Differences between revisions 15 and 16
Revision 15 as of 2017-01-07 20:51:16
Size: 8028
Comment: updated services enabled by default
Revision 16 as of 2017-01-07 20:54:21
Size: 8028
Comment: update statuses shown in plinth
Deletions are marked like this. Additions are marked like this.
Line 23: Line 23:
|| JSXC || 80/tcp || {*} || {X} || (./) || {X} ||
|| JSXC || 443/tcp || {*} || {X} || (./) || {X} ||
|| JSXC || 80/tcp || {*} || {X} || {X} || {X} ||
|| JSXC || 443/tcp || {*} || {X} || {X} || {X} ||
Line 26: Line 26:
|| Tor (Socks) || 9050/tcp || {o} || {X} || {X} || {X} ||
|| NTP || 123/udp || {o} || (./) || {X}      || {X} ||
|| Tor (Socks) || 9050/tcp || {o} || {X} || (./) || {X} ||
|| NTP || 123/udp || {o} || (./) || (./) || {X} ||
Line 30: Line 30:
|| mDNS || 5353/udp || {o} || (./) || {X} || {X} || || mDNS || 5353/udp || {o} || (./) || (./) || {X} ||
Line 38: Line 38:
|| OpenVPN || 1194/udp || {*} || {X} || {X} || {X} ||
|| Privoxy || 8118/tcp || {o} || {X} || {X} || {X} ||
|| OpenVPN || 1194/udp || {*} || {X} || (./) || {X} ||
|| Privoxy || 8118/tcp || {o} || {X} || (./) || {X} ||
Line 43: Line 43:
|| Obfsproxy || <random>/tcp || {*} || {X} || {X} || {X} || || Obfsproxy || <random>/tcp || {*} || {X} || (./) || {X} ||

Firewall

Firewall is a network security system that controls the incoming and outgoing network traffic. Keeping a firewall enabled and properly configured reduces risk of security threat from the Internet.

The operation of the firewall in Plinth web interface of FreedomBox is automatic. When you enable a service it is automatically permitted in the firewall and when you disable a service it is automatically disabled in the firewall. For services which are enabled by default on FreedomBox, firewall ports are also enabled by default during the first run process.

Firewall management in FreedomBox is done using FirewallD.

Interfaces

Each interface is needs to be assigned to one (and only one) zone. Whatever rules are in effect for a zone, those rules start to apply for that interface. For example, if HTTP traffic is allowed in a particular zone, then web requests will be accepted on all the addresses configured for all the interfaces assigned to that zone.

There are primarily two firewall zones used. The internal zone is meant for services that are provided to all machines on the local network. This may include services such as streaming media and simple file sharing. The external zone is meant for services that are provided publicly on the Internet. This may include services such as blog, website, email web client etc.

For details on how network interfaces are configured by default, see the Networks section.

Ports/Services

The following table attempts to document the ports, services and their default statuses in FreedomBox. If you find this page outdated, see the Plinth source for lib/freedombox/first-run.d/90_firewall and Firewall status page in Plinth UI.

Service

Port

External

Enabled by default

Status shown in Plinth

Managed by Plinth

SSH

22/tcp

{*}

(./)

(./)

{X}

JSXC

80/tcp

{*}

{X}

{X}

{X}

JSXC

443/tcp

{*}

{X}

{X}

{X}

Plinth

443/tcp

{*}

(./)

(./)

{X}

Tor (Socks)

9050/tcp

{o}

{X}

(./)

{X}

NTP

123/udp

{o}

(./)

(./)

{X}

DNS

53/tcp

{o}

{X}

{X}

{X}

DNS

53/tdp

{o}

{X}

{X}

{X}

mDNS

5353/udp

{o}

(./)

(./)

{X}

DHCP

67/udp

{o}

(./)

