Ports are opened after upgrade

Kjetil Kjernsmo kjetil at kjernsmo.net
Wed Apr 22 13:31:15 BST 2020


Hi all!

Last night, I decided to upgrade my box from Debian Stretch, that had version 
3.1.1+ds-1 to Debian Buster with 3.1.6+ds-8. I ran into several problems. 
Currently, all ports look open, which is scary, but the routing appears to 
work, so there are no services that shouldn't be exposed that are.

The first problem was that iptables package was upgraded after firehol, and so, 
there was a install.config file that pointed at iptables-legacy (and friends), 
that then didn't yet exist. I first changed that to point at iptables, before 
I discovered that the iptables package was upgraded and did have the legacy 
scripts, so I changed it back.

On startup, I see 
root at kanga:~# systemctl status firehol
● firehol.service - Firehol stateful packet filtering firewall for humans
   Loaded: loaded (/lib/systemd/system/firehol.service; enabled; vendor 
preset: enabled)
   Active: active (exited) since Wed 2020-04-22 13:45:56 CEST; 37min ago
     Docs: man:firehol(1)
           man:firehol.conf(5)
  Process: 19825 ExecStart=/usr/sbin/firehol start (code=exited, status=0/
SUCCESS)
 Main PID: 19825 (code=exited, status=0/SUCCESS)

Apr 22 13:45:45 kanga systemd[1]: Starting Firehol stateful packet filtering 
firewall for humans...
Apr 22 13:45:46 kanga firehol[19825]: FireHOL: Saving active firewall to a 
temporary file...  OK
Apr 22 13:45:46 kanga firehol[19825]: FireHOL: Processing file '/etc/firehol/
firehol.conf'...
Apr 22 13:45:46 kanga firehol[19825]: WARNING 2@/etc/firehol/firehol.conf: 
version::  Running version 5 config. Update configu
Apr 22 13:45:55 kanga firehol[19825]:  OK  (1413 iptables rules)
Apr 22 13:45:56 kanga firehol[19825]: FireHOL: Fast activating new firewall...  
OK
Apr 22 13:45:56 kanga firehol[19825]: FireHOL: Saving activated firewall to '/
var/spool/firehol'...  OK
Apr 22 13:45:56 kanga systemd[1]: Started Firehol stateful packet filtering 
firewall for humans.


I have been running a version 5 config, and left IPv6 on my TODO list. The 
full config is a bit long, but I have stuff like 


version 5

dnat to 172.22.192.2 inface "eth0 tun_uio" proto tcp dport 25
dnat to 172.22.192.2 inface "eth0 tun_uio" proto tcp dport 143
dnat to 172.22.192.2 inface "eth0 tun_uio" proto tcp dport 993

[... some port definitions ... ]

interface "eth0 tun_uio" internet # 172.22.0.0/24
	  policy drop
	  protection strong
	  client all accept
	  server ssh accept
	  server ping accept
	  server http accept
 	  server openvpn accept
	  server https accept


router lan2internet inface eth1 outface "eth0 tun_uio"
       masquerade	    
       route all  accept

router evpn2internet inface tun_ext outface "eth0 tun_uio"
       masquerade	    
       route all  accept

router wifi2internet inface eth2 outface "eth0 tun_uio"
       masquerade	    
       route all accept
       protection all-floods 

router internet2dmz inface "eth0 tun_uio" outface eth3
       route smtp accept
       route imap accept
       route https accept
       route imaps accept
       route ident reject with tcp-reset
       protection strong

[... etc ...]

When I nmap from the outside, it appears that all ports are open. nmapping on 
the box itself against its external IP or localhost seems fine though.

I understand that the kernel now is encouraging nftables as a replacement of 
iptables, but I don't understand how the legacy applies, if that is a Debian-
specific thing, and if that has something to do with it. I've tried both. 

I have also tried to put in ipv4 before the dnat statements, interface4 and 
router4, but it didn't seem to make a difference for the problem.

It has been a while since I actually nmapped my network from the outside, so 
there is a scary possibility that it has been like that for a while. It is 
just my home network, so it is nothing big and important, but it is important 
to me and my family. I'm quite sure this is a new problem though. 

I'm at loss about what should be my next step though, ideas very much
appreciated!
Kjetil




More information about the Firehol-support mailing list