mirror of
https://github.com/GrapheneOS/infrastructure.git
synced 2025-09-24 14:38:32 -04:00
clean inbound DSCP
This avoids setting outbound DSCP for echo-reply, TCP RST for TCP sockets in the Time-Wait state and potentially other cases. We don't want it to be possible for inbound packets to determine our outbound traffic classification even to a small extent.
This commit is contained in:
parent
28106192b1
commit
41174c2a08
9 changed files with 27 additions and 0 deletions
|
@ -57,6 +57,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 80, 443 } goto input-tcp-service
|
tcp dport { 22, 80, 443 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
|
@ -60,6 +60,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 80, 443 } goto input-tcp-service
|
tcp dport { 22, 80, 443 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
|
@ -69,6 +69,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 25, 80, 443, 465, 993 } goto input-tcp-service
|
tcp dport { 22, 25, 80, 443, 465, 993 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
|
@ -57,6 +57,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 80, 443 } goto input-tcp-service
|
tcp dport { 22, 80, 443 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
|
@ -61,6 +61,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 80, 443, 7275 } goto input-tcp-service
|
tcp dport { 22, 80, 443, 7275 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
|
@ -67,6 +67,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 53, 80, 443, 853 } goto input-tcp-service
|
tcp dport { 22, 53, 80, 443, 853 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
|
@ -65,6 +65,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 53, 80, 443, 853 } goto input-tcp-service
|
tcp dport { 22, 53, 80, 443, 853 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
|
@ -57,6 +57,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 80, 443 } goto input-tcp-service
|
tcp dport { 22, 80, 443 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
|
@ -61,6 +61,9 @@ table inet filter {
|
||||||
type filter hook input priority filter
|
type filter hook input priority filter
|
||||||
policy drop
|
policy drop
|
||||||
|
|
||||||
|
ip dscp set cs0
|
||||||
|
ip6 dscp set cs0
|
||||||
|
|
||||||
tcp dport { 22, 80, 443 } goto input-tcp-service
|
tcp dport { 22, 80, 443 } goto input-tcp-service
|
||||||
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
ct state vmap { invalid : drop, established : accept, related : accept, new : drop, untracked: accept }
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue