2.6 KiB
homemade_firewall
My own hand-made firewall learning project with nftables.
License
This program is licensed under the Affero GNU Public License v3, you can read the copy that comes along with this program or read it at gnu.org's website
Dependencies
The following is needed to setup this firewall:
- nftables
- make
- support for nftables, forwarding and conntrack in kernel
And the following to run the optional makeconf.sh script:
- bash version 4+
Because it makes use of bash arrays and integer variables introduced from that version onwards.
Usage
To use this firewall, you must first change the .nft
files to suit your setup.
Once you're satisfied, run: make makeconf
to generate your nftables.conf.
Run the following command before installing make test
so nftables can check for errors.
If there are no errors, you can install and run with make install
You can verify that your new rules are in place with nft list ruleset
To uninstall, run make uninstall
, which will replace the contents of /etc/nftables.conf
with the backup made at install-time and saved in backup.conf
.
Modifying .nft files
The following are guidelines for editing the .nft
files to your liking
defines.nft
In defines.nft
you can place your defines.
Every service under the TCP and UDP services comment should be placed in tcp and udp named sets.
Every service under the TCP only services comment should be placed in the tcp named set.
Services under the UDP only services comment should be placed in the udp named sets.
nat.nft
In nat.nft
you can place your nat table, chains and rules.
You don't need to include defines.nft
since it is included in filter.nft
filter.nft
In filter.nft
you can place your filter table, chains and rules.
This is the main file where you'll do most of your work.
Make sure you erase the ipv4_geo_blacklist
named set and rules related to it if you're not going to block country-wide IP ranges.
makeconf script
This script unifies the .nft
files into a single nftables.conf
file ready to be placed into /etc/nftables.conf
.
It replaces includes of local .nft
files with their contents into filter.nft
and saves it as nftables.conf
.
It also checks which countries you want to block by checking what files exist under /var/geoipsets/dbip/nftset/ipv4/*.ipv4
and places them into the ipv4_geo_blacklist
named set.
Bug-reporting
Try to register an account, wait to be approved and submit an issue. If I take too long to approve your account or I reject your application, you can send me an email at celsochan@disroot.org