Re: [Astlinux-users] Block DNS

2012-07-16 Thread David Kerr
If these are the only chains that are impacted by this problem then it sounds good. Will give us the flexibility we need. Thanks David On Mon, Jul 16, 2012 at 6:30 PM, Lonnie Abelbeck wrote: > Hi David, > > Well, I wouldn't necessarily call it a "dumb idea" :-) and I explained > Arno's reasoni

Re: [Astlinux-users] Block DNS

2012-07-16 Thread Lonnie Abelbeck
Hi David, Well, I wouldn't necessarily call it a "dumb idea" :-) and I explained Arno's reasoning years ago. I have commit privileges to the AIF SVN, so with Arno's approval we and implement any great idea we can come up with. One idea Arno and I had was to add 3 new variables to AIF: -- # (1

Re: [Astlinux-users] Block DNS

2012-07-16 Thread David Kerr
Oh dear, I opened a can of worms. I have to say that changing default behavior as a side effect of adding an allow rule feels like a dumb idea. How hard would it be for iptables to be modified such that a final default chain rule can be specified -- which could override a hard coded default rule f

Re: [Astlinux-users] Block DNS

2012-07-16 Thread Lonnie Abelbeck
Sigh, now I remember why we didn't previously support "Pass LAN->EXT" and "Pass DMZ->EXT" in the Firewall tab... First, my suggestion to David in this thread for using LAN_INET_HOST_OPEN_UDP does what you expect *but* has the side effect of changing the LAN->EXT default policy from ALLOW to DRO

Re: [Astlinux-users] Block DNS

2012-07-16 Thread Lonnie Abelbeck
David, Arno's Firewall (AIF) automatically places the "Pass LAN->EXT" rules (if any) before the "Deny LAN->EXT" rules. So, no ordering by the user is required. Lonnie On Jul 16, 2012, at 9:16 AM, David Kerr wrote: > When this is all implemented does it matter in what order the rules are > e

Re: [Astlinux-users] Block DNS

2012-07-16 Thread David Kerr
When this is all implemented does it matter in what order the rules are entered? For example if iptables comes across a deny that matches the request does it keep on going through the table looking for a rule that might never-the-less permit the request or does it stop -- in which case the rule pe

Re: [Astlinux-users] Block DNS

2012-07-16 Thread Lonnie Abelbeck
On Jul 16, 2012, at 2:53 AM, Michael Keuter wrote: > > Am 16.07.2012 um 01:39 schrieb Lonnie Abelbeck: > >> David, >> >> With the general DNS block in place... >> >> LAN_INET_HOST_OPEN_UDP="192.168.1.99>0/0~53" >> >> will allow the internal 192.168.1.99 device to access any external DNS >>

Re: [Astlinux-users] Block DNS

2012-07-16 Thread Michael Keuter
Am 16.07.2012 um 01:39 schrieb Lonnie Abelbeck: > David, > > With the general DNS block in place... > > LAN_INET_HOST_OPEN_UDP="192.168.1.99>0/0~53" > > will allow the internal 192.168.1.99 device to access any external DNS server. > > Lonnie > > PS: In the web interface we don't support "Pa

Re: [Astlinux-users] Block DNS

2012-07-15 Thread David Kerr
Thanks. Just what I needed. On Sun, Jul 15, 2012 at 7:39 PM, Lonnie Abelbeck wrote: > David, > > With the general DNS block in place... > > LAN_INET_HOST_OPEN_UDP="192.168.1.99>0/0~53" > > will allow the internal 192.168.1.99 device to access any external DNS > server. > > Lonnie > > PS: In the

Re: [Astlinux-users] Block DNS

2012-07-15 Thread Lonnie Abelbeck
David, With the general DNS block in place... LAN_INET_HOST_OPEN_UDP="192.168.1.99>0/0~53" will allow the internal 192.168.1.99 device to access any external DNS server. Lonnie PS: In the web interface we don't support "Pass LAN->EXT" rules, since that is the default policy and would seem con

Re: [Astlinux-users] Block DNS

2012-07-15 Thread David Kerr
Yes I agree. Of course since turning on blocking I find that I have a VoIP adapter that is remotely administered by "someone else" and it is pointing to a external DNS server. Fortunately the logs identified this. So I need to explicitly allow one internal IP to access an external DNS. David O

Re: [Astlinux-users] Block DNS

2012-07-15 Thread Lonnie Abelbeck
David, Yes, blocking is best, the "iptables -t nat -A PREROUTING" technique described only works with IPv4, plus those rules would get a *lot* of matches. Lonnie On Jul 15, 2012, at 5:11 PM, David Kerr wrote: > Thanks lonnie. Blocking port 53 is the simplest way to go I think. Googling > a

Re: [Astlinux-users] Block DNS

2012-07-15 Thread David Kerr
Thanks lonnie. Blocking port 53 is the simplest way to go I think. Googling also turns up... http://www.dd-wrt.com/wiki/index.php/OpenDNS Scroll down that page and you find a way to intercept all port 53 requests and send them somewhere else silently... so DNS requests satisfied, just not by th

Re: [Astlinux-users] Block DNS

2012-07-15 Thread Kristian Kielhofner
Off the top of my head you'd need a custom rule along the lines of: iptables -A FORWARD -i $INTIF -m udp -p udp --dport 53 -d 208.67.222.222 -j ACCEPT iptables -A FORWARD -i $INTIF -m udp -p udp --dport 53 -d 208.67.220.220 -j ACCEPT iptables -A FORWARD -i $INTIF -m udp -p udp --dport 53 -j REJECT

Re: [Astlinux-users] Block DNS

2012-07-15 Thread Lonnie Abelbeck
Hi David, From the Network -> Firewall tab Deny LAN->EXT TCP/UDP 0/0 0/0 53 <> This applies for both IPv4 and IPv6 if enabled. TCP is seldom used, but best to also block it. Now for the extra credit, :-), this can't be done via the Firewall tab, but if you also add the AIF variable to your

[Astlinux-users] Block DNS

2012-07-15 Thread David Kerr
So, the OpenDNS was mentioned on this list a few days ago. I use this service and the mention on this list prompted me to check my settings to make sure that I was still appropriately blocking access to web site categories. And it started me thinking... it would be easy for a savvy user to reconf