public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
@ 2020-05-13 20:21 Peter Müller
  2020-05-14 10:36 ` Michael Tremer
  0 siblings, 1 reply; 9+ messages in thread
From: Peter Müller @ 2020-05-13 20:21 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1368 bytes --]

This ensures traffic on the loopback interface matches the IPv4
loopback characteristics (source and destination are within 127.0.0.0/8)
and prevents any damage in the unlikely case of non-loopback traffic
being injected/emitted (in)to the loopback interface.

Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
Cc: Michael Tremer <michael.tremer(a)ipfire.org>
Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 src/initscripts/system/firewall | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
index 00512d9fa..409aaf7a9 100644
--- a/src/initscripts/system/firewall
+++ b/src/initscripts/system/firewall
@@ -219,10 +219,10 @@ iptables_init() {
 	iptables -A INPUT -j ICMPINPUT
 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
 
-	# Accept everything on loopback
+	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
 	iptables -N LOOPBACK
-	iptables -A LOOPBACK -i lo -j ACCEPT
-	iptables -A LOOPBACK -o lo -j ACCEPT
+	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
+	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
 
 	# Filter all packets with loopback addresses on non-loopback interfaces.
 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
-- 
2.26.1

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
  2020-05-13 20:21 [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only Peter Müller
@ 2020-05-14 10:36 ` Michael Tremer
  2020-05-18 21:03   ` Matthias Fischer
  0 siblings, 1 reply; 9+ messages in thread
From: Michael Tremer @ 2020-05-14 10:36 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1676 bytes --]

Hello,

This is indeed *very* unlikely, but I am okay with this patch being accepted.

Acked-by: Michael Tremer <michael.tremer(a)ipfire.org>

Best,
-Michael

> On 13 May 2020, at 21:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> This ensures traffic on the loopback interface matches the IPv4
> loopback characteristics (source and destination are within 127.0.0.0/8)
> and prevents any damage in the unlikely case of non-loopback traffic
> being injected/emitted (in)to the loopback interface.
> 
> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
> ---
> src/initscripts/system/firewall | 6 +++---
> 1 file changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
> index 00512d9fa..409aaf7a9 100644
> --- a/src/initscripts/system/firewall
> +++ b/src/initscripts/system/firewall
> @@ -219,10 +219,10 @@ iptables_init() {
> 	iptables -A INPUT -j ICMPINPUT
> 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
> 
> -	# Accept everything on loopback
> +	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
> 	iptables -N LOOPBACK
> -	iptables -A LOOPBACK -i lo -j ACCEPT
> -	iptables -A LOOPBACK -o lo -j ACCEPT
> +	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
> +	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
> 
> 	# Filter all packets with loopback addresses on non-loopback interfaces.
> 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
> -- 
> 2.26.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
  2020-05-14 10:36 ` Michael Tremer
@ 2020-05-18 21:03   ` Matthias Fischer
  2020-05-19  8:20     ` Michael Tremer
  2020-05-19 13:06     ` Peter Müller
  0 siblings, 2 replies; 9+ messages in thread
From: Matthias Fischer @ 2020-05-18 21:03 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2257 bytes --]

Hi,

perhaps its only me, but after applying this patch for testing purposes
I don't see any (redirected) urlfilter block pages anymore.

Only the firewall logs are telling me:

...
REJECT_INPUT lo TCP 192.168.100.254 53464 192.168.100.254 81
...

I had to build a new "Incoming Firewall Access" rule (INPUTFW) allowing
TCP traffic from (e.g.) 192.168.100.254/32 to GREEN (192.168.100.254) to
TCP port 81 to see a block page again...

Only me?

