mirror of
https://github.com/mirage/qubes-mirage-firewall.git
synced 2024-10-01 01:05:39 -04:00
Make example rule more restrictive
In the (commented-out) example rules, instead of allowing any client to continue a TCP flow with any other client, just allow Untrusted to reply to Dev. This is all that is needed to make the SSH example work.
This commit is contained in:
parent
eec1e985e5
commit
e15fc8c219
5
rules.ml
5
rules.ml
@ -39,15 +39,14 @@ let from_client (info : ([`Client of _], _) Packet.info) : Packet.action =
|
||||
|
||||
1. Allows Dev to send SSH packets to Untrusted.
|
||||
Note: responses are not covered by this!
|
||||
2. Allows clients to continue existing TCP connections with other clients.
|
||||
This allows responses to SSH packets from the previous rule.
|
||||
2. Allows Untrusted to reply to Dev.
|
||||
3. Blocks an external site.
|
||||
|
||||
In all cases, make sure you've added the VM name to [clients] or [externals] above, or it won't
|
||||
match anything! *)
|
||||
(*
|
||||
| { src = `Client `Dev; dst = `Client `Untrusted; proto = `TCP { dport = 22 } } -> `Accept
|
||||
| { src = `Client _; dst = `Client _; proto = `TCP _; packet }
|
||||
| { src = `Client `Untrusted; dst = `Client `Dev; proto = `TCP _; packet }
|
||||
when not (is_tcp_start packet) -> `Accept
|
||||
| { dst = `External `GoogleDNS } -> `Drop "block Google DNS"
|
||||
*)
|
||||
|
Loading…
Reference in New Issue
Block a user