{X}

{X}

Bootp

67/tcp

{o}

{X}

{X}

{X}

Bootp

67/udp

{o}

{X}

{X}

{X}

Bootp

68/tcp

{o}

{X}

{X}

{X}

Bootp

68/udp

{o}

{X}

{X}

{X}

LDAP

389/tcp

{o}

{X}

{X}

{X}

LDAPS

636/tcp

{o}

{X}

{X}

{X}

OpenVPN

1194/udp

{*}

{X}

(./)

{X}

Privoxy

8118/tcp

{o}

{X}

(./)

{X}

XMPP Server

5269/tcp

{*}

{X}

(./)

{X}

XMPP Client

5222/tcp

{*}

{X}

(./)

{X}

XMPP Bosh

5280/tcp

{*}

{X}

(./)

{X}

Obfsproxy

<random>/tcp

{*}

{X}

(./)

{X}

Manual operation

See FirewallD documentation for more information on the basic concepts and comprehensive documentation.

Enable/disable firewall

To disable firewall

service firewalld stop

or with systemd

systemctl stop firewalld

To re-enable firewall

service firewalld start

or with systemd

systemctl start firewalld

Modifying services/ports

You can manually add or remove a service from a zone.

To see list of services enabled:

firewall-cmd --zone=<zone> --list-services

Example:

firewall-cmd --zone=internal --list-services

To see list of ports enabled:

firewall-cmd --zone=<zone> --list-ports

Example:

firewall-cmd --zone=internal --list-ports

To remove a service from a zone:

firewall-cmd --zone=<zone> --remove-service=<service>
firewall-cmd --permanent --zone=<zone> --remove-service=<interface>

Example:

firewall-cmd --zone=internal --remove-service=xmpp-bosh
firewall-cmd --permanent --zone=internal --remove-service=xmpp-bosh

To remove a port from a zone:

firewall-cmd --zone=internal --remove-port=<port>/<protocol>
firewall-cmd --permanent --zone=internal --remove-port=<port>/<protocol>

Example:

firewall-cmd --zone=internal --remove-port=5353/udp
firewall-cmd --permanent --zone=internal --remove-port=5353/udp

To add a service to a zone:

firewall-cmd --zone=<zone> --add-service=<service>
firewall-cmd --permanent --zone=<zone> --add-service=<interface>

Example:

firewall-cmd --zone=internal --add-service=xmpp-bosh
firewall-cmd --permanent --zone=internal --add-service=xmpp-bosh

To add a port to a zone:

firewall-cmd --zone=internal --add-port=<port>/<protocol>
firewall-cmd --permanent --zone=internal --add-port=<port>/<protocol>

Example:

firewall-cmd --zone=internal --add-port=5353/udp
firewall-cmd --permanent --zone=internal --add-port=5353/udp

Modifying the zone of interfaces

You can manually change the assignment of zones of each interfaces after they have been autuomatically assigned by the first boot process.

To see current assignment of interfaces to zones:

firewall-cmd --list-all-zones

To remove an interface from a zone:

firewall-cmd --zone=<zone> --remove-interface=<interface>
firewall-cmd --permanent --zone=<zone> --remove-interface=<interface>

Example:

firewall-cmd --zone=external --remove-interface=eth0
firewall-cmd --permanent --zone=external --remove-interface=eth0

To add an interface to a zone:

firewall-cmd --zone=<zone> --add-interface=<interface>
firewall-cmd --permanent --zone=<zone> --add-interface=<interface>

Example:

firewall-cmd --zone=internal --add-interface=eth0
firewall-cmd --permanent --zone=internal --add-interface=eth0


Intro

Information

Support

Contribute

Reports

Promote

Vision

Hardware

Live Help

Where To Start

Translate

Calls

Talks

Overview

Download

Q&A

To Do

Design

Releases

Press

Features

Manual

Contributors

Code

Blog

FreedomBox for Communities

FreedomBox Developer Manual

HELP & DISCUSSIONS: Discussion Forum - Matrix - Mailing List - #freedombox irc.debian.org | CONTACT Foundation | JOIN Project

Next call: Saturday, April 13 at 14:00 UTC

This page is copyright its contributors and is licensed under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.


CategoryFreedomBox