add baseline nftables configurations

This commit is contained in:
Daniel Micay 2022-06-29 10:53:07 -04:00
parent 52d67a3085
commit 3ca0c347c6
6 changed files with 315 additions and 0 deletions

52
nftables-attestation.conf Normal file
View File

@ -0,0 +1,52 @@
#!/usr/bin/nft -f
flush ruleset
table inet filter {
chain prerouting-raw {
type filter hook prerouting priority raw
iif lo notrack
tcp dport {ssh, http, https} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain output-raw {
type filter hook output priority raw
oif lo notrack
tcp sport {ssh, http, https} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain input {
type filter hook input priority filter
policy drop
iif lo accept
tcp dport {ssh, http, https} accept
ip protocol icmp accept
meta l4proto ipv6-icmp accept
ct state vmap { invalid : drop, established : accept, related : accept }
meta l4proto udp reject
meta l4proto tcp reject with tcp reset
reject
}
chain forward {
type filter hook forward priority filter
policy drop
}
chain output {
type filter hook output priority filter
oif lo accept
skuid != {root, systemd-network, chrony, unbound, http, attestation} counter reject
}
}

52
nftables-discuss.conf Normal file
View File

@ -0,0 +1,52 @@
#!/usr/bin/nft -f
flush ruleset
table inet filter {
chain prerouting-raw {
type filter hook prerouting priority raw
iif lo notrack
tcp dport {ssh, http, https} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain output-raw {
type filter hook output priority raw
oif lo notrack
tcp sport {ssh, http, https} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain input {
type filter hook input priority filter
policy drop
iif lo accept
tcp dport {ssh, http, https} accept
ip protocol icmp accept
meta l4proto ipv6-icmp accept
ct state vmap { invalid : drop, established : accept, related : accept }
meta l4proto udp reject
meta l4proto tcp reject with tcp reset
reject
}
chain forward {
type filter hook forward priority filter
policy drop
}
chain output {
type filter hook output priority filter
oif lo accept
skuid != {root, systemd-network, chrony, unbound, http, flarum} counter reject
}
}

55
nftables-dns.conf Normal file
View File

@ -0,0 +1,55 @@
#!/usr/bin/nft -f
flush ruleset
table inet filter {
chain prerouting-raw {
type filter hook prerouting priority raw
iif lo notrack
udp dport domain notrack
tcp dport {ssh, domain} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain output-raw {
type filter hook output priority raw
oif lo notrack
udp sport domain notrack
tcp sport {ssh, domain} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain input {
type filter hook input priority filter
policy drop
iif lo accept
udp dport domain accept
tcp dport {ssh, domain} accept
ip protocol icmp accept
meta l4proto ipv6-icmp accept
ct state vmap { invalid : drop, established : accept, related : accept }
meta l4proto udp reject
meta l4proto tcp reject with tcp reset
reject
}
chain forward {
type filter hook forward priority filter
policy drop
}
chain output {
type filter hook output priority filter
oif lo accept
skuid != {root, systemd-network, chrony, unbound, powerdns} counter reject
}
}

52
nftables-mail.conf Normal file
View File

@ -0,0 +1,52 @@
#!/usr/bin/nft -f
flush ruleset
table inet filter {
chain prerouting-raw {
type filter hook prerouting priority raw
iif lo notrack
tcp dport {ssh, smtp, http, submissions, imaps} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain output-raw {
type filter hook output priority raw
oif lo notrack
tcp sport {ssh, smtp, http, submissions, imaps} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain input {
type filter hook input priority filter
policy drop
iif lo accept
tcp dport {ssh, smtp, http, submissions, imaps} accept
ip protocol icmp accept
meta l4proto ipv6-icmp accept
ct state vmap { invalid : drop, established : accept, related : accept }
meta l4proto udp reject
meta l4proto tcp reject with tcp reset
reject
}
chain forward {
type filter hook forward priority filter
policy drop
}
chain output {
type filter hook output priority filter
oif lo accept
skuid != {root, systemd-network, chrony, unbound, postfix, dovecot, dovenull} counter reject
}
}

52
nftables-matrix.conf Normal file
View File

@ -0,0 +1,52 @@
#!/usr/bin/nft -f
flush ruleset
table inet filter {
chain prerouting-raw {
type filter hook prerouting priority raw
iif lo notrack
tcp dport {ssh, http, https} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain output-raw {
type filter hook output priority raw
oif lo notrack
tcp sport {ssh, http, https} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain input {
type filter hook input priority filter
policy drop
iif lo accept
tcp dport {ssh, http, https} accept
ip protocol icmp accept
meta l4proto ipv6-icmp accept
ct state vmap { invalid : drop, established : accept, related : accept }
meta l4proto udp reject
meta l4proto tcp reject with tcp reset
reject
}
chain forward {
type filter hook forward priority filter
policy drop
}
chain output {
type filter hook output priority filter
oif lo accept
skuid != {root, systemd-network, chrony, unbound, http, synapse, matterbridge} counter reject
}
}

52
nftables-web.conf Normal file
View File

@ -0,0 +1,52 @@
#!/usr/bin/nft -f
flush ruleset
table inet filter {
chain prerouting-raw {
type filter hook prerouting priority raw
iif lo notrack
tcp dport {ssh, http, https} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain output-raw {
type filter hook output priority raw
oif lo notrack
tcp sport {ssh, http, https} notrack
ip protocol icmp notrack
meta l4proto ipv6-icmp notrack
}
chain input {
type filter hook input priority filter
policy drop
iif lo accept
tcp dport {ssh, http, https} accept
ip protocol icmp accept
meta l4proto ipv6-icmp accept
ct state vmap { invalid : drop, established : accept, related : accept }
meta l4proto udp reject
meta l4proto tcp reject with tcp reset
reject
}
chain forward {
type filter hook forward priority filter
policy drop
}
chain output {
type filter hook output priority filter
oif lo accept
skuid != {root, systemd-network, chrony, unbound, http} counter reject
}
}