Best,
Matthias

On 14.05.2020 12:36, Michael Tremer wrote:
> Hello,
> 
> This is indeed *very* unlikely, but I am okay with this patch being accepted.
> 
> Acked-by: Michael Tremer <michael.tremer(a)ipfire.org>
> 
> Best,
> -Michael
> 
>> On 13 May 2020, at 21:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>> 
>> This ensures traffic on the loopback interface matches the IPv4
>> loopback characteristics (source and destination are within 127.0.0.0/8)
>> and prevents any damage in the unlikely case of non-loopback traffic
>> being injected/emitted (in)to the loopback interface.
>> 
>> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
>> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>> ---
>> src/initscripts/system/firewall | 6 +++---
>> 1 file changed, 3 insertions(+), 3 deletions(-)
>> 
>> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
>> index 00512d9fa..409aaf7a9 100644
>> --- a/src/initscripts/system/firewall
>> +++ b/src/initscripts/system/firewall
>> @@ -219,10 +219,10 @@ iptables_init() {
>> 	iptables -A INPUT -j ICMPINPUT
>> 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
>> 
>> -	# Accept everything on loopback
>> +	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
>> 	iptables -N LOOPBACK
>> -	iptables -A LOOPBACK -i lo -j ACCEPT
>> -	iptables -A LOOPBACK -o lo -j ACCEPT
>> +	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>> +	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>> 
>> 	# Filter all packets with loopback addresses on non-loopback interfaces.
>> 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
>> -- 
>> 2.26.1
> 


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
  2020-05-18 21:03   ` Matthias Fischer
@ 2020-05-19  8:20     ` Michael Tremer
  2020-05-19  8:21       ` Michael Tremer
  2020-05-19 13:06     ` Peter Müller
  1 sibling, 1 reply; 9+ messages in thread
From: Michael Tremer @ 2020-05-19  8:20 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2515 bytes --]

Okay, thanks for testing this.

I will ask Arne to revert it.

-Michael

> On 18 May 2020, at 22:03, Matthias Fischer <matthias.fischer(a)ipfire.org> wrote:
> 
> Hi,
> 
> perhaps its only me, but after applying this patch for testing purposes
> I don't see any (redirected) urlfilter block pages anymore.
> 
> Only the firewall logs are telling me:
> 
> ...
> REJECT_INPUT lo TCP 192.168.100.254 53464 192.168.100.254 81
> ...
> 
> I had to build a new "Incoming Firewall Access" rule (INPUTFW) allowing
> TCP traffic from (e.g.) 192.168.100.254/32 to GREEN (192.168.100.254) to
> TCP port 81 to see a block page again...
> 
> Only me?
> 
> Best,
> Matthias
> 
> On 14.05.2020 12:36, Michael Tremer wrote:
>> Hello,
>> 
>> This is indeed *very* unlikely, but I am okay with this patch being accepted.
>> 
>> Acked-by: Michael Tremer <michael.tremer(a)ipfire.org>
>> 
>> Best,
>> -Michael
>> 
>>> On 13 May 2020, at 21:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>> 
>>> This ensures traffic on the loopback interface matches the IPv4
>>> loopback characteristics (source and destination are within 127.0.0.0/8)
>>> and prevents any damage in the unlikely case of non-loopback traffic
>>> being injected/emitted (in)to the loopback interface.
>>> 
>>> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
>>> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>> ---
>>> src/initscripts/system/firewall | 6 +++---
>>> 1 file changed, 3 insertions(+), 3 deletions(-)
>>> 
>>> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
>>> index 00512d9fa..409aaf7a9 100644
>>> --- a/src/initscripts/system/firewall
>>> +++ b/src/initscripts/system/firewall
>>> @@ -219,10 +219,10 @@ iptables_init() {
>>> 	iptables -A INPUT -j ICMPINPUT
>>> 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
>>> 
>>> -	# Accept everything on loopback
>>> +	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
>>> 	iptables -N LOOPBACK
>>> -	iptables -A LOOPBACK -i lo -j ACCEPT
>>> -	iptables -A LOOPBACK -o lo -j ACCEPT
>>> +	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>> +	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>> 
>>> 	# Filter all packets with loopback addresses on non-loopback interfaces.
>>> 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
>>> -- 
>>> 2.26.1
>> 
> 


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
  2020-05-19  8:20     ` Michael Tremer
@ 2020-05-19  8:21       ` Michael Tremer
  2020-05-19  8:35         ` Matthias Fischer
  0 siblings, 1 reply; 9+ messages in thread
From: Michael Tremer @ 2020-05-19  8:21 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2762 bytes --]

Hi,

False alarm. Turns out this isn’t merged, yet.

