Discussion:
Mixing public and private IPs on a home LAN
(too old to reply)
bob prohaska
2019-03-06 01:26:23 UTC
Permalink
I'm presently using an old Cayman 3546 to support both public
and private hosts on a home network. The Cayman is getting old,
a more modern replacement is likely to be needed before too much
longer; it's been in continuous service since about 2004.

At the moment I have a single 192.168.x.y network, using one-to-one
NAT to map public addresses to the private IPs of the servers.
Routers that offer one-to-one NAT don't seem all that common, so
I'm curious about alternatives.

The service I have is 8 static IPs on an RFC-1483 bridged connection.
An obvious scheme is to connect a switch to a bridged modem, hook the
servers to the switch using their public addresses and connect a router
using one public address to the switch to provide private networking.
That's three boxes, though, and I'm unclear on how to administer the
modem once it's in bridge mode, since its ethernet port will be in the
public address space.

Another alternative is to find a router like the Cayman, with one-to-one
NAT. That feature doesn't seem widely advertised, however.

I'm also unclear on the relative merits of a separate switch and router,
or a combined unit. Here in the USA it seems that all DSL hardware is
getting scarce, so choices are limited, sometimes to used offerings.

Thanks for reading, and any ideas!

bob prohaska
Grant Taylor
2019-03-06 20:03:58 UTC
Permalink
I'm presently using an old Cayman 3546 to support both public and
private hosts on a home network. The Cayman is getting old, a more modern
replacement is likely to be needed before too much longer; it's been in
continuous service since about 2004.
Is there an actual /need/ to replace the Cayman yet? Or are you just
exploring future options?

A /desire/ to replace it is perfectly fine too. Just call it what it is.
The service I have is 8 static IPs on an RFC-1483 bridged connection.
Do you have eight random IPs out of a larger network? Or do you have a
subnet that is routed to you via another IP on the outside of your modem?

I've seen both, and it makes a difference from a networking point of view.

Can you use all eight IPs? Or can you only use six of them, one of
which has to be assigned to the modem / router facing the ISP?
An obvious scheme is to connect a switch to a bridged modem, hook the
servers to the switch using their public addresses and connect a router
using one public address to the switch to provide private networking.
You can do that.
That's three boxes, though, and I'm unclear on how to administer the
modem once it's in bridge mode, since its ethernet port will be in the
public address space.
It will depend on the modem.
Another alternative is to find a router like the Cayman, with one-to-one
NAT. That feature doesn't seem widely advertised, however.
You might be able to find a router that will allow you to use private
IPs on the inside and host (/32) routes to the public IPs via server's
static IPs on the internal LAN. (You'd bind the public IP as a /32 to a
loopback adapter on the server.)

There's nothing wrong with having the private IPs route across an
unrouted network.
I'm also unclear on the relative merits of a separate switch and router,
or a combined unit.
It largely depends on the features of each unit and what you want.
Here in the USA it seems that all DSL hardware is getting scarce, so
choices are limited, sometimes to used offerings.
I've not looked at acquiring (contemporary) DSL equipment here in the US
in about a decade.

Anything I've looked at has been older for retro networking across phone
lines hanging off of an internal analog PBX.
Thanks for reading, and any ideas!
I don't know how familiar you are with Linux. IMHO Linux can do all of
what's in your email and my reply.

Linux can even do something called a "Bridging Router" in that one
""router routes some traffic while bridges other. So your internal
servers could think they are directly connected to the public network
and the private network at the same time via an IP from each. Your
other internal clients would be routed, with NAT, like they are now. An
added bonus is that you can apply firewall rules to the bridged traffic
to your servers.
--
Grant. . . .
unix || die
bob prohaska
2019-03-07 18:16:47 UTC
Permalink
Post by Grant Taylor
I'm presently using an old Cayman 3546 to support both public and
private hosts on a home network. The Cayman is getting old, a more modern
replacement is likely to be needed before too much longer; it's been in
continuous service since about 2004.
Is there an actual /need/ to replace the Cayman yet? Or are you just
exploring future options?
For now, I'm just exploring future options.
Post by Grant Taylor
A /desire/ to replace it is perfectly fine too. Just call it what it is.
The ISP wants me to upgrade to an ADSL2+ modem, saying it'll improve
connection reliability. Reliability isn't terrible, added speed isn't
necessary, but better noise margin couldn't hurt. And, the old modem
has been running 24/7 for fourteen years.
Post by Grant Taylor
The service I have is 8 static IPs on an RFC-1483 bridged connection.
Do you have eight random IPs out of a larger network? Or do you have a
subnet that is routed to you via another IP on the outside of your modem?
Seems to be 8 sequential IPs out of a larger subnet. The netmask is 255.255.255.0
Post by Grant Taylor
I've seen both, and it makes a difference from a networking point of view.
Can you use all eight IPs? Or can you only use six of them, one of
which has to be assigned to the modem / router facing the ISP?
I can use seven, plus one for the router
Post by Grant Taylor
An obvious scheme is to connect a switch to a bridged modem, hook the
servers to the switch using their public addresses and connect a router
using one public address to the switch to provide private networking.
You can do that.
Will it be "better" in some way than one-to-one NAT, apart fron not needing
a router that supports one-to-one NAT (which alone is helpful).
Post by Grant Taylor
That's three boxes, though, and I'm unclear on how to administer the
modem once it's in bridge mode, since its ethernet port will be in the
public address space.
It will depend on the modem.
Another alternative is to find a router like the Cayman, with one-to-one
NAT. That feature doesn't seem widely advertised, however.
You might be able to find a router that will allow you to use private
IPs on the inside and host (/32) routes to the public IPs via server's
static IPs on the internal LAN. (You'd bind the public IP as a /32 to a
loopback adapter on the server.)
Not sure I understand this; my servers use 127.0.0.1 as a loopback address.
Are you saying they'd use their public IPs for that purpose as well?
Post by Grant Taylor
There's nothing wrong with having the private IPs route across an
unrouted network.
I'm also unclear on the relative merits of a separate switch and router,
or a combined unit.
It largely depends on the features of each unit and what you want.
The goal is to have public servers and private workstations on the
end of one DSL circuit. The servers (web, mail and name) need to be
accessible from the private network as well. The private workstations
likewise need access to both my servers and the rest of the net.

