From mboxrd@z Thu Jan 1 00:00:00 1970 From: Matthias Fischer To: development@lists.ipfire.org Subject: Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only Date: Mon, 18 May 2020 23:03:15 +0200 Message-ID: <98c670e9-cba1-e344-bf60-49674701cb1a@ipfire.org> In-Reply-To: <4CDCB419-19D8-4F2A-B504-2873436B9F28@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============4730966589232619433==" List-Id: --===============4730966589232619433== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hi, perhaps its only me, but after applying this patch for testing purposes I don't see any (redirected) urlfilter block pages anymore. Only the firewall logs are telling me: ... REJECT_INPUT lo TCP 192.168.100.254 53464 192.168.100.254 81 ... I had to build a new "Incoming Firewall Access" rule (INPUTFW) allowing TCP traffic from (e.g.) 192.168.100.254/32 to GREEN (192.168.100.254) to TCP port 81 to see a block page again... Only me? Best, Matthias On 14.05.2020 12:36, Michael Tremer wrote: > Hello, >=20 > This is indeed *very* unlikely, but I am okay with this patch being accepte= d. >=20 > Acked-by: Michael Tremer >=20 > Best, > -Michael >=20 >> On 13 May 2020, at 21:21, Peter M=C3=BCller w= rote: >>=20 >> This ensures traffic on the loopback interface matches the IPv4 >> loopback characteristics (source and destination are within 127.0.0.0/8) >> and prevents any damage in the unlikely case of non-loopback traffic >> being injected/emitted (in)to the loopback interface. >>=20 >> Cc: Arne Fitzenreiter >> Cc: Michael Tremer >> Signed-off-by: Peter M=C3=BCller >> --- >> src/initscripts/system/firewall | 6 +++--- >> 1 file changed, 3 insertions(+), 3 deletions(-) >>=20 >> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/fire= wall >> index 00512d9fa..409aaf7a9 100644 >> --- a/src/initscripts/system/firewall >> +++ b/src/initscripts/system/firewall >> @@ -219,10 +219,10 @@ iptables_init() { >> iptables -A INPUT -j ICMPINPUT >> iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT >>=20 >> - # Accept everything on loopback >> + # Accept everything on loopback if both source and destination are withi= n 127.0.0.0/8 >> iptables -N LOOPBACK >> - iptables -A LOOPBACK -i lo -j ACCEPT >> - iptables -A LOOPBACK -o lo -j ACCEPT >> + iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT >> + iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT >>=20 >> # Filter all packets with loopback addresses on non-loopback interfaces. >> iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP >> --=20 >> 2.26.1 >=20 --===============4730966589232619433==--