mirror of
https://github.com/mdlayher/homelab.git
synced 2024-12-15 17:50:54 +00:00
ead678a51f
Signed-off-by: Matt Layher <mdlayher@gmail.com>
326 lines
9 KiB
Nix
326 lines
9 KiB
Nix
{ lib, ... }:
|
|
|
|
let
|
|
vars = import ./lib/vars.nix;
|
|
|
|
# Port definitions.
|
|
ports = {
|
|
dns = "53";
|
|
dhcp4_server = "67";
|
|
dhcp4_client = "68";
|
|
dhcp6_client = "546";
|
|
dhcp6_server = "547";
|
|
http = "80";
|
|
https = "443";
|
|
imaps = "993";
|
|
mdns = "5353";
|
|
ntp = "123";
|
|
pop3s = "995";
|
|
plex = "32400";
|
|
smtp = "587";
|
|
ssh = "22";
|
|
wireguard = "51820";
|
|
};
|
|
|
|
# Produces a CSV list of interface names.
|
|
mkCSV = lib.concatMapStrings (ifi: "${ifi.name}, ");
|
|
|
|
# WAN interface.
|
|
wan0 = vars.interfaces.wan0.name;
|
|
|
|
# LAN interfaces, segmented into trusted, limited, and untrusted groups.
|
|
trusted_lans = with vars.interfaces; [ enp2s0 lan0 lab0 tengb0 wg0 ];
|
|
limited_lans = [ vars.interfaces.guest0 ];
|
|
untrusted_lans = [ vars.interfaces.iot0 ];
|
|
|
|
# ICMP filtering.
|
|
icmp_rules = ''
|
|
ip6 nexthdr icmpv6 icmpv6 type {
|
|
echo-request,
|
|
destination-unreachable,
|
|
packet-too-big,
|
|
time-exceeded,
|
|
parameter-problem,
|
|
nd-neighbor-solicit,
|
|
nd-neighbor-advert,
|
|
} counter accept
|
|
|
|
ip protocol icmp icmp type {
|
|
echo-request,
|
|
destination-unreachable,
|
|
time-exceeded,
|
|
parameter-problem,
|
|
} counter accept
|
|
'';
|
|
|
|
in {
|
|
networking.nftables = {
|
|
enable = true;
|
|
ruleset = ''
|
|
table inet filter {
|
|
# Incoming connections to router itself.
|
|
chain input {
|
|
type filter hook input priority 0
|
|
policy drop
|
|
|
|
ct state {established, related} counter accept
|
|
ct state invalid counter drop
|
|
|
|
# Malicious subnets.
|
|
ip saddr {
|
|
49.64.0.0/11,
|
|
218.92.0.0/16,
|
|
222.184.0.0/13,
|
|
} counter drop comment "malicious subnets"
|
|
|
|
# ICMPv4/6.
|
|
${icmp_rules}
|
|
|
|
# Allow WAN to selectively communicate with the router.
|
|
iifname ${wan0} jump input_wan
|
|
|
|
# Always allow router solicitation from any LAN.
|
|
ip6 nexthdr icmpv6 icmpv6 type nd-router-solicit counter accept
|
|
|
|
# Allow localhost and trusted LANs to communicate with router.
|
|
iifname {
|
|
lo,
|
|
${mkCSV trusted_lans}
|
|
} counter accept comment "localhost and trusted LANs to router"