I'd also like to minimize cost and power consumption. The servers are
all Raspberry Pi 2, probably to be replaced by Pi3's as 32 bit fades.
The workstations are a Pi3 and a couple of elderly Macs that are off
when unused. No gaming, no streaming, so speed isn't an issue.
Post by Grant Taylor
I've not looked at acquiring (contemporary) DSL equipment here in the US
in about a decade.
I bought DSL service and equipment from AT&T in 2004. It just worked and I
never explored it carefully, so I'm entering a whole new world
Post by Grant Taylor
Anything I've looked at has been older for retro networking across phone
lines hanging off of an internal analog PBX.
I like the idea of preserving old equipment that's still useful, but time
takes its toll. Sometimes progress happens also 8-)
Post by Grant Taylor
I don't know how familiar you are with Linux. IMHO Linux can do all of
what's in your email and my reply.
That's fully understood. A router using openWRT, or at least one that supports
it, would be welcome. One problem is identifying good candidate hardware.
Post by Grant Taylor
Linux can even do something called a "Bridging Router" in that one
""router routes some traffic while bridges other. So your internal
servers could think they are directly connected to the public network
and the private network at the same time via an IP from each. Your
other internal clients would be routed, with NAT, like they are now. An
added bonus is that you can apply firewall rules to the bridged traffic
to your servers.
That appears to be what the Cayman does now; I can assign a public IP to
one of my servers and it can communicate outside. Meanwhile the other
servers and workstations can use NAT. It seems to have trouble talking
to the private net, but that's likely my fault.

I'd like to stick with commodity hardware. The immediate issue seems to
be the modem, which I gather doesn't exist in an "open source" form.

Thanks for reading and any further thoughts!

bob prohaska
Grant Taylor
2019-03-08 20:51:40 UTC
Permalink
Post by bob prohaska
For now, I'm just exploring future options.
Fair enough.

I think exploration and learning what options exist is always a good thing.
Post by bob prohaska
The ISP wants me to upgrade to an ADSL2+ modem, saying it'll improve
connection reliability. Reliability isn't terrible, added speed isn't
necessary, but better noise margin couldn't hurt. And, the old modem
has been running 24/7 for fourteen years.
Fair. If it was me, I'd upgrade.

But if it's working for you and you're happy.... You decide what you
want to do.
Post by bob prohaska
Seems to be 8 sequential IPs out of a larger subnet. The netmask is 255.255.255.0
That makes the networking side of my brain ~twitch~.

Okay.
Post by bob prohaska
I can use seven, plus one for the router
ACK
Post by bob prohaska
Will it be "better" in some way than one-to-one NAT, apart fron not
needing a router that supports one-to-one NAT (which alone is helpful).
IMHO, no. I think it's actually worse. I say this because the servers
are exposed to the internet without any L3 filtering. I find this to be
a bad idea.

There are options to do L3 filtering on L2. (EBTables comes to mind.)

I generally prefer to have an L3 router / firewall at my edge unless I
have a very specific reason to not do so.
Post by bob prohaska
Not sure I understand this; my servers use 127.0.0.1 as a loopback
address. Are you saying they'd use their public IPs for that purpose
as well?
Your servers would use static private IPs. The router would route the
given external IP via said static IP. The server would have said public
IP bound to a network interface.

Said network interface is frequently called a "loopback" but it does not
have to be and is usually different than the ""interface (if there is
one) that holds the 127.0.0.1/8 network.

You can create dummy interfaces in Linux. You can add what are called
"Loopback" interfaces to Windows. These show up as additional network
interfaces.

Note: The last time I looked, Windows didn't actually have an interface
with 127.0.0.1/8 bound to it. Instead it's a software / routing construct.
Post by bob prohaska
The goal is to have public servers and private workstations on the end of
one DSL circuit. The servers (web, mail and name) need to be accessible
from the private network as well. The private workstations likewise need
access to both my servers and the rest of the net.
There are many ways to do that.
Post by bob prohaska
I'd also like to minimize cost and power consumption. The servers are
all Raspberry Pi 2, probably to be replaced by Pi3's as 32 bit fades.
The workstations are a Pi3 and a couple of elderly Macs that are off
when unused. No gaming, no streaming, so speed isn't an issue.
This doesn't make /much/ difference in the networking. About the only
thing it does change is if you are looking for Gig Ether or 100 Meg
Ether. But that's largely immaterial to the network configuration.
Maybe equipment acquisition.

I suspect the biggest difference will be the number of ports in a switch
that's part of the modem. (If you go that route.)
Post by bob prohaska
I bought DSL service and equipment from AT&T in 2004. It just worked
and I never explored it carefully, so I'm entering a whole new world
Fair enough.