Best,
-Michael

> On 19 May 2020, at 09:20, Michael Tremer <michael.tremer(a)ipfire.org> wrote:
> 
> Okay, thanks for testing this.
> 
> I will ask Arne to revert it.
> 
> -Michael
> 
>> On 18 May 2020, at 22:03, Matthias Fischer <matthias.fischer(a)ipfire.org> wrote:
>> 
>> Hi,
>> 
>> perhaps its only me, but after applying this patch for testing purposes
>> I don't see any (redirected) urlfilter block pages anymore.
>> 
>> Only the firewall logs are telling me:
>> 
>> ...
>> REJECT_INPUT lo TCP 192.168.100.254 53464 192.168.100.254 81
>> ...
>> 
>> I had to build a new "Incoming Firewall Access" rule (INPUTFW) allowing
>> TCP traffic from (e.g.) 192.168.100.254/32 to GREEN (192.168.100.254) to
>> TCP port 81 to see a block page again...
>> 
>> Only me?
>> 
>> Best,
>> Matthias
>> 
>> On 14.05.2020 12:36, Michael Tremer wrote:
>>> Hello,
>>> 
>>> This is indeed *very* unlikely, but I am okay with this patch being accepted.
>>> 
>>> Acked-by: Michael Tremer <michael.tremer(a)ipfire.org>
>>> 
>>> Best,
>>> -Michael
>>> 
>>>> On 13 May 2020, at 21:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>> 
>>>> This ensures traffic on the loopback interface matches the IPv4
>>>> loopback characteristics (source and destination are within 127.0.0.0/8)
>>>> and prevents any damage in the unlikely case of non-loopback traffic
>>>> being injected/emitted (in)to the loopback interface.
>>>> 
>>>> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
>>>> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>>> ---
>>>> src/initscripts/system/firewall | 6 +++---
>>>> 1 file changed, 3 insertions(+), 3 deletions(-)
>>>> 
>>>> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
>>>> index 00512d9fa..409aaf7a9 100644
>>>> --- a/src/initscripts/system/firewall
>>>> +++ b/src/initscripts/system/firewall
>>>> @@ -219,10 +219,10 @@ iptables_init() {
>>>> 	iptables -A INPUT -j ICMPINPUT
>>>> 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
>>>> 
>>>> -	# Accept everything on loopback
>>>> +	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
>>>> 	iptables -N LOOPBACK
>>>> -	iptables -A LOOPBACK -i lo -j ACCEPT
>>>> -	iptables -A LOOPBACK -o lo -j ACCEPT
>>>> +	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>> +	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>> 
>>>> 	# Filter all packets with loopback addresses on non-loopback interfaces.
>>>> 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
>>>> -- 
>>>> 2.26.1
>>> 
>> 
> 


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
  2020-05-19  8:21       ` Michael Tremer
@ 2020-05-19  8:35         ` Matthias Fischer
  0 siblings, 0 replies; 9+ messages in thread
From: Matthias Fischer @ 2020-05-19  8:35 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 3046 bytes --]

Hi,

yes - sorry, forgot to mention this. Didn't want to make too much noise...

Next time I'll write if "merged or not". ;-)

