Hello fellow Linux enthusiasts!

As many of you know, Linux can be a powerful and flexible operating system, but it can also be daunting for new users, especially when it comes to securing their systems. With the abundance of information available online, it’s easy to get overwhelmed and confused about the best practices for firewall configuration and basic security.

That’s why I reaching out to the Linux community for help. I am looking users who are willing to share their expertise and write a comprehensive guide to Linux firewall and security.

The goal of this guide is to provide a centralized resource that covers the following topics:

Introduction to Linux firewalls (e.g., firewalld, ufw, etc.)
Understanding basic security principles (e.g., ports, protocols, network traffic)
Configuring firewalls for various scenarios (e.g., home networks, servers, VPNs)
Best practices for securing Linux systems (e.g., password management, package updates, file permissions)
Troubleshooting common issues and errors
Advanced topics (e.g., network segmentation, SELinux, AppArmor)

I am looking for a well-structured and easy-to-follow guide that will help new users understand the fundamentals of Linux firewall and security, while also providing advanced users with a comprehensive resource for reference.

If you’re interested in contributing to this project, please reply to this post with your experience and expertise in Linux firewall and security. We’ll be happy to discuss the details and work together to create a high-quality guide that benefits the Linux community.

Thank you for your time and consideration, and im looking forward to hearing from you!

  • apt_install_coffee@lemmy.ml
    link
    fedilink
    arrow-up
    31
    ·
    9 months ago

    I build Linux routers for my day job. Some advice:

    • your firewall should be an appliance first and foremost; you apply appropriate settings and then other than periodic updates, you should leave it TF alone. If your firewall is on a machine that you regularly modify, you will one day change your firewall settings unknowingly. Put all your other devices behind said firewall appliance. A physical device is best, since correctly forwarding everything to your firewall comes under the “will one day unknowingly modify” category.

    • use open source firewall & routing software such as OpenWRT and PFSense. Any commercial router that keeps up to date and patches security vulnerabilities, you cannot afford.

    • LordKitsuna@lemmy.world
      link
      fedilink
      arrow-up
      10
      ·
      9 months ago

      i just want to also toss opnsense into that list, a long time ago it forked off pfsense and these days it offers (in my opinion) a significantly easier and better UI as well as more up to date kernel and better tools for dealing with things like buffer bloat

    • skimm@lemmy.sdf.org
      link
      fedilink
      arrow-up
      5
      ·
      9 months ago

      Any links or thoughts on sane OpenWRT settings for a home network? I’m a networking noob but learning slowly and would love some good reading or tips.

      • apt_install_coffee@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        9 months ago

        Most firewalls are at their safest when you first get them i.e by default they block everything coming in. As you start doing port forwarding and the like you start making the network selectively less secure; that’s when you have to pay attention.

      • apt_install_coffee@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        9 months ago

        I had an EdgeRouter X for years before I started my job. They are solid devices, and I’d definitely put them above most consumer routers.

        Because they only charge for the hardware, they will eventually run into the same disincentive to provide consistent timely updates. If you do buy an Ubiquiti or similar enthusiast brand, do still keep an eye out for the CVEs that don’t get patched.

  • aodhsishaj@lemmy.world
    link
    fedilink
    arrow-up
    13
    ·
    9 months ago

    This is a very broad subject. Are we talking straight iptables, or ufw/firewalld or at the app level with selinux/apparmor. Or at the firewall level like opnsense/pfsense? Or on the router side ddwrt and tomato etc. You can grab certain distros on either side, whonix/tails on the blueteam side, kali on the red team side. There are hardened kernels like zen and securelinux. There’s network security, but also kernel level stuff like run levels, tpm, uefi, etc.

    My real question is who is the audience for this? What is their use case, what distro are they using? What is the proposed environment?

  • jollyrogue@lemmy.ml
    link
    fedilink
    arrow-up
    7
    ·
    9 months ago

    Interesting.

    What are the hosting details and contrib guidelines?

    And some other random notes…

    “Best practices for securing Linux” could probably be dropped. There are enough of those, and the topic could overrun the focus on firewalls. I could see a secure network section, but Linux might be too broad.

    What about opening it up to FOSS firewalls and networking in general? The BSDs, Illumos, Haiku, and others could be added. Linux could be the starting point, and the others could be added as people feel like it.

  • Stillhart@lemm.ee
    link
    fedilink
    arrow-up
    6
    ·
    9 months ago

    I tried using a guide online one time to build a linux router/firewall onto a passively-cooled mini-computer that I could leave on a shelf with no I/O connected… basically a replacement for the garbo off-the-shelf wifi routers that die every year. It worked…mostly. The problem is that the random little things that didn’t work right just were insurmountable for a linux noob who was just trying to follow a guide.

    I hate that spending money on the best ones you can buy STILL die after a year or two. And now they all require you to login so even more people can inspect all my network traffic.