It sounds like you've had good service with what you bought and got your
money's worth out of it.
Post by bob prohaska
I like the idea of preserving old equipment that's still useful, but
time takes its toll. Sometimes progress happens also 8-)
I'm used to surges destroying equipment in that time frame.
Particularly DSL / Cable modems. Sometimes switches.
Post by bob prohaska
That's fully understood. A router using openWRT, or at least one that
supports it, would be welcome. One problem is identifying good candidate
hardware.
How many ports at what speed are you wanting?

Would you prefer the modem also contain the switch? Or do you want
separate?

What do you think your ideal situation is? Why do you think that?

I ask more trying to learn your use case than to question what you're doing.
Post by bob prohaska
That appears to be what the Cayman does now; I can assign a public IP to
one of my servers and it can communicate outside. Meanwhile the other
servers and workstations can use NAT. It seems to have trouble talking
to the private net, but that's likely my fault.
Do your servers also have a private IP? Or do they only have the public IP?
Post by bob prohaska
I'd like to stick with commodity hardware. The immediate issue seems to
be the modem, which I gather doesn't exist in an "open source" form.
I'm sure there are FCC (et al) restrictions that are applied to modems /
firmware (particularly in the wireless RF space). But I would think
that /something/ would exist /somewhere/. I have no idea what or where.
Post by bob prohaska
Thanks for reading and any further thoughts!
You're welcome.
--
Grant. . . .
unix || die
bob prohaska
2019-03-09 00:52:59 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
For now, I'm just exploring future options.
Fair enough.
I think exploration and learning what options exist is always a good thing.
Post by bob prohaska
The ISP wants me to upgrade to an ADSL2+ modem, saying it'll improve
connection reliability. Reliability isn't terrible, added speed isn't
necessary, but better noise margin couldn't hurt. And, the old modem
has been running 24/7 for fourteen years.
Fair. If it was me, I'd upgrade.
I will upgrade eventually.
Post by Grant Taylor
But if it's working for you and you're happy.... You decide what you
want to do.
I want to know what I'm doing slightly better than I do now 8-)
Post by Grant Taylor
Post by bob prohaska
Seems to be 8 sequential IPs out of a larger subnet. The netmask is 255.255.255.0
That makes the networking side of my brain ~twitch~.
Okay.
Post by bob prohaska
I can use seven, plus one for the router
ACK
I gather this isn't an ideal setup in your view...is it worth taking
up with my ISP? I think they'll be responsive to well-phrased questions.

[now referring to bridging, as opposed to one-to-one NAT]
Post by Grant Taylor
Post by bob prohaska
Will it be "better" in some way than one-to-one NAT, apart fron not
needing a router that supports one-to-one NAT (which alone is helpful).
IMHO, no. I think it's actually worse. I say this because the servers
are exposed to the internet without any L3 filtering. I find this to be
a bad idea.
There are options to do L3 filtering on L2. (EBTables comes to mind.)
I generally prefer to have an L3 router / firewall at my edge unless I
have a very specific reason to not do so.
It's unclear if my bridge sees all traffic on the entire subnet; I'd expect
the ISP to filter out extraneous packets but I've never asked.
Post by Grant Taylor
Post by bob prohaska
Not sure I understand this; my servers use 127.0.0.1 as a loopback
address. Are you saying they'd use their public IPs for that purpose
as well?
Your servers would use static private IPs. The router would route the
given external IP via said static IP. The server would have said public
IP bound to a network interface.
Said network interface is frequently called a "loopback" but it does not
have to be and is usually different than the ""interface (if there is
one) that holds the 127.0.0.1/8 network.
You can create dummy interfaces in Linux. You can add what are called
"Loopback" interfaces to Windows. These show up as additional network
interfaces.
Note: The last time I looked, Windows didn't actually have an interface
with 127.0.0.1/8 bound to it. Instead it's a software / routing construct.
Post by bob prohaska
The goal is to have public servers and private workstations on the end of
one DSL circuit. The servers (web, mail and name) need to be accessible
from the private network as well. The private workstations likewise need
access to both my servers and the rest of the net.
There are many ways to do that.
In a sense that's part of my trouble; too many ways to skin the same cat.
Post by Grant Taylor
Post by bob prohaska
I'd also like to minimize cost and power consumption. The servers are
all Raspberry Pi 2, probably to be replaced by Pi3's as 32 bit fades.
The workstations are a Pi3 and a couple of elderly Macs that are off
when unused. No gaming, no streaming, so speed isn't an issue.
This doesn't make /much/ difference in the networking. About the only
thing it does change is if you are looking for Gig Ether or 100 Meg
Ether. But that's largely immaterial to the network configuration.
Maybe equipment acquisition.
For my purposes, 10 Meg is actually fast enough.
Post by Grant Taylor
I suspect the biggest difference will be the number of ports in a switch
that's part of the modem. (If you go that route.)
The modem/routers I've contemplated have four switch ports unless I want
commercial grade equipment, which seems extravagant.
Post by Grant Taylor
Post by bob prohaska
I bought DSL service and equipment from AT&T in 2004. It just worked
and I never explored it carefully, so I'm entering a whole new world
Fair enough.
It sounds like you've had good service with what you bought and got your
money's worth out of it.
I think so.
Post by Grant Taylor
Post by bob prohaska
I like the idea of preserving old equipment that's still useful, but
time takes its toll. Sometimes progress happens also 8-)
I'm used to surges destroying equipment in that time frame.
Particularly DSL / Cable modems. Sometimes switches.
Lost one switch to age and heat, but that's all.
Post by Grant Taylor
Post by bob prohaska
That's fully understood. A router using openWRT, or at least one that
supports it, would be welcome. One problem is identifying good candidate
hardware.
How many ports at what speed are you wanting?
Right now I have seven wired Ethernet devices. Whether they are
split between public and private networks, or all private, depends
on how/if NAT is employed.
Post by Grant Taylor
Would you prefer the modem also contain the switch? Or do you want
separate?
In priciple separate seems more flexible. In practice I'm not sure it
matters.
Post by Grant Taylor
What do you think your ideal situation is? Why do you think that?
That's a big part of what I'm trying to figure out. In the original setup
I was happy to have anything that worked. Now that I'm being pushed to
upgrade there's a chance to optimize, but "better is the enemy of good
enough" and I'm wary of that trap.
Post by Grant Taylor
I ask more trying to learn your use case than to question what you're doing.
Understood. I started the project years ago as an educational hobby and
have come to rely on it. I'd like to avoid internet services that support
themselves by data mining.
Post by Grant Taylor
Post by bob prohaska
That appears to be what the Cayman does now; I can assign a public IP to
one of my servers and it can communicate outside. Meanwhile the other
servers and workstations can use NAT. It seems to have trouble talking
to the private net, but that's likely my fault.
Do your servers also have a private IP? Or do they only have the public IP?
Right now the servers have private IP and rely on the modem/router to translate
the private IPs to and from the corresponding public ones. I'm in the process of
changing two test hosts to use public IPs that pass directly through the bridged
modem/router to the ISP's default gateway. If that works I can get by without
one-to-one NAT, but I gather that might not be an improvement in your view.
Post by Grant Taylor
I'm sure there are FCC (et al) restrictions that are applied to modems /
firmware (particularly in the wireless RF space). But I would think
that /something/ would exist /somewhere/. I have no idea what or where.
The ISP offers SmartRG modems and routers for a $60 deposit. When I objected
to the paucity of manuals they suggested TP-Link products, which do seem to
have reasonably informative manuals. A commercial modem with a router that
supports either openWRT or DD-wrt looks like a plausible combination.

