On 02/22/2018 05:39 PM, Spyros Stathopoulos wrote:
> Greetings,
> I am facing what I initially thought to be a simple matter however it is
> now troubling me more than it should.
> 
> I have setup shorewall to a pretty much standard Two-Interface
> configuration [0]. My LAN is 10.0.1.0/24. As per the guide I have
> defined three zones, net, loc and fw and as it is packets flow freely
> within the LAN. Now, I have a specific device within my network (for
> instance 10.0.1.99) to which I would like to restrict access. The idea
> is to limit access to 10.0.1.99 only from a specific computer within my
> LAN ideally identified by MAC address. As there is no access control
> from the device itself I can only limit the connection from shorewall.
> Initially I intuitively added a simple DROP loc loc:10.0.1.99 rule to
> /etc/shorewall/rules to gauge whether the connection to 10.0.1.99 is
> actually dropped. Perhaps slightly to my surprise I found out that this
> is not working as I thought and 10.0.1.99 is accessible from all hosts
> from within the LAN.
> 
> Then I tried to follow this guide [1] to define a "subzone" (the
> specific requirements bit) including only 10.0.1.99/32. So I added (eth1
> is the LAN-facing interface)
> 
> "dev  eth1:10.0.1.99/32  broadcast" to /etc/shorewall/hosts,
> 
> "dev:loc ipv4" to /etc/shorewall/zones and
> 
> dev  loc  NONE
> loc  dev  NONE
> 
> to /etc/shorewall/policy.
> 
> Then I added the same DROP rule to /etc/shorewall/rules yet once again
> 10.0.1.99 remains accessible from all hosts from within the LAN. Same
> were the results when defaulting the dev<->loc policy to DROP.
> 
> At this point I'm out of ideas so I turned to the mailing list for help.
> It is indeed entirely possible that my question is trivial and I'm
> missing something fundamental so in that case I apologise in advance.
> 
> I am using shorewall{,6,-core} v5.1.8 on Alpine Linux (kernel 4.9.65).
> 
> [0]: http://shorewall.org/two-interface.htm
> [1]: http://shorewall.org/Multiple_Zones.html
> 

The value in defining multiple zones within a LAN is to define different
rules/policies to/from the LAN. Because intra-LAN traffic within a
subnet does not pass through the Shorewall system, rules and policies on
that system are ineffective in controlling intra-LAN traffic. If
different disjoint subnets are defined, traffic between the subnets does
go through the Shorewall system, but such a setup is easily bypassed by
LAN users who have administrative privileges on their systems. The best
way to accomplish what you want is via firewall rules on 10.0.1.99 itself.

-Tom
-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't
http://shorewall.org \   understand
                      \_______________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to