Matthias

On 19.05.2020 10:21, Michael Tremer wrote:
> Hi,
> 
> False alarm. Turns out this isn’t merged, yet.
> 
> Best,
> -Michael
> 
>> On 19 May 2020, at 09:20, Michael Tremer <michael.tremer(a)ipfire.org> wrote:
>> 
>> Okay, thanks for testing this.
>> 
>> I will ask Arne to revert it.
>> 
>> -Michael
>> 
>>> On 18 May 2020, at 22:03, Matthias Fischer <matthias.fischer(a)ipfire.org> wrote:
>>> 
>>> Hi,
>>> 
>>> perhaps its only me, but after applying this patch for testing purposes
>>> I don't see any (redirected) urlfilter block pages anymore.
>>> 
>>> Only the firewall logs are telling me:
>>> 
>>> ...
>>> REJECT_INPUT lo TCP 192.168.100.254 53464 192.168.100.254 81
>>> ...
>>> 
>>> I had to build a new "Incoming Firewall Access" rule (INPUTFW) allowing
>>> TCP traffic from (e.g.) 192.168.100.254/32 to GREEN (192.168.100.254) to
>>> TCP port 81 to see a block page again...
>>> 
>>> Only me?
>>> 
>>> Best,
>>> Matthias
>>> 
>>> On 14.05.2020 12:36, Michael Tremer wrote:
>>>> Hello,
>>>> 
>>>> This is indeed *very* unlikely, but I am okay with this patch being accepted.
>>>> 
>>>> Acked-by: Michael Tremer <michael.tremer(a)ipfire.org>
>>>> 
>>>> Best,
>>>> -Michael
>>>> 
>>>>> On 13 May 2020, at 21:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>> 
>>>>> This ensures traffic on the loopback interface matches the IPv4
>>>>> loopback characteristics (source and destination are within 127.0.0.0/8)
>>>>> and prevents any damage in the unlikely case of non-loopback traffic
>>>>> being injected/emitted (in)to the loopback interface.
>>>>> 
>>>>> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
>>>>> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
>>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>>>> ---
>>>>> src/initscripts/system/firewall | 6 +++---
>>>>> 1 file changed, 3 insertions(+), 3 deletions(-)
>>>>> 
>>>>> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
>>>>> index 00512d9fa..409aaf7a9 100644
>>>>> --- a/src/initscripts/system/firewall
>>>>> +++ b/src/initscripts/system/firewall
>>>>> @@ -219,10 +219,10 @@ iptables_init() {
>>>>> 	iptables -A INPUT -j ICMPINPUT
>>>>> 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
>>>>> 
>>>>> -	# Accept everything on loopback
>>>>> +	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
>>>>> 	iptables -N LOOPBACK
>>>>> -	iptables -A LOOPBACK -i lo -j ACCEPT
>>>>> -	iptables -A LOOPBACK -o lo -j ACCEPT
>>>>> +	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>>> +	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>>> 
>>>>> 	# Filter all packets with loopback addresses on non-loopback interfaces.
>>>>> 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
>>>>> -- 
>>>>> 2.26.1
>>>> 
>>> 
>> 
> 


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
  2020-05-18 21:03   ` Matthias Fischer
  2020-05-19  8:20     ` Michael Tremer
@ 2020-05-19 13:06     ` Peter Müller
  2020-05-19 20:23       ` Matthias Fischer
  2020-05-20 12:47       ` Michael Tremer
  1 sibling, 2 replies; 9+ messages in thread
From: Peter Müller @ 2020-05-19 13:06 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2474 bytes --]

Hello Matthias, hello list,

why is that traffic passing through the loopback interface?!