    I’d love to see a guide that’s kept up to date for building a simple router/firewall, with sections like you have above for more information so people can unlock ports for unusual stuff or whatever. I mean, in a perfect world, you install a LTS OS and set it up and forget about it for a few years. Mine was like that except it required manual intervention every time it rebooted. If that wasn’t the case, it would have been perfect and I would be recommeding it to everyone.

    • LordKitsuna@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      9 months ago

      Instead of building one from scratch why not simply use one of the already made router operating systems? I would personally recommend opnsense, it has a nice easy to use web UI and can be setup in like maybe 20min.

      as for hardware you can use just about anything but i highly recommend these cute little dedicated router boxes. It is passively cooled, plenty powerful to handle wireguard VPN at gigabit speeds and should easily last you many many years without an issue.

      • Stillhart@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        9 months ago

        That’s the kind of box I’ve been using. Just been running linux on it. It’s been a few years, I’ll look into opnsense, thx.

      • Stillhart@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        9 months ago

        My issue is that the cheapo consumer hardware sucks. Using good software on bad hardware doesn’t solve the issue. Unless I can use it on a normal computer… last I looked into it, I don’t think you could.

        • Pantherina@feddit.de
          link
          fedilink
          arrow-up
          1
          ·
          9 months ago

          I really want to. My flatmates dont care at all, but afaik our router is supported. Could you share any experiences, how is the installation on such a “not meant to use third party software” device, are updates automatic? Do you install packages? How is the WebUI, how long would it take to just have it working?

          • jollyrogue@lemmy.ml
            link
            fedilink
            arrow-up
            2
            ·
            edit-2
            9 months ago

            Installation of OpenWRT from stock depends on the device. Some devices are more involved than others.

            Updates are not automatic, and they require planning with some down time. The process is backup settings, update wiping out settings, reapply settings by uploading backup.

            I do not install packages. That leads even more horribly complicated updates. I don’t recommend using anything that isn’t in the stock image.

            LuCI is serviceable. It’s not pretty, or the most intuitive, but it works.

            OPNsense is better if you have the x86 hardware around to run it.

            • Pantherina@feddit.de
              link
              fedilink
              arrow-up
              1
              ·
              9 months ago

              Thanks! So its a bit like Docker images, why doesnt it save settings? This sounds pretty horrible, shouldnt network hardware always be updated automatically?

              • jollyrogue@lemmy.ml
                link
                fedilink
                arrow-up
                1
                ·
                9 months ago

                OpenWRT saves settings. It’s what’s in the backup, and that’s what allows the router to return to operation after a power cycle.

                Things get can sideways when settings are persisted across updates. There is an option to persist settings, but there are fewer headaches when settings are wiped and restored from backup.

                This gets even worse when packages are in play. Packages aren’t reinstalled when the backup is restored, so any packages need to be tracked then reinstalled after an update.

                You’re opting to self-manage the router by installing OpenWRT. You are the QA department, and it’s up to you to make sure everything works and any manual changes are made.

                In a production setting, no not at all. Updates need to be QA’d before being released, especially network equipment updates, to prevent outages.

                The Turris Omnia is OpenWRT based and does auto updates, but the Turris is also $300-$400 dollars.

            • Possibly linux@lemmy.zip
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              2
              ·
              9 months ago

              I’m serious. You can pick up a WiFi 6 router with gigabit networking that will work just fine.

              • The Doctor@beehaw.org
                link
                fedilink
                English
                arrow-up
                2
                ·
                9 months ago

                Seriously. I have a couple of Linksys EA8300’s running OpenWRT in my house, and I did not expect the performance jump over my old ones. For not a lot of money I pretty much tripled the speed of the house wireless network.

    • Pantherina@feddit.de
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      9 months ago

      Can you explain to me what a router does? Is is just a PC tunnelling inbound and outbound connections? What makes it the master of the network?

      Btw in Germany we have FritzBox which doesnt suck, but seems they sell their company

      • Stillhart@lemm.ee
        link
        fedilink
        arrow-up
        3
        ·
        9 months ago

        You got a lot of good answers to this. I’ll add mine:

        A router is a device that bridges multiple physical networks (it will have at least two network interfaces) and directs traffic between them. It inspects every packet of data and decides which port to send it to.

        In a typical home here in the US, one network is your ISP (connected to your cable modem, for example) and the other is your home computers, consoles and devices via wifi or direct connection (like a NAS drive, for example).

        Generally you want a firewall to go along with your router. Instead of blindly passing all data to the correct network, it will decide whether it is allowed to pass or not based on a configured ruleset. Most consumer home wifi routers have a simple firewall built-in.

        They also have other features like “load balancing” to prioritize certain data that is more sensitive to interruptions in the data flow (like gaming) over data that isn’t (like video or audio), or “DHCP servers” to hand out IP addressed to devices on the network, or “VPN tunneling” to encrypt data, etc.