Thanks again for reading, all thoughts welcome!

bob prohaska
Grant Taylor
2019-03-09 21:28:57 UTC
Permalink
Post by bob prohaska
I will upgrade eventually.
I want to know what I'm doing slightly better than I do now 8-)
*ASCIItumbsUp*
Post by bob prohaska
I gather this isn't an ideal setup in your view...
Eh.... I think it's unclean from a subneting point of view.

There's nothing wrong with it per say. I just don't care for it. As in
personal opinion.

It does complicate things a little bit in that you have to have some
form of layer 2 connectivity between the equipment with the IPs and the
ISP. It's not a traditional routed situation.

So, you are going to need something like bridging / proxy ARP / NATing.
Post by bob prohaska
is it worth taking up with my ISP?
I doubt it.

The ISPs that I've seen either use traditional subneting & routing -or-
what your ISP is going. The two configurations are different and
usually aren't interchangeable.

Sort of like Metric and English bolts aren't interchangeable. They can
both do the job. But tooling / documentation / administrative
interfaces are usually geared towards one or the other and don't like
switching.

You can ask about a routed /29 via the outside of your router. But I
wouldn't hold my breath.

Even then, you'd only have 6 (5) usable IPs (one for the router).
Post by bob prohaska
I think they'll be responsive to well-phrased questions.
I don't even know what question to ask, much less how to phrase it well.

If this is working, I think there are other better things to spend time on.

You might inquire what their current solution is for multiple IPs.
Their preferred solution might have changed since you set things up.
Post by bob prohaska
[now referring to bridging, as opposed to one-to-one NAT]
It's unclear if my bridge sees all traffic on the entire subnet; I'd
expect the ISP to filter out extraneous packets but I've never asked.
I would not expect that.

Depending on the technology, DSL / Cable Modem / other, your WAN
interface will likely see at least broadcast traffic for other systems.
It will also likely see externally initiated traffic to your IPs,
especially since you have a block used for servers.

I would expect that there is quite a bit of noise / other traffic that
you'd prefer wasn't on the WAN interface.

Much of this noise falls into the broad category of "Internet Background
Radiation".
Post by bob prohaska
In a sense that's part of my trouble; too many ways to skin the same cat.
I understand. I frequently have to play with puzzle pieces, turn them
over, spin them around, find what I like and try putting them together.
Post by bob prohaska
For my purposes, 10 Meg is actually fast enough.
Cool.

So anything that does 10 Mbps or better is acceptable to you. That
means that there are more choices than if you wanted 1 Gbps. But that's
okay.
Post by bob prohaska
The modem/routers I've contemplated have four switch ports unless I
want commercial grade equipment, which seems extravagant.
ACK

I think I've seen routers, sans modem, that had eight ports for the LAN
and one port for the WAN.

How many devices do you need to connect now? How many spare ports would
you like to have?

Is four enough? Or do you want more?

Can a switch / router / modem combo provide enough ports? Or are you
looking at an external switch anyway?
Post by bob prohaska
I think so.
:-)
Post by bob prohaska
Lost one switch to age and heat, but that's all.
IMHO that's actually quite good.
Post by bob prohaska
Right now I have seven wired Ethernet devices. Whether they are split
between public and private networks, or all private, depends on how/if
NAT is employed.
ACK

So a single four port switch is not going to suffice for your current
needs, much less give growth opportunity.
Post by bob prohaska
In priciple separate seems more flexible. In practice I'm not sure
it matters.
It sounds like eight LAN ports is your minimum. I don't know if a
switch / router / modem exists that has all of that. So you may have to
have an external switch or modem.