Thanks, and best regards,
Peter Müller

> Hi,
> 
> perhaps its only me, but after applying this patch for testing purposes
> I don't see any (redirected) urlfilter block pages anymore.
> 
> Only the firewall logs are telling me:
> 
> ...
> REJECT_INPUT lo TCP 192.168.100.254 53464 192.168.100.254 81
> ...
> 
> I had to build a new "Incoming Firewall Access" rule (INPUTFW) allowing
> TCP traffic from (e.g.) 192.168.100.254/32 to GREEN (192.168.100.254) to
> TCP port 81 to see a block page again...
> 
> Only me?
> 
> Best,
> Matthias
> 
> On 14.05.2020 12:36, Michael Tremer wrote:
>> Hello,
>>
>> This is indeed *very* unlikely, but I am okay with this patch being accepted.
>>
>> Acked-by: Michael Tremer <michael.tremer(a)ipfire.org>
>>
>> Best,
>> -Michael
>>
>>> On 13 May 2020, at 21:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>
>>> This ensures traffic on the loopback interface matches the IPv4
>>> loopback characteristics (source and destination are within 127.0.0.0/8)
>>> and prevents any damage in the unlikely case of non-loopback traffic
>>> being injected/emitted (in)to the loopback interface.
>>>
>>> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
>>> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>> ---
>>> src/initscripts/system/firewall | 6 +++---
>>> 1 file changed, 3 insertions(+), 3 deletions(-)
>>>
>>> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
>>> index 00512d9fa..409aaf7a9 100644
>>> --- a/src/initscripts/system/firewall
>>> +++ b/src/initscripts/system/firewall
>>> @@ -219,10 +219,10 @@ iptables_init() {
>>> 	iptables -A INPUT -j ICMPINPUT
>>> 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
>>>
>>> -	# Accept everything on loopback
>>> +	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
>>> 	iptables -N LOOPBACK
>>> -	iptables -A LOOPBACK -i lo -j ACCEPT
>>> -	iptables -A LOOPBACK -o lo -j ACCEPT
>>> +	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>> +	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>
>>> 	# Filter all packets with loopback addresses on non-loopback interfaces.
>>> 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
>>> -- 
>>> 2.26.1
>>
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
  2020-05-19 13:06     ` Peter Müller
@ 2020-05-19 20:23       ` Matthias Fischer
  2020-05-20 12:47       ` Michael Tremer
  1 sibling, 0 replies; 9+ messages in thread
From: Matthias Fischer @ 2020-05-19 20:23 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2785 bytes --]

Hi,

sorry, no idea. The only thing I've found is that "squidGuard uses
Squid's [8]standard redirector interface".

*If* 'squidguard' is the culprit here.

Best,
Matthias

On 19.05.2020 15:06, Peter Müller wrote:
> Hello Matthias, hello list,
> 
> why is that traffic passing through the loopback interface?!
> 
> Thanks, and best regards,
> Peter Müller
> 
>> Hi,
>> 
>> perhaps its only me, but after applying this patch for testing purposes
>> I don't see any (redirected) urlfilter block pages anymore.
>> 
>> Only the firewall logs are telling me:
>> 
>> ...
>> REJECT_INPUT lo TCP 192.168.100.254 53464 192.168.100.254 81
>> ...
>> 
>> I had to build a new "Incoming Firewall Access" rule (INPUTFW) allowing
>> TCP traffic from (e.g.) 192.168.100.254/32 to GREEN (192.168.100.254) to
>> TCP port 81 to see a block page again...
>> 
>> Only me?
>> 
>> Best,
>> Matthias
>> 
>> On 14.05.2020 12:36, Michael Tremer wrote:
>>> Hello,
>>>
>>> This is indeed *very* unlikely, but I am okay with this patch being accepted.
>>>
>>> Acked-by: Michael Tremer <michael.tremer(a)ipfire.org>
>>>
>>> Best,
>>> -Michael
>>>
>>>> On 13 May 2020, at 21:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>
>>>> This ensures traffic on the loopback interface matches the IPv4
>>>> loopback characteristics (source and destination are within 127.0.0.0/8)
>>>> and prevents any damage in the unlikely case of non-loopback traffic
>>>> being injected/emitted (in)to the loopback interface.
>>>>
>>>> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
>>>> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>>> ---
>>>> src/initscripts/system/firewall | 6 +++---
>>>> 1 file changed, 3 insertions(+), 3 deletions(-)
>>>>
>>>> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
>>>> index 00512d9fa..409aaf7a9 100644
>>>> --- a/src/initscripts/system/firewall
>>>> +++ b/src/initscripts/system/firewall
>>>> @@ -219,10 +219,10 @@ iptables_init() {
>>>> 	iptables -A INPUT -j ICMPINPUT
>>>> 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
>>>>
>>>> -	# Accept everything on loopback
>>>> +	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
>>>> 	iptables -N LOOPBACK
>>>> -	iptables -A LOOPBACK -i lo -j ACCEPT
>>>> -	iptables -A LOOPBACK -o lo -j ACCEPT
>>>> +	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>> +	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>>
>>>> 	# Filter all packets with loopback addresses on non-loopback interfaces.
>>>> 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
>>>> -- 
>>>> 2.26.1
>>>
>> 
> 


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only
  2020-05-19 13:06     ` Peter Müller
  2020-05-19 20:23       ` Matthias Fischer
@ 2020-05-20 12:47       ` Michael Tremer
  1 sibling, 0 replies; 9+ messages in thread
From: Michael Tremer @ 2020-05-20 12:47 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2881 bytes --]

Hi,

Because it is the shortest path.