        A linux-based computer is more than capable of performing all these tasks. If well-configured, it can do it much better than a consumer device, with better hardware and more reliability for less money over time (when taking reliability into account).

        • Pantherina@feddit.de
          link
          fedilink
          arrow-up
          1
          ·
          9 months ago

          Thanks!

          I had another problem, I wanted to set a not sucking DNS server on our router, but nobody had internet anymore unless they would set the same server on their devices. Why is that?

          I simply wanted to avoid our ISP spying on us by using some shit DNS server they control or get paid by

          • The Doctor@beehaw.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            9 months ago

            Do they use DHCP for their network addressing information? They should get the router’s IP as the default recursive DNS resolver…

          • Stillhart@lemm.ee
            link
            fedilink
            arrow-up
            1
            ·
            9 months ago

            The best way to avoid your ISP spying is to use a VPN. It encrypts all the data before your ISP ever sees the data so they can’t spy on you. I use Private Internet Access but I recommend doing some research and finding one that’s good in your country.

            I’m not sure why you had an issue with just changing your DNS. Did you change it in the DHCP settings or somewhere else?

            Regardless, just to be clear, changing your DNS won’t prevent your ISP from spying on you. Many of the big DNS providers like Google will absolutely spy on you through your DNS calls so I do think it’s a good idea to use a better DNS. I personally use AdGuard DNS, which has a built in ad blocker that works really well.

            • Pantherina@feddit.de
              link
              fedilink
              arrow-up
              1
              ·
              9 months ago

              I wanted to use the changed DNS for adblocking (good for the environment too haha) and also of course not use Google but a good one, best not in my own country.

              This would be pretty good for privacy I think, especially if it would use DNSCrypt where your ISP would just see the DNSses IP, right?

              But this would probably need to be set up on all the clients, and my roomies have apple devices, LOL

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        9 months ago

        A router routes traffic. It usually has dhcp and a firewall.

        However, most devices for consumers are a router, switch and a wireless access point. What this means is that they have a router but also Ethernet plugs in the back and a WiFi antenna

  • BoofStroke@lemm.ee
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    9 months ago
    • use pfsense for a firewall. Using nftables, firewalld, etc should only really come into play if on an untrusted network. Firewalls on servers can cause more problems than they solve and are easy to misconfigure.
    • run lynis on your Linux servers to help get them compliant with CIS benchmarks
    • be careful with your reverse proxies
    • keep things patched
    • run only necessary services
    • configure needed services conservatively
    • no root logins
    • LordKitsuna@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      9 months ago

      i just want to also toss opnsense into that list, a long time ago it forked off pfsense and these days it offers (in my opinion) a significantly easier and better UI as well as more up to date kernel and better tools for dealing with things like buffer bloat

  • hottari@lemmy.ml
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    9 months ago

    Have your tried the ArchWiki for the firewall programs you mentioned and their Security wiki as well? I usually find it resourceful and very comprehensive.

      • The Doctor@beehaw.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        9 months ago

        That’s understandable. However, pf (OpenBSD’s firewall system) is incredibly logical and easy to use. I never expected to write a fully operational (bloody thing worked the first time I tried it!) firewall ruleset on a two hour flight from scratch.

  • ReakDuck@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    9 months ago

    What kind of attacks could I expect on a Linux Machine? Especially when using bare Arch Linux and only setting up software that I consume (Minecraft Server, Zerotier)

      • float@feddit.de
        link
        fedilink
        arrow-up
        4
        ·
        9 months ago

        There aren’t many distro with a base system as tiny as Arch. It’s not a bad choice at all. It’s on my server since many years, working perfectly reliable. Everything except the base system is inside Podman containers. Why not?

        • redprog@feddit.de
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          9 months ago

          Not necessarily saying it’s a bad idea, especially with everything running within podman it’s probably even quite awesome. It just feels like it’s a lot more tedious to fix in the case that something got messed up. Still, not a bad idea generally, as long as you know what you’re doing ^^

          • ReakDuck@lemmy.ml
            link
            fedilink
            arrow-up
            6
            ·
            9 months ago

            After using many different distros, I feel everywhere a little incompetent when trying to fix simple issues.

            Arch Linux for some reason always makes things easy and easy fixable in case things go bad.

    • The Doctor@beehaw.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      9 months ago

      It reads like OP has been looking for something that is actually usable and not LLM shat garbage blog posts. Asking people directly seems like the primary way of getting any actually useful information these days.

  • sir_reginald@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    2
    ·
    9 months ago

    This shouldn’t be targeted at the average used who does not need firewalls nor most networking stuff. If highly invested in security, maybe AppArmor/SELinux could come handy. Other topics I find interesting would be the use of VPNs with Wireguard, setup killswitches, how to configure a system-wide Tor proxy, etc.

    In stuff like that I could definitely help, depending on the conditions.