|
|
|
|
# Limit the communication abilities of limited and untrusted LANs.
|
|
iifname {
|
|
${mkCSV limited_lans}
|
|
${mkCSV untrusted_lans}
|
|
} jump input_limited_untrusted
|
|
|
|
counter reject
|
|
}
|
|
|
|
chain input_wan {
|
|
# Default route via NDP.
|
|
ip6 nexthdr icmpv6 icmpv6 type nd-router-advert counter accept
|
|
|
|
# router TCP
|
|
tcp dport {
|
|
${ports.http},
|
|
${ports.https},
|
|
${ports.ssh},
|
|
} counter accept comment "router WAN TCP"
|
|
|
|
# router UDP
|
|
udp dport {
|
|
${ports.wireguard},
|
|
} counter accept comment "router WAN UDP"
|
|
|
|
# router DHCPv6 client
|
|
ip6 daddr fe80::/64 udp dport ${ports.dhcp6_client} udp sport ${ports.dhcp6_server} counter accept comment "router WAN DHCPv6"
|
|
|
|
counter reject
|
|
}
|
|
|
|
chain input_limited_untrusted {
|
|
# Handle some services early due to need for multicast/broadcast.
|
|
udp dport ${ports.dhcp4_server} udp sport ${ports.dhcp4_client} counter accept comment "router untrusted DHCPv4"
|
|
|
|
udp dport ${ports.mdns} udp sport ${ports.mdns} counter accept comment "router untrusted mDNS"
|
|
|
|
# Drop traffic trying to cross VLANs or broadcast.
|
|
${
|
|
lib.concatMapStrings (ifi: ''
|
|
iifname ${ifi.name} ip daddr != ${ifi.ipv4} counter drop comment "${ifi.name} traffic leaving IPv4 VLAN"
|
|
|
|
iifname ${ifi.name} ip6 daddr != {
|
|
${ifi.ipv6.lla},
|
|
${ifi.ipv6.ula},
|
|
} counter drop comment "${ifi.name} traffic leaving IPv6 VLAN"
|
|
'') (limited_lans ++ untrusted_lans)
|
|
}
|
|
|
|
# Allow only necessary router-provided services.
|
|
tcp dport {
|
|
${ports.dns},
|
|
} counter accept comment "router untrusted TCP"
|
|
|
|
udp dport {
|
|
${ports.dns},
|
|
} counter accept comment "router untrusted UDP"
|
|
|
|
counter drop
|
|
}
|
|
|
|
chain output {
|
|
type filter hook output priority 0
|
|
policy accept
|
|
|
|
# Generally allow all outgoing router connections, except in cases
|
|
# where software does not provide fine-grained control over traffic.
|
|
|
|
counter accept
|
|
}
|
|
|
|
chain forward {
|
|
type filter hook forward priority 0
|
|
policy drop
|
|
|
|
# Untrusted/limited LANs to trusted LANs.
|
|
iifname {
|
|
${mkCSV limited_lans}
|
|
${mkCSV untrusted_lans}
|
|
} oifname {
|
|
${mkCSV trusted_lans}
|
|
} jump forward_limited_untrusted_lan_trusted_lan
|
|
|
|
# We still want to allow limited/untrusted LANs to have working ICMP
|
|
# to the internet as a whole, just not to any trusted LANs.
|
|
${icmp_rules}
|
|
|
|
# Forwarding between different interface groups.
|
|
|
|
# Trusted source LANs.
|
|
iifname {
|
|
${mkCSV trusted_lans}
|
|
} oifname ${wan0} counter accept comment "Allow trusted LANs to WAN";
|
|
|
|
iifname {
|
|
${mkCSV trusted_lans}
|
|
} oifname {
|
|
${mkCSV trusted_lans},
|
|
${mkCSV limited_lans},
|
|
${mkCSV untrusted_lans},
|
|
} counter accept comment "Allow trusted LANs to reach all LANs";