My system here has 192.168.190.1 on green0:

[root(a)fw01 ~]# ip route get 192.168.190.1
local 192.168.190.1 dev lo table local src 192.168.190.1 uid 0
    cache <local>

-Michael

> On 19 May 2020, at 14:06, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Hello Matthias, hello list,
> 
> why is that traffic passing through the loopback interface?!
> 
> Thanks, and best regards,
> Peter Müller
> 
>> Hi,
>> 
>> perhaps its only me, but after applying this patch for testing purposes
>> I don't see any (redirected) urlfilter block pages anymore.
>> 
>> Only the firewall logs are telling me:
>> 
>> ...
>> REJECT_INPUT lo TCP 192.168.100.254 53464 192.168.100.254 81
>> ...
>> 
>> I had to build a new "Incoming Firewall Access" rule (INPUTFW) allowing
>> TCP traffic from (e.g.) 192.168.100.254/32 to GREEN (192.168.100.254) to
>> TCP port 81 to see a block page again...
>> 
>> Only me?
>> 
>> Best,
>> Matthias
>> 
>> On 14.05.2020 12:36, Michael Tremer wrote:
>>> Hello,
>>> 
>>> This is indeed *very* unlikely, but I am okay with this patch being accepted.
>>> 
>>> Acked-by: Michael Tremer <michael.tremer(a)ipfire.org>
>>> 
>>> Best,
>>> -Michael
>>> 
>>>> On 13 May 2020, at 21:21, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>> 
>>>> This ensures traffic on the loopback interface matches the IPv4
>>>> loopback characteristics (source and destination are within 127.0.0.0/8)
>>>> and prevents any damage in the unlikely case of non-loopback traffic
>>>> being injected/emitted (in)to the loopback interface.
>>>> 
>>>> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
>>>> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>>> ---
>>>> src/initscripts/system/firewall | 6 +++---
>>>> 1 file changed, 3 insertions(+), 3 deletions(-)
>>>> 
>>>> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall
>>>> index 00512d9fa..409aaf7a9 100644
>>>> --- a/src/initscripts/system/firewall
>>>> +++ b/src/initscripts/system/firewall
>>>> @@ -219,10 +219,10 @@ iptables_init() {
>>>> 	iptables -A INPUT -j ICMPINPUT
>>>> 	iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT
>>>> 
>>>> -	# Accept everything on loopback
>>>> +	# Accept everything on loopback if both source and destination are within 127.0.0.0/8
>>>> 	iptables -N LOOPBACK
>>>> -	iptables -A LOOPBACK -i lo -j ACCEPT
>>>> -	iptables -A LOOPBACK -o lo -j ACCEPT
>>>> +	iptables -A LOOPBACK -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>> +	iptables -A LOOPBACK -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
>>>> 
>>>> 	# Filter all packets with loopback addresses on non-loopback interfaces.
>>>> 	iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP
>>>> -- 
>>>> 2.26.1
>>> 
>> 


^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2020-05-20 12:47 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-05-13 20:21 [PATCH] firewall: Accept traffic on loopback interface if source and destination are within 127.0.0.0/8 only Peter Müller
2020-05-14 10:36 ` Michael Tremer
2020-05-18 21:03   ` Matthias Fischer
2020-05-19  8:20     ` Michael Tremer
2020-05-19  8:21       ` Michael Tremer
2020-05-19  8:35         ` Matthias Fischer
2020-05-19 13:06     ` Peter Müller
2020-05-19 20:23       ` Matthias Fischer
2020-05-20 12:47       ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox