this post was submitted on 06 Oct 2023
97 points (95.3% liked)

Linux

48129 readers
480 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Hi. I wanted to know if it's needed to install a firewall on a linux desktop/laptop. Why yes or why no?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 1 year ago (1 children)

Hey thank you for this comment. I was just following the ArchWiki and you can also find similar directions here. I think the idea is that on a home network, every device can be trusted, but it's still good to have a firewall in case your ISP's firewall is crappy. What do you think?

[–] [email protected] 5 points 1 year ago (1 children)

Your isp firewall uses nat, and a hacked isp gateway or some other device that had ports forwarded to it are the most likely things to be reaching into your network. They’ll be on that subnet.

[–] [email protected] 2 points 1 year ago (1 children)

Ohhh of course. Thank you.

So the more practical solution is just to assign a static IP to all my trusted devices, then allow those IP addresses rather than the whole subnet.

That makes total sense, but why do you think the ArchWiki says otherwise? Do you think they're just presenting a "just werks" solution?

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago) (2 children)

Yes, they’re giving “very simplistic” and also demonstrating how to deny and add access in multiple ways.

It’s also not uncommon to do things like that. The default firewall config in Fedora is wide open for every port above 1024.

[–] [email protected] 4 points 1 year ago

You are a rock star.

Okay, I now have new awesome rules! I assigned my other two machines static IPs (192.168.1.3 and 192.168.1.4, respectively). So now I have:

sudo systemctl enable --now ufw
sudo ufw default deny
sudo ufw allow from 192.168.1.3
sudo ufw allow from 192.168.1.4
sudo ufw limit ssh
sudo ufw enable

SSH still works, everything is awesome. Thanks again 👏👏👏

[–] [email protected] 1 points 1 year ago (1 children)

I set up a rule last night to allow SSH access from any device on my subnet, is it a good idea to add a separate rule blocking SSH from my router? I’ve already set up SSH with public key authentication so in theory there aren’t many devices that can access it but the firewall restriction seemed like a good idea

[–] [email protected] 1 points 1 year ago (1 children)

If you are worried that an attacker may have compromised your router and that key auth is not secure enough, then yes it would make sense.

I move ssh to a non-default port, only allow key based auth and install fail2ban. This is enough for me. It protects against automated attacks hitting port 22 and prevents brute force.

[–] [email protected] 1 points 1 year ago

I don’t think my router has been compromised and I think it’s pretty unlikely it will be, but the extra rule seems pretty trivial to set up so if there are no downsides I may as well! I have already changed the SSH port and disabled password login. I’ll look into fail2ban, might be worth it if it’s relatively simple to set up!