Penguin
Diff: MetaNetConfiguration
EditPageHistoryDiffInfoLikePages

Differences between version 8 and predecessor to the previous major change of MetaNetConfiguration.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 8 Last edited on Wednesday, November 17, 2004 10:19:11 pm by MikeBeattie Revert
Older page: version 7 Last edited on Friday, July 2, 2004 6:55:44 pm by AlastairPorter Revert
@@ -64,18 +64,40 @@
  
 Make sure any clients on your network that you want to resolve !MetaNet addresses have the address of your nameserver as the first nameserver in /etc/resolv.conf, or their native DNS configuration. You can put your [ISP]'s nameserver after it as a precaution, if you like. 
  
 !!Firewalling 
-see FirewallNotes and PerrysFirewallingScript. Although you should be able to mostly trust other people on the metanet, you should at the very least do some basic firewalling. 
+See FirewallNotes and PerrysFirewallingScript. Although you should be able to mostly trust other people on the metanet, you should at the very least do some basic firewalling. 
  
 For example, samba/nmbd does broadcasts that will go across the metanet. You can either block traffic to and from the metanet on ports 137, 138 and 139 (both [TCP] and [UDP]) or you can add the following in smb.conf's global section: 
  bind interfaces only = yes 
  interfaces = 10.x.y.0/24 
+  
+All traffic on the 192.168.0.0/16 range is purely BGP, so you can safely firewall off everything except port 179 tcp and udp incoming. You will need to leave outgoing open, and ports >=1024 incoming with stateful acceptance (RELATED,ESTABLISHED) since your MetaNet router will use the IP on the wan0 interface for its communication onto the MetaNet.  
+  
+An example of this is:  
+ iptables -A INPUT -p udp --dport 179 -s 192.168.0.0/16 -i wan0 -d 192.168.x.y -j ACCEPT  
+ iptables -A INPUT -p tcp --dport 179 -s 192.168.0.0/16 -i wan0 -d 192.168.x.y -j ACCEPT  
+ iptables -A INPUT -p tcp --dport 1:1023 -j REJECT  
+ iptables -A INPUT -p udp --dport 1:1023 -j REJECT  
+ iptables -A INPUT -p tcp --dport 1024:65535 -m state --state ESTABLISHED,RELATED -j ACCEPT  
+ iptables -A INPUT -p udp --dport 1024:65535 -m state --state ESTABLISHED,RELATED -j ACCEPT  
+ iptables -A INPUT -p imcp -j ACCEPT  
+ iptables -A OUTPUT -d 192.168.0.0/16 -o wan0 -s 192.168.x.y -j ACCEPT  
+ iptables -A OUTPUT -d 10.0.0.0/8 -o wan0 -s 192.168.x.y -j ACCEPT  
+ iptables -A OUTPUT -p imcp -j ACCEPT  
+  
+Further, you want these for forwarding your 10.x range over your MetaNet router:  
+ iptables -A FORWARD -d 10.0.0.0/8 -s 10.x.y.z/24 -o wan0 -j ACCEPT  
+ iptables -A FORWARD -d 10.x.y.z/24 -s 10.0.0.0/8 -i wan0 -j ACCEPT  
+ iptables -A FORWARD -p imcp -j ACCEPT  
+  
+You'll need more than the above in your FORWARD chain if you also run something like NAT for your internet connection on your MetaNet router.  
+  
  
 !!Root CA 
 The !MetaNet has a CertificateAuthority that it uses for signing SSL websites and potentially other cool stuff. To add this "root CA" to your browser, visit http://www.meta.net.nz/install-cert.html 
  
 Now, go to MetaNetResources to see what you can do with your new internetwork. 
  
 ----- 
  
-[1] The reason is if you use a forwarder, then all queries get forwarded to the other server and it won't be able to resolve metanet names and addresses. 
+[1] The reason is that if you use a forwarder, then all queries for anything other than master/slave zones get forwarded to the other server and you won't be able to resolve metanet names and addresses.