Note: My ignorance of such a device does not preclude it from existing.
Post by bob prohaska
That's a big part of what I'm trying to figure out. In the original setup
I was happy to have anything that worked. Now that I'm being pushed to
upgrade there's a chance to optimize, but "better is the enemy of good
enough" and I'm wary of that trap.
Fair.

I often but heads with that.

So let me ask you the question I ask myself / used to ask my clients.

Is there anything you wanted to do but were unable to do with your
current configuration?

Is there anything you have been pondering and would like to do if the
new configuration allowed it?
Post by bob prohaska
Understood. I started the project years ago as an educational hobby
and have come to rely on it. I'd like to avoid internet services that
support themselves by data mining.
Fair enough.
Post by bob prohaska
Right now the servers have private IP and rely on the modem/router
to translate the private IPs to and from the corresponding public
ones. I'm in the process of changing two test hosts to use public IPs
that pass directly through the bridged modem/router to the ISP's default
gateway. If that works I can get by without one-to-one NAT, but I gather
that might not be an improvement in your view.
It depends on the network topology. I would rather have something to
provide some control over the connections to the IPs.

This is another reason that I like the actual routed subnet. I can more
easily move it elsewhere in my network.
Post by bob prohaska
The ISP offers SmartRG modems and routers for a $60 deposit. When I
objected to the paucity of manuals they suggested TP-Link products,
which do seem to have reasonably informative manuals. A commercial
modem with a router that supports either openWRT or DD-wrt looks like
a plausible combination.
I've been happy with my TP-Link equipment (switches).
Post by bob prohaska
Thanks again for reading, all thoughts welcome!
You're welcome.
--
Grant. . . .
unix || die
bob prohaska
2019-03-10 04:31:35 UTC
Permalink
[trimmed a little, hopefully for clarity]
[on bridging vs subnetting]
Post by Grant Taylor
Post by bob prohaska
I gather this isn't an ideal setup in your view...
Eh.... I think it's unclean from a subneting point of view.
There's nothing wrong with it per say. I just don't care for it. As in
personal opinion.
It does complicate things a little bit in that you have to have some
form of layer 2 connectivity between the equipment with the IPs and the
ISP. It's not a traditional routed situation.
So, you are going to need something like bridging / proxy ARP / NATing.
I'm thinking that can't be helped....there isn't (yet) an Ethernet jack
in every home 8-)
Post by Grant Taylor
Post by bob prohaska
is it worth taking up with my ISP?
I doubt it.
The ISPs that I've seen either use traditional subneting & routing -or-
what your ISP is going. The two configurations are different and
usually aren't interchangeable.
[snip]
Post by Grant Taylor
You can ask about a routed /29 via the outside of your router. But I
wouldn't hold my breath.
Even then, you'd only have 6 (5) usable IPs (one for the router).
That is what I had formerly with AT&T: The Cayman was configured with PPPoE,
a login and password. 8 IPs, one for netmask, one for broadcast address,
one for the router, 5 for me.

The new ISP is using something called RFC-1483 bridging. There is no login or
password, all outbound traffic goes to the ISP's gateway. The Cayman occupies
one public address for its internal router and uses that to support a private
network. It will also do static NAT between public and private addresses.
Post by Grant Taylor
You might inquire what their current solution is for multiple IPs.
Their preferred solution might have changed since you set things up.
Bridging was what they preferred a year ago when I transferred my
service from AT&T. I asked for minimal changes, bridging was what
I got, using eight consecutive IP's. I'd rather not rock the boat
further without good cause.
Post by Grant Taylor
Post by bob prohaska
[now referring to bridging, as opposed to one-to-one NAT]
It's unclear if my bridge sees all traffic on the entire subnet; I'd
expect the ISP to filter out extraneous packets but I've never asked.
I would not expect that.
Depending on the technology, DSL / Cable Modem / other, your WAN
interface will likely see at least broadcast traffic for other systems.
Ok, that's noise.
Post by Grant Taylor
It will also likely see externally initiated traffic to your IPs,
especially since you have a block used for servers.
That I'd call signal.
Post by Grant Taylor
I would expect that there is quite a bit of noise / other traffic that
you'd prefer wasn't on the WAN interface.
I've done a preliminary experiment using two hosts set to use public
IPs and default route that points to the ISP's gateway. If I run
arp -a on each of those hosts they don't see each other, only the
ISP's gateway address, their own address and my router's public
address. Each can ping the other and outside, so connectivity is ok,
but I thought they'd report arp entries for every other host on the
visible subnet. This isn't a traffic measurement, but I thought
it might be at least a traffic source count. The sources are few.

Running arp -a on my private net all the hosts show up, which is
what I expected.
Post by Grant Taylor
So anything that does 10 Mbps or better is acceptable to you. That
means that there are more choices than if you wanted 1 Gbps. But that's
okay.
Post by bob prohaska
The modem/routers I've contemplated have four switch ports unless I
want commercial grade equipment, which seems extravagant.
ACK
I think I've seen routers, sans modem, that had eight ports for the LAN
and one port for the WAN.
Industrial, maybe?

