/location-functions.pl
>>>> +++ b/config/cfgroot/location-functions.pl
>>>> @@ -2,7 +2,7 @@
>>>> ###############################################################################
>>>> #                                                                             #
>>>> # IPFire.org - A linux based firewall                                         #
>>>> -# Copyright (C) 2007-2020  IPFire Team  <info(a)ipfire.org>                     #
>>>> +# Copyright (C) 2007-2021  IPFire Team  <info(a)ipfire.org>                     #
>>>> #                                                                             #
>>>> # This program is free software: you can redistribute it and/or modify        #
>>>> # it under the terms of the GNU General Public License as published by        #
>>>> @@ -29,6 +29,7 @@ my %not_iso_3166_location = (
>>>> 	"A1" => "Anonymous Proxy",
>>>> 	"A2" => "Satellite Provider",
>>>> 	"A3" => "Worldwide Anycast Instance",
>>>> +	"XD" => "Hostile networks safe to drop",
>>>> );
>>>>
>>>> # Hash which contains possible network flags and their mapped location codes.
>>>> @@ -36,10 +37,11 @@ my %network_flags = (
>>>> 	"LOC_NETWORK_FLAG_ANONYMOUS_PROXY" => "A1",
>>>> 	"LOC_NETWORK_FLAG_SATELLITE_PROVIDER" => "A2",
>>>> 	"LOC_NETWORK_FLAG_ANYCAST" => "A3",
>>>> +	"LOC_NETWORK_FLAG_DROP" => "XD",
>>>> );
>>>>
>>>> # Array which contains special country codes.
>>>> -my @special_locations = ( "A1", "A2", "A3" );
>>>> +my @special_locations = ( "A1", "A2", "A3", "XD" );
>>>>
>>>> # Directory where the libloc database and keyfile lives.
>>>> our $location_dir = "/var/lib/location/";
>>>> -- 
>>>> 2.26.2
>>>
> 

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
  2021-10-15  9:16       ` Peter Müller
@ 2021-10-15 14:49         ` Michael Tremer
  0 siblings, 0 replies; 8+ messages in thread
From: Michael Tremer @ 2021-10-15 14:49 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 7429 bytes --]

Hello,

> On 15 Oct 2021, at 10:16, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Hello Michael,
> 
>> Hello,
>> 
>>> On 13 Oct 2021, at 17:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>> 
>>> Hello Michael,
>>> 
>>> thanks for your reply.
>>> 
>>>> Thank you.
>>>> 
>>>> Do we want to make this is a more convenient option somewhere in the UI in the future?
>>> 
>>> Yes. My imagination of bug #12031 is to have three new checkboxes on the firewall options CGI
>>> to drop all traffic from and to
>>> (a) IP networks not being globally routable ("martians")
>> 
>> Okay. I like this, but in existing setups this will break a lot.
> 
> It depends. Perhaps it might be a good idea to split this feature up:
> 
> Martians belonging to networks used by IPFire (GREEN, BLUE, ORANGE, etc.), yet arriving
> on different interfaces, are spoofing attempts. Dropping these should cause relatively little
> harm, unless users run completely crappy setups.

Static routes? The firewall also responds with ARP replies for all its IP addresses on all interfaces.

This might not be as easily enforceable as you want it unless you change fundamental behaviour of the system which might break things.

> Martians on RED are different, and I would hesitate from enabling this by default on new
> installations, since it causes trouble if IPFire is used for internal segmentation (which
> I guess we have a lot of installations in companies) or behind existing routers, or ISPs
> doing things like DS-lite.
> 
> What do you think of this proposal?

What is the point of this feature then if it isn’t enabled on the interface where it makes the most sense?

Just because this is going to be difficult doesn’t mean we should lose our goal.

> 
>> I have no idea what to expect from this being a default on new setups.
>> 
>>> (b) publicly routable yet unallocated IP networks ("bogons")
>> 
>> I don’t think this would break much and I would be interested to have statistics on this since we would not expect many firewall hits.
> 
> Since the location database is updated weekly by default, very new BGP announcements will
> probably cause hits here. On the other hand, network operators usually do not set up their
> AS and expect to gain a lot of traffic an hour after.

No, it is a well-known practise to announce prefixes for a while before sending any production traffic.

>> People who will have issues with this will likely have broken their location database that it won’t update any more.
>> 
>>> (c) and IP networks having the LOC_NETWORK_FLAG_DROP flag set
>>> on the RED interface.
>> 
>> Mentally I am putting this into the same category as bogons (“I am never going to communicate to this network”).
> 
> I can relate to that, but still would make a difference here, in case people do not want
> their internet access to be filtered by an opinionated source. So, a dedicated switch for
> this makes sense to me.
> 
>> I believe this won’t break anything either.
> 
> Me neither.
> 
>> 
>>> I think it is wise to split this up, since some people might need (a), but not (b) - Arne
>>> told me yesterday some mobile ISPs use public IP space internally -, and might not want
>>> to enable (c) for whatever reason. One size never fits all.
>> 
>>> (a) is something we (I) can implement straight away. As soon as this patch has been merged,
>> 
>> 
>> (a) will need a lot of exceptions:
>> 
>> * Networks that are locally connected (GREEN, BLUE, ORANGE, RED)
> 
> But only on their respective interface, right? GREEN traffic should not appear on BLUE.

