2023-06-18 16:40:16 +00:00
|
|
|
let
|
2025-02-10 21:55:08 +00:00
|
|
|
drop = expr: "${expr} drop";
|
|
|
|
accept = expr: "${expr} accept";
|
2023-06-18 16:40:16 +00:00
|
|
|
mcast-scope = 8;
|
2023-06-18 21:18:44 +00:00
|
|
|
allow-incoming = false;
|
2023-06-18 16:40:16 +00:00
|
|
|
bogons-ip6 = {
|
|
|
|
type = "filter";
|
|
|
|
family = "ip6";
|
|
|
|
rules = [
|
2023-06-18 21:18:44 +00:00
|
|
|
(drop "ip6 saddr ff00::/8") # multicast saddr is illegal
|
2023-06-18 16:40:16 +00:00
|
|
|
|
2023-06-18 21:18:44 +00:00
|
|
|
(drop "ip6 saddr ::/128") # unspecified address
|
|
|
|
(drop "ip6 daddr ::/128")
|
|
|
|
(drop "ip6 saddr 2001:db8::/32") # documentation addresses
|
|
|
|
(drop "ip6 daddr 2001:db8::/32")
|
2023-06-18 16:40:16 +00:00
|
|
|
|
|
|
|
# I think this means "check FIB for (saddr, iif) to see if we
|
|
|
|
# could route a packet to that address using that interface",
|
|
|
|
# and if we can't then it was an inapproppriate source address
|
|
|
|
# for packets received _from_ said interface
|
|
|
|
(drop "fib saddr . iif oif eq 0")
|
|
|
|
|
|
|
|
(drop "icmpv6 type router-renumbering")
|
|
|
|
(drop "icmpv6 type 139") # Node Information Query
|
|
|
|
(drop "icmpv6 type 140") # Node Information Response
|
|
|
|
(drop "icmpv6 type 100")
|
|
|
|
(drop "icmpv6 type 101")
|
|
|
|
(drop "icmpv6 type 200")
|
|
|
|
(drop "icmpv6 type 201")
|
|
|
|
(drop "icmpv6 type 127")
|
|
|
|
(drop "icmpv6 type 255")
|
|
|
|
(drop "icmpv6 type destination-unreachable ct state invalid,untracked")
|
|
|
|
];
|
|
|
|
};
|
|
|
|
forward-ip6 = {
|
|
|
|
type = "filter";
|
|
|
|
family = "ip6";
|
|
|
|
policy = "drop";
|
|
|
|
hook = "forward";
|
|
|
|
rules = [
|
|
|
|
"jump bogons-ip6"
|
2023-06-18 21:18:44 +00:00
|
|
|
(drop "ip6 saddr ::1/128") # loopback address [RFC4291]
|
|
|
|
(drop "ip6 daddr ::1/128")
|
2025-02-10 21:55:08 +00:00
|
|
|
(drop "ip6 saddr ::FFFF:0:0/96") # IPv4-mapped addresses
|
2023-06-18 21:18:44 +00:00
|
|
|
(drop "ip6 daddr ::FFFF:0:0/96")
|
|
|
|
(drop "ip6 saddr fe80::/10") # link-local unicast
|
|
|
|
(drop "ip6 daddr fe80::/10")
|
|
|
|
(drop "ip6 saddr fc00::/7") # unique-local addresses
|
|
|
|
(drop "ip6 daddr fc00::/7")
|
|
|
|
(drop "ip6 saddr 2001:10::/28") # ORCHID [RFC4843].
|
|
|
|
(drop "ip6 daddr 2001:10::/28")
|
2023-06-18 16:40:16 +00:00
|
|
|
|
2023-06-18 21:18:44 +00:00
|
|
|
(drop "ip6 saddr fc00::/7") # unique local source
|
|
|
|
(drop "ip6 daddr fc00::/7") # and/or dst addresses [RFC4193]
|
2023-06-18 16:40:16 +00:00
|
|
|
|
|
|
|
# multicast with wrong scopes
|
|
|
|
(drop
|
|
|
|
# dest addr first byte 0xff, low nibble of second byte <= scope
|
|
|
|
# https://www.mankier.com/8/nft#Payload_Expressions-Raw_Payload_Expression
|
2025-02-10 21:55:08 +00:00
|
|
|
"@nh,192,8 eq 0xff @nh,204,4 le ${toString mcast-scope}"
|
|
|
|
)
|
2023-06-18 16:40:16 +00:00
|
|
|
|
|
|
|
(accept "oifname \"int\" iifname \"ppp0\" meta l4proto udp ct state established,related")
|
|
|
|
(accept "iifname \"int\" oifname \"ppp0\" meta l4proto udp")
|
|
|
|
|
2023-06-18 21:18:44 +00:00
|
|
|
(accept "meta l4proto icmpv6")
|
|
|
|
(accept "meta l4proto ah")
|
|
|
|
(accept "meta l4proto esp")