[snip]
Post by Grant Taylor
So a single four port switch is not going to suffice for your current
needs, much less give growth opportunity.
'fraid so.
Post by Grant Taylor
Post by bob prohaska
In priciple separate seems more flexible. In practice I'm not sure
it matters.
It sounds like eight LAN ports is your minimum. I don't know if a
switch / router / modem exists that has all of that. So you may have to
have an external switch or modem.
I certainly haven't seen one at the consumer retail level.

[snip]
Post by Grant Taylor
So let me ask you the question I ask myself / used to ask my clients.
Is there anything you wanted to do but were unable to do with your
current configuration?
Not at all. I was happy as a clam until AT&T told me to get U-verse
or get lost. I moved to another telco/ISP, they preferred bridged
connections. Everything seemed ok till I noticed infrequent DSL hangs.
They told me I needed to upgrade the modem. The first domino fell.
Post by Grant Taylor
Is there anything you have been pondering and would like to do if the
new configuration allowed it?
I'm just adapting to changing times, at most a minute ahead.
Adding redundant connectivity would be interesting, but it's far
from necessary and for now fairly expensive.
[snip]
Post by Grant Taylor
It depends on the network topology. I would rather have something to
provide some control over the connections to the IPs.
I understand the value of being able to interpose a firewall but am
uncertain of the need, at least for host OS's designed for server use.
Workstations, especially older ones, are best kept behind many-to-one NAT.
If one doesn't control what gets plugged into the network, then yes,
a firewall under control makes sense.
Post by Grant Taylor
This is another reason that I like the actual routed subnet. I can more
easily move it elsewhere in my network.
Understood, but my network is rather tiny 8-)

[snip]
Post by Grant Taylor
I've been happy with my TP-Link equipment (switches).
That's a useful insight, are there any brands you avoid?


Thanks once again for reading!

bob prohaska
Grant Taylor
2019-03-10 17:53:12 UTC
Permalink
Post by bob prohaska
[trimmed a little, hopefully for clarity]
;-)
Post by bob prohaska
I'm thinking that can't be helped....there isn't (yet) an Ethernet jack
in every home 8-)
bridging / proxy ARP / NATing is L2 frame / L3 packet handling
methodology that are independent of the L1 physical network.
Post by bob prohaska
That is what I had formerly with AT&T: The Cayman was configured with
PPPoE, a login and password. 8 IPs, one for netmask, one for broadcast
address, one for the router, 5 for me.
ACK
Post by bob prohaska
The new ISP is using something called RFC-1483 bridging. There is no
login or password, all outbound traffic goes to the ISP's gateway.
RFC-1483 bridging is my preferred method. (I dislike PPPoE.) It
basically bridges Ethernet frames onto the underlying DSL network
technology.

My dislike of PPPoE largely has to do with MTU / MSS complications.
Post by bob prohaska
The Cayman occupies one public address for its internal router and uses
that to support a private network. It will also do static NAT between
public and private addresses.
I'm guessing that the Cayman has multiple (eight in this case) IPs on
the outside that come from the ISP's public network and has what ever
configured for the private on the inside. I'm guessing it can likely
DNAT public IPs to specified internal private IPs. Likewise it will
SNAT the specified internal private IPs to the associated public IP.
Post by bob prohaska
Bridging was what they preferred a year ago when I transferred my service
from AT&T. I asked for minimal changes, bridging was what I got, using
eight consecutive IP's. I'd rather not rock the boat further without
good cause.
Agreed.

I'm just suggesting asking a question to make sure that you don't get on
the legacy boat because that's what you currently have. Especially if
the current boat offers more features and / or is cheaper. ;-)

IMHO it never hurts to ask. You can always decide stick with the
original boat.
Post by bob prohaska
Ok, that's noise.
That I'd call signal.
Agreed on both accounts.
Post by bob prohaska
I've done a preliminary experiment using two hosts set to use public IPs
and default route that points to the ISP's gateway. If I run arp -a on
each of those hosts they don't see each other, only the ISP's gateway
address, their own address and my router's public address. Each can ping
the other and outside, so connectivity is ok, but I thought they'd report
arp entries for every other host on the visible subnet.
I've never relied on arp -a to show me all hosts in a subnet. My
understanding is that it will show entries in the local ARP cache that
haven't expired. So if the local host hasn't communicated with a host
in the local broadcast domain, chances are good that arp -a won't show it.

You can do things like a ping scan to cause the system to try to
communicate with all local hosts thereby populating the ARP cache.

Also, arp -a will inherently only show you IPs that are in directly
attached subnets. So if you have public IPs without any private IPs,
anything to the private IPs will get routed and pass through the router.
Conversely if you add the private IP, communications may be direct.
Post by bob prohaska
This isn't a traffic measurement, but I thought it might be at least a
traffic source count. The sources are few.
ACK

It's /a/ measurement. It's important to keep in mind /what/ that
measurement is.
Post by bob prohaska
Running arp -a on my private net all the hosts show up, which is what
I expected.
Depending on how many hosts you have and how they communicate with each
other, I'm somewhat surprised by that.
Post by bob prohaska
Industrial, maybe?
Na.

I used to install Netgear FVS318 series routers. They had one WAN port
and eight LAN ports. All of which were Ethernet.

I know that I worked with others. I just don't remember make or model.

I always considered the FVC318 to be more professional than residential,
but far from industrial. Industrial implies different things that make
equipment considerably more expensive. Physically hardened, wider
temperature range, more robust power supplies, etc.
Post by bob prohaska
'fraid so.
Okay.