|
|
|
|
# Limited/guest LANs to WAN.
|
|
iifname {
|
|
${mkCSV limited_lans}
|
|
} oifname ${wan0} jump forward_limited_lan_wan
|
|
|
|
# Untrusted LANs to WAN.
|
|
iifname {
|
|
${mkCSV untrusted_lans}
|
|
} oifname ${wan0} jump forward_untrusted_lan_wan
|
|
|
|
# WAN to trusted LANs.
|
|
iifname ${wan0} oifname {
|
|
${mkCSV trusted_lans}
|
|
} jump forward_wan_trusted_lan
|
|
|
|
# WAN to limited/untrusted LANs.
|
|
iifname ${wan0} oifname {
|
|
${mkCSV limited_lans}
|
|
${mkCSV untrusted_lans}
|
|
} jump forward_wan_limited_untrusted_lan
|
|
|
|
counter reject
|
|
}
|
|
|
|
chain forward_limited_lan_wan {
|
|
# Forward typical network services.
|
|
|
|
tcp dport {
|
|
${ports.dns},
|
|
${ports.http},
|
|
${ports.https},
|
|
${ports.imaps},
|
|
${ports.pop3s},
|
|
${ports.smtp},
|
|
${ports.ssh},
|
|
} counter accept comment "limited TCP"
|
|
|
|
udp dport {
|
|
${ports.dns},
|
|
${ports.ntp},
|
|
${ports.wireguard},
|
|
} counter accept comment "limited UDP"
|
|
|
|
counter drop
|
|
}
|
|
|
|
chain forward_untrusted_lan_wan {
|
|
# Forward only necessary internet services.
|
|
tcp dport {
|
|
${ports.http},
|
|
${ports.https},
|
|
} counter accept comment "untrusted TCP HTTP(S)"
|
|
|
|
counter drop
|
|
}
|
|
|
|
chain forward_limited_untrusted_lan_trusted_lan {
|
|
# Only allow established connections from trusted LANs.
|
|
ct state {established, related} counter accept
|
|
ct state invalid counter drop
|
|
|
|
counter drop
|
|
}
|
|
|
|
chain forward_wan_trusted_lan {
|
|
ct state {established, related} counter accept
|
|
ct state invalid counter drop
|
|
|
|
# SSH for internal machines.
|
|
ip6 daddr {
|
|
${
|
|
lib.concatMapStrings (host: "${host.ipv6.gua}, ")
|
|
vars.hosts.servers
|
|
}
|
|
} tcp dport ${ports.ssh} counter accept comment "IPv6 SSH"
|
|
|
|
# Plex running on server.
|
|
ip daddr ${vars.server_ipv4} tcp dport ${ports.plex} counter accept comment "server IPv4 Plex"
|
|
ip6 daddr ${vars.server_ipv6} tcp dport ${ports.plex} counter accept comment "server IPv6 Plex"
|
|
|
|
# Streaming RTP6 on desktop.
|
|
ip6 daddr ${vars.desktop_ipv6} udp dport 5000-5007 counter accept comment "desktop IPv6 RTP"
|
|
|
|
counter reject
|
|
}
|
|
|
|
chain forward_wan_limited_untrusted_lan {
|
|
ct state {established, related} counter accept
|
|
ct state invalid counter drop
|
|
|
|
counter reject
|
|
}
|
|
}
|
|
|
|
table ip nat {
|
|
chain prerouting {
|
|
type nat hook prerouting priority 0
|
|
|
|
iifname ${wan0} jump prerouting_wan0
|
|
accept
|
|
}
|
|
|
|
chain prerouting_wan0 {
|
|
tcp dport {
|
|
${ports.plex},
|
|
} dnat ${vars.server_ipv4} comment "server TCPv4 DNAT"
|
|
|
|
udp dport {
|
|
${ports.dns},
|
|
} redirect to ${ports.wireguard} comment "router IPv4 WireGuard DNAT"
|
|
|
|
accept
|
|
}
|
|
|
|
chain postrouting {
|
|
type nat hook postrouting priority 0
|
|
oifname ${wan0} masquerade
|
|
}
|
|
}
|
|
|
|
table ip6 nat {
|
|
chain prerouting {
|
|
type nat hook prerouting priority 0
|
|
|
|
iifname ${wan0} udp dport {
|
|
${ports.dns},
|
|
} redirect to ${ports.wireguard} comment "router IPv6 WireGuard DNAT"
|
|
|
|
accept
|
|
}
|
|
}
|
|
'';
|
|
};
|
|
}
|