|
|
|
|
|
|
|
|
# does this ever get used or does the preceding general udp accept
|
|
|
|
# already grab anything that might get here?
|
|
|
|
(accept "oifname \"ppp0\" udp dport 500") # IKE Protocol [RFC5996]. haha zyxel
|
2023-06-18 16:40:16 +00:00
|
|
|
(accept "ip6 nexthdr hip")
|
|
|
|
|
|
|
|
## FIXME no support yet for recs 27-30 Mobility Header
|
|
|
|
|
|
|
|
(accept "oifname \"int\" iifname \"ppp0\" meta l4proto tcp ct state established,related")
|
|
|
|
(accept "iifname \"int\" oifname \"ppp0\" meta l4proto tcp")
|
|
|
|
|
|
|
|
(accept "oifname \"int\" iifname \"ppp0\" meta l4proto sctp ct state established,related")
|
|
|
|
(accept "iifname \"int\" oifname \"ppp0\" meta l4proto sctp")
|
|
|
|
|
|
|
|
(accept "oifname \"int\" iifname \"ppp0\" meta l4proto dccp ct state established,related")
|
|
|
|
(accept "iifname \"int\" oifname \"ppp0\" meta l4proto dccp")
|
|
|
|
|
|
|
|
# we can allow all reasonable inbound, or we can use an explicit
|
|
|
|
# allowlist to enumerate the endpoints that are allowed to
|
|
|
|
# accept inbound from the WAN
|
2025-02-10 21:55:08 +00:00
|
|
|
(
|
|
|
|
if allow-incoming then
|
|
|
|
accept "oifname \"int\" iifname \"ppp0\""
|
|
|
|
else
|
|
|
|
"oifname \"int\" iifname \"ppp0\" jump incoming-allowed-ip6"
|
2023-06-18 16:40:16 +00:00
|
|
|
)
|
|
|
|
# allow all outbound and any inbound that's part of a
|
|
|
|
# recognised (outbound-initiated) flow
|
2023-06-18 21:18:44 +00:00
|
|
|
(accept "oifname \"int\" iifname \"ppp0\" ct state established,related")
|
2023-06-18 16:40:16 +00:00
|
|
|
(accept "iifname \"int\" oifname \"ppp0\" ")
|
|
|
|
];
|
|
|
|
};
|
|
|
|
input-ip6 = {
|
|
|
|
type = "filter";
|
|
|
|
family = "ip6";
|
|
|
|
policy = "drop";
|
|
|
|
hook = "input";
|
|
|
|
rules = [
|
|
|
|
"jump bogons-ip6"
|
2023-06-18 21:18:44 +00:00
|
|
|
(accept "meta l4proto icmpv6")
|
2025-02-10 21:55:08 +00:00
|
|
|
(
|
|
|
|
if allow-incoming then
|
|
|
|
accept "oifname \"int\" iifname \"ppp0\""
|
|
|
|
else
|
|
|
|
"oifname \"int\" iifname \"ppp0\" jump incoming-allowed-ip6"
|
2023-06-18 16:40:16 +00:00
|
|
|
)
|
|
|
|
(accept "oifname \"int\" iifname \"ppp0\" ct state established,related")
|
|
|
|
(accept "iifname \"int\" oifname \"ppp0\" ")
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
incoming-allowed-ip6 = {
|
|
|
|
type = "filter";
|
|
|
|
family = "ip6";
|
|
|
|
rules = [
|
2023-06-18 21:18:44 +00:00
|
|
|
"oifname \"int\" ip6 daddr 2001:8b0:de3a:40de::e9d tcp dport 22"
|
2023-06-18 16:40:16 +00:00
|
|
|
];
|
|
|
|
};
|
2025-02-10 21:55:08 +00:00
|
|
|
in
|
|
|
|
{
|
|
|
|
inherit
|
|
|
|
input-ip6
|
|
|
|
forward-ip6
|
|
|
|
bogons-ip6
|
|
|
|
incoming-allowed-ip6
|
|
|
|
;
|
2025-02-03 20:46:22 +00:00
|
|
|
lan-set-ip = {
|
|
|
|
kind = "set";
|
|
|
|
family = "ip";
|
|
|
|
type = "ifname";
|
|
|
|
elements = [
|
2025-02-10 21:55:08 +00:00
|
|
|
"eth0"
|
|
|
|
"eth1"
|
2025-02-03 20:46:22 +00:00
|
|
|
];
|
|
|
|
|
|
|
|
};
|
|
|
|
# honours timeout flags gc-interval size policy counter auto-merge
|
|
|
|
lan-set-ip6 = {
|
|
|
|
kind = "set";
|
|
|
|
family = "ip6";
|
|
|
|
type = "ifname";
|
|
|
|
elements = [
|
2025-02-10 21:55:08 +00:00
|
|
|
"eth0"
|
|
|
|
"eth1"
|
2025-02-03 20:46:22 +00:00
|
|
|
];
|
|
|
|
|
|
|
|
};
|
2023-06-18 16:40:16 +00:00
|
|
|
}
|