It might be a fun idea to share what a really locked down desktop system
pf.conf would look like like if you are running a chain of DNS services (or
something that would be good to tightly control) like local ntpd, unbound,
and dnscrypt_proxy where you have local traffic locked down as well so that
an aberrant process or even root cannot connect to the local ports and
services eg.

pass out quick on lo0 proto {tcp, udp} from self to any port 53 user
{peter, _ntpd}

block out log quick on lo0 proto {tcp, udp} from self to any port 53


pass in quick on lo0 proto {tcp, udp} from any to self port 53 user _unbound

block in log quick on lo0 proto {tcp, udp} from any to self port 53



pass out quick on lo0 proto {tcp, udp} from self to any port 40 user
_unbound

block out log quick on lo0 proto {tcp, udp} from self to any port 40


pass in quick on lo0 proto {tcp, udp} from any to self port 40 user
_dnscrypt_proxy

block in log quick on lo0 proto {tcp, udp} from any to self port 40


pass out quick on egress proto {tcp, udp} from self to any port 53  user
_dnscrypt_proxy

block out log quick on egress proto {tcp, udp} from self to any port 53

Maybe there is a similar case that can be made, possibly with a reverse
http proxy setup that would make more sense for security in the case that a
vulnerability is discovered.

Reply via email to