Correct.

>> * All VPNs (OpenVPN, IPsec, H2N and N2N)
>> * All static routes
>> * Maybe some SNAT/DNAT rules?
>> 
>> These will have to be auto-generated and not bother the admins.
> 
> ACK.
> 
>> Maybe it would be better to solve this in another way than using iptables.
> 
> You are thinking about routing here, aren't you? I like it, but we would have no logging
> possibility then, which makes troubleshooting tedious.

tcpdump will be your friend.

>> (b) If ISPs use unallocated address space they are on their own. I am sorry. Just stupid. But of course we can add exemptions.
>> 
>>> (c) is no longer an issue, too. (b) is currently blocked due to bug #12691.
>> 
>> We could generally work on this and only release it after #12691 is fixed. It is not a blocker for development. Just for release.
> 
> ACK.
> 
> Thanks, and best regards,
> Peter Müller
> 
>> 
>>> And of course there will be a blog article about this. \o/
>> 
>> Let’s get this on the list first and then think about that.
>> 
>> -Michael
>> 
>>> Thanks, and best regards,
>>> Peter Müller
>>> 
>>>> 
>>>> -Michael
>>>> 
>>>> Reviewed-by: Michael Tremer <michael.tremer(a)ipfire.org>
>>>> 
>>>>> On 10 Oct 2021, at 18:13, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>> 
>>>>> This enables creating firewall rules using the special country code "XD"
>>>>> for hostile networks safe to drop and ipinfo.cgi to display a meaningful
>>>>> text for IP addresses having this flag set.
>>>>> 
>>>>> At the moment, the "LOC_NETWORK_FLAG_DROP" is not yet populated, but
>>>>> will be in the future (as soon as libloc 0.9.9 is released and running
>>>>> in production).
>>>>> 
>>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>>>> ---
>>>>> config/cfgroot/location-functions.pl | 6 ++++--
>>>>> 1 file changed, 4 insertions(+), 2 deletions(-)
>>>>> 
>>>>> diff --git a/config/cfgroot/location-functions.pl b/config/cfgroot/location-functions.pl
>>>>> index fb97eb589..4d44ce24d 100644
>>>>> --- a/config/cfgroot/location-functions.pl
>>>>> +++ b/config/cfgroot/location-functions.pl
>>>>> @@ -2,7 +2,7 @@
>>>>> ###############################################################################
>>>>> #                                                                             #
>>>>> # IPFire.org - A linux based firewall                                         #
>>>>> -# Copyright (C) 2007-2020  IPFire Team  <info(a)ipfire.org>                     #
>>>>> +# Copyright (C) 2007-2021  IPFire Team  <info(a)ipfire.org>                     #
>>>>> #                                                                             #
>>>>> # This program is free software: you can redistribute it and/or modify        #
>>>>> # it under the terms of the GNU General Public License as published by        #
>>>>> @@ -29,6 +29,7 @@ my %not_iso_3166_location = (
>>>>> 	"A1" => "Anonymous Proxy",
>>>>> 	"A2" => "Satellite Provider",
>>>>> 	"A3" => "Worldwide Anycast Instance",
>>>>> +	"XD" => "Hostile networks safe to drop",
>>>>> );
>>>>> 
>>>>> # Hash which contains possible network flags and their mapped location codes.
>>>>> @@ -36,10 +37,11 @@ my %network_flags = (
>>>>> 	"LOC_NETWORK_FLAG_ANONYMOUS_PROXY" => "A1",
>>>>> 	"LOC_NETWORK_FLAG_SATELLITE_PROVIDER" => "A2",
>>>>> 	"LOC_NETWORK_FLAG_ANYCAST" => "A3",
>>>>> +	"LOC_NETWORK_FLAG_DROP" => "XD",
>>>>> );
>>>>> 
>>>>> # Array which contains special country codes.
>>>>> -my @special_locations = ( "A1", "A2", "A3" );
>>>>> +my @special_locations = ( "A1", "A2", "A3", "XD" );
>>>>> 
>>>>> # Directory where the libloc database and keyfile lives.
>>>>> our $location_dir = "/var/lib/location/";
>>>>> -- 
>>>>> 2.26.2


^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2021-10-15 14:49 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-10-10 17:13 [PATCH] location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP Peter Müller
2021-10-12 11:30 ` Michael Tremer
2021-10-13 16:21   ` Peter Müller
2021-10-14 18:28     ` Michael Tremer
2021-10-14 19:08       ` Tom Rymes
2021-10-14 19:26         ` Michael Tremer
2021-10-15  9:16       ` Peter Müller
2021-10-15 14:49         ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox