generated from ublue-os/image-template
-
Notifications
You must be signed in to change notification settings - Fork 28
feat(firewalld): configuration to open unprivileged ports by default #719
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
Show all changes
7 commits
Select commit
Hold shift + click to select a range
3315c8a
Initial plan
Copilot a708a00
Add firewalld configuration to open unprivileged ports (1024+)
Copilot 7a463b2
Fix port range to match Fedora exactly (1024-65535 instead of 1025-65…
Copilot 8612c9b
Update firewalld.conf
hanthor 626d740
Update FedoraWorkstation.xml
hanthor fd508dc
Rename FedoraWorkstation.xml to Workstation.xml
hanthor e8ecef1
Merge branch 'main' into copilot/fix-715
hanthor File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -11,6 +11,7 @@ dnf -y install \ | |
| buildah \ | ||
| distrobox \ | ||
| fastfetch \ | ||
| firewalld \ | ||
| fpaste \ | ||
| fzf \ | ||
| gnome-disk-utility \ | ||
|
|
||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,78 @@ | ||
| # firewalld config file | ||
|
|
||
| # default zone | ||
| # The default zone used if an empty zone string is used. | ||
| # Default: public | ||
| DefaultZone=Workstation | ||
|
|
||
| # Minimal mark | ||
| # Marks up to this minimum are free for use for example in the direct | ||
| # interface. If more free marks are needed, increase the minimum | ||
| # Default: 100 | ||
| #MinimalMark=100 | ||
|
|
||
| # Clean up on exit | ||
| # If set to no or false the firewall configuration will not get cleaned up | ||
| # on exit or stop of firewalld | ||
| # Default: yes | ||
| #CleanupOnExit=yes | ||
|
|
||
| # Lockdown | ||
| # If set to enabled, firewall changes with the D-Bus interface will be limited | ||
| # to applications that are listed in the lockdown whitelist. | ||
| # The lockdown whitelist file is lockdown-whitelist.xml | ||
| # Default: no | ||
| #Lockdown=no | ||
|
|
||
| # IPv6_rpfilter | ||
| # Performs a reverse path filter test on a packet for IPv6. If a reply to the | ||
| # packet would be sent via the same interface that the packet arrived on, the | ||
| # packet will match and be accepted, otherwise dropped. | ||
| # The rp_filter for IPv4 is controlled using sysctl. | ||
| # Default: yes | ||
| #IPv6_rpfilter=yes | ||
|
|
||
| # IndividualCalls | ||
| # Do not use combined -restore calls, but individual calls. This increases the | ||
| # time that is needed to apply changes and to start the daemon, but is good for | ||
| # debugging. | ||
| # Default: no | ||
| #IndividualCalls=no | ||
|
|
||
| # LogDenied | ||
| # Add logging rules right before reject and drop rules in the INPUT, FORWARD | ||
| # and OUTPUT chains for the default rules and also final reject and drop rules | ||
| # in zones. Possible values are: all, unicast, broadcast, multicast and off. | ||
| # Default: off | ||
| #LogDenied=off | ||
|
|
||
| # AutomaticHelpers | ||
| # For the secure use of iptables and connection tracking helpers it is | ||
| # recommended to turn AutomaticHelpers off. But this might have side effects on | ||
| # other services. This setting can be overridden per zone using the | ||
| # AutomaticHelpers zone setting. For more information on helpers and their | ||
| # configuration, please have a look at the respective documentation. | ||
| # Default: system | ||
| #AutomaticHelpers=system | ||
|
|
||
| # FirewallBackend | ||
| # Selects the firewall backend implementation. | ||
| # Choices are: | ||
| # - nftables (default) | ||
| # - iptables (iptables, ip6tables, ebtables and ipset) | ||
| # Default: nftables | ||
| #FirewallBackend=nftables | ||
|
|
||
| # FlushAllOnReload | ||
| # Flush all runtime rules on a reload. In previous releases some runtime | ||
| # configuration was retained during a reload, namely; interface to zone | ||
| # assignment, and direct rules. This was confusing to users. To get the old | ||
| # behavior set this to "no". | ||
| # Default: yes | ||
| #FlushAllOnReload=yes | ||
|
|
||
| # RFC3964_IPv4 | ||
| # As per RFC 3964, filter IPv6 over IPv4 tunnels (6to4). | ||
| # This means we also filter protocol 41 and isatap. | ||
| # Default: yes | ||
| #RFC3964_IPv4=yes | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,10 @@ | ||
| <?xml version="1.0" encoding="utf-8"?> | ||
| <zone> | ||
| <short>Workstation</short> | ||
| <description>Unsolicited incoming network packets are rejected from port 1 to 1023, except for select network services. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.</description> | ||
| <service name="dhcpv6-client"/> | ||
| <service name="ssh"/> | ||
| <service name="samba-client"/> | ||
| <port protocol="udp" port="1024-65535"/> | ||
| <port protocol="tcp" port="1024-65535"/> | ||
| </zone> |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.