Inspired by this comment to try to learn what I’m missing.

  • Cloudflare proxy
  • Reverse Proxy
  • Fail2ban
  • Docker containers on their own networks

Another concern I have is does it need to be on a separate machine on a vlan from the rest of the network or is that too much?

  • irmadlad@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 day ago

    My new strategy is to block EVERY port

    Wow! All 65535 +/-, in and out? That’s one way to skin a cat.

    • gamer@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 day ago

      ez pz:

      #!/usr/sbin/nft -f
      table inet filter {
          chain input {
              type filter hook input priority raw; policy accept;
              iif "lo" accept
              ct state established,related accept
              iif "enp1s0" udp dport 51820 accept
              iif "enp1s0" drop
          }
      
          chain forward {
              type filter hook forward priority raw; policy accept;
              iif "lo" accept
              ct state established,related accept
              iif "enp1s0" udp dport 51820 accept
              iif "enp1s0" drop
          }
      
          chain output {
              type filter hook output priority raw; policy accept;
          }
      }
      
      • irmadlad@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 day ago

        I’ve seen it done as such:

        sudo ufw deny out 1:19/tcp sudo ufw deny out 1:19/udp sudo ufw deny out 22:52/tcp sudo ufw deny out 22:52/udp sudo ufw deny out 54:79/tcp sudo ufw deny out 54:79/udp sudo ufw deny out 81:122/tcp sudo ufw deny out 81:122/udp sudo ufw deny out 124:442/tcp sudo ufw deny out 124:442/udp sudo ufw deny out 444:65535/tcp sudo ufw deny out 444:65535/udp

        But your way seems a bit more elegant