So that probably removes some lower end devices from your preferred choices.
Post by bob prohaska
I certainly haven't seen one at the consumer retail level.
Don't limit your search scope to what is carried in box stores.

I've found that there are a LOT of things available on line. Retail /
aftermarket / etc.
Post by bob prohaska
Not at all. I was happy as a clam until AT&T told me to get U-verse
or get lost. I moved to another telco/ISP, they preferred bridged
connections. Everything seemed ok till I noticed infrequent DSL hangs.
They told me I needed to upgrade the modem. The first domino fell.
ACK
Post by bob prohaska
I'm just adapting to changing times, at most a minute ahead. Adding
redundant connectivity would be interesting, but it's far from necessary
and for now fairly expensive.
Ya.

Redundant connectivity gets expensive and complex fast.

If it's another DSL like, why not use it in parallel. If it's dial up,
that has it's own issues.

Then there's what do you do with the routing of your public IPs when the
primary connection is out.

Yuck. What did I just step in. ;-)
Post by bob prohaska
I understand the value of being able to interpose a firewall but am
uncertain of the need, at least for host OS's designed for server use.
Workstations, especially older ones, are best kept behind many-to-one
NAT. If one doesn't control what gets plugged into the network, then yes,
a firewall under control makes sense.
To each his / her own.

One advantage of the network edge firewall is that you can more easily
detect malicious activity that crosses systems and take action without
needing to get the host based firewalls to communicate with each other.
If you care about that sort of thing.
Post by bob prohaska
Understood, but my network is rather tiny 8-)
Most of the networks I've worked with are tiny. Seldom more than one
public and one private subnet.

Many had port forwarded services to an internal server.
Post by bob prohaska
That's a useful insight, are there any brands you avoid?
There is one brand. But it's more personal bias than anything. I
always felt like Linksys left me wanting compared to Netgear and D-Link.
It didn't help that I had a Linksys physically fall apart while
unboxing it one day.

I've used and supported all of the following brands (in alphabetical order):

· Asus
· Cisco
· D-Link
· Dynex
· Juniper
· Linksys
· Netgear
· TP-Link
· TrendNet

I know that there are other brands that I've supported. I just can't
remember them.

By far, my favorite thing to do is to repurpose an old workstation into
a Linux router that I have complete control over. Physical interface
requirements are what usually deter me from that.
Post by bob prohaska
Thanks once again for reading!
You're welcome.
--
Grant. . . .
unix || die
bob prohaska
2019-03-12 02:53:07 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
[trimmed a little, hopefully for clarity]
;-)
Post by bob prohaska
I'm thinking that can't be helped....there isn't (yet) an Ethernet jack
in every home 8-)
bridging / proxy ARP / NATing is L2 frame / L3 packet handling
methodology that are independent of the L1 physical network.
Ok, things are beginning to click....along with some grinding and scraping....
Post by Grant Taylor
I'm just suggesting asking a question to make sure that you don't get on
the legacy boat because that's what you currently have. Especially if
the current boat offers more features and / or is cheaper. ;-)
IMHO it never hurts to ask. You can always decide stick with the
original boat.
The boats I know about are DSL over POTS, terrestrial wireless, TV cable
and U-verse. Among them, DSL over POTS seems the least expensive adequate
alternative. Apart from bridged vs routed are there any other boats afloat?
Even in the case of bridged, wouldn't the ISP want to route only my IP
block to my modem, so I can't cause IP conflicts via typing errors?
Post by Grant Taylor
It's /a/ measurement. It's important to keep in mind /what/ that
measurement is.
Ok, thanks, I didn't appreciate the limitations of arp -a measurement.
Post by Grant Taylor
I used to install Netgear FVS318 series routers. They had one WAN port
and eight LAN ports. All of which were Ethernet.
I always considered the FVC318 to be more professional than residential,
but far from industrial. Industrial implies different things that make
equipment considerably more expensive. Physically hardened, wider
temperature range, more robust power supplies, etc.
Found them on Amazon. If I were running a business I'd be tempted.
For a hobby it seems a bit much (speed, cost, power) but nice.
Post by Grant Taylor
I've found that there are a LOT of things available on line. Retail /
aftermarket / etc.
On line seems to be the only useful source. DSL modems can't be had
other than online. I've thought about used equipment from surplus
shops, but it seems that older equipment tends to be power-hungry
and at twenty cents per kWh it gets expensive to feed. Also I'm
not sure it ages well, no matter how well-made.
Post by Grant Taylor
Redundant connectivity gets expensive and complex fast.
If it's another DSL like, why not use it in parallel. If it's dial up,
that has it's own issues.
Then there's what do you do with the routing of your public IPs when the
primary connection is out.
Yuck. What did I just step in. ;-)
Just to explore the "yuck" notion, there are half a dozen home wifi networks
within range of mine. Is it technically feasible (nothing about politics or
economics) to set up an ad-hoc sharing arrangement where if my broadband goes
down I can shift my traffic over the neighbor's broadband links temporarily?
Obviously there'd have to be reciprocity, so if _their_ links go down I'll
take some of their traffic. Would such a scheme require explicit cooperation
from the ISPs involved? I suspect it's doable, but how difficult?
Post by Grant Taylor
One advantage of the network edge firewall is that you can more easily
detect malicious activity that crosses systems and take action without
needing to get the host based firewalls to communicate with each other.
If you care about that sort of thing.
This looks like one of the features of the FVS318, I can understand the
appeal.
Post by Grant Taylor
Post by bob prohaska
That's a useful insight, are there any brands you avoid?
There is one brand. But it's more personal bias than anything. I
always felt like Linksys left me wanting compared to Netgear and D-Link.
It didn't help that I had a Linksys physically fall apart while
unboxing it one day.
That is a considerable surprise. I always thought, utterly without basis,
that Linksys was a premier brand.
Post by Grant Taylor
? Asus
? Cisco
? D-Link
? Dynex
? Juniper
? Linksys
? Netgear
? TP-Link
? TrendNet
I'll keep those names in mind, though Cisco and Juniper seem out of my
league.
Post by Grant Taylor
By far, my favorite thing to do is to repurpose an old workstation into
a Linux router that I have complete control over. Physical interface
requirements are what usually deter me from that.
What do you think of projects like openWRT? In principle it seems like
a good idea, but I have no clue about the practice. At least the hardware
is cheap, low power and readily available.


With my thanks!

bob prohaska
Grant Taylor
2019-03-12 20:22:28 UTC
Permalink
Post by bob prohaska
Ok, things are beginning to click....along with some grinding and scraping....
Cool!
Post by bob prohaska
The boats I know about are DSL over POTS, terrestrial wireless, TV
cable and U-verse. Among them, DSL over POTS seems the least expensive
adequate alternative. Apart from bridged vs routed are there any other
boats afloat?
Er, perhaps my analogy was a little too broad. I was thinking more
which type of DSL-over-POTS boat might be best. I.e. have a chat with
your preferred ISP and ask what their current solution is. Maybe they
have something you'll like better than what you had. Maybe they won't.
But it might be worth the 5 ~ 15 minutes conversation to find out and
know for sure. ;-)
Post by bob prohaska
Even in the case of bridged, wouldn't the ISP want to route only my IP
block to my modem, so I can't cause IP conflicts via typing errors?
Conceptually I agree with you. Practically, I have not seen that done.
I think it is technically possible.

I, and my customers, have been victim to such an accident in the past.

It comes down to the RoI for more stringent configurations to help
prevent said accidents.
Post by bob prohaska
Ok, thanks, I didn't appreciate the limitations of arp -a measurement.
:-)
Post by bob prohaska
Found them on Amazon. If I were running a business I'd be tempted.
For a hobby it seems a bit much (speed, cost, power) but nice.
Fair enough. Another informed decision. :-)
Post by bob prohaska
On line seems to be the only useful source. DSL modems can't be had
other than online.
Best Buy (and comparable) have usually had basic DSL modems in the two
haunts that I've lived in. But each haunt is different.
Post by bob prohaska
I've thought about used equipment from surplus shops, but it seems that
older equipment tends to be power-hungry and at twenty cents per kWh
it gets expensive to feed. Also I'm not sure it ages well, no matter
how well-made.
Fair enough.

DSL and dial up modems have a habit of being damaged by nearby lightning.

I get the power hungry and desire to not pay / feed the kW monster.
That might be a reason to see what your ISP has on offer. It will
likely be newer and less power hungry. Maybe. Possibly.
Post by bob prohaska
Just to explore the "yuck" notion, there are half a dozen home wifi
networks within range of mine. Is it technically feasible (nothing about
politics or economics) to set up an ad-hoc sharing arrangement where
if my broadband goes down I can shift my traffic over the neighbor's
broadband links temporarily?> Obviously there'd have to be reciprocity,
so if _their_ links go down I'll take some of their traffic.
Yes, it is technically quite feasible. Especially if said neighbor is
using a different broadband technology.

Of course, there are a number of other complications in doing so. Not
the least of which is /how/ it's done. (This is an entire sub-set of
things to consider.)

Assuming that you and your friendly neighbor want to do this, another
issue is, do you allow your neighbor to have access to your internal
LAN? Or just your Internet connection.

There are more questions. But this is certainly possible to do. Let's
start a new thread about that if you want to explore it.
Post by bob prohaska
Would such a scheme require explicit cooperation from the ISPs involved?
No, it would not. You and your neighbor(s) can do this completely
independent of your ISP(s).

Note: Some ISPs might start to get cranky if you try to make a profit
by re-selling their service. But cost splitting and sharing of service
is usually okay. It's just a grey line to be aware of.

But it is quite technically feasible to do.
Post by bob prohaska
I suspect it's doable, but how difficult?
It depends.

On the surface, giving your neighbor access to your Internet connection
can be as simple as having them connect to your network.

But it would be for the two of you to have a router that supports
multiple Internet connections. The primary being your ISP and the
secondary being your neighbor's network. - Depending on the router,
you may have to tweak some settings to prefer the primary and only fall
to the secondary when the primary is out.
Post by bob prohaska
This looks like one of the features of the FVS318, I can understand
the appeal.
It's been at least 10 years since I last looked at the FVS318. I may be
forgetting some things.
Post by bob prohaska
That is a considerable surprise. I always thought, utterly without basis,
that Linksys was a premier brand.
I know a lot of friends and colleagues that liked Linksys. Many of them
refused to use anything else.

I guess I just had different experience.
Post by bob prohaska
I'll keep those names in mind, though Cisco and Juniper seem out of
my league.
Traditional Cisco and Juniper are quite pricey. Remember that Cisco
bought Linksys. (I don't know if they still own them or if Linksys is
back out on their own.)
Post by bob prohaska
What do you think of projects like openWRT? In principle it seems like a
good idea, but I have no clue about the practice. At least the hardware
is cheap, low power and readily available.
I have used OpenWRT a few times. One of the last times was on the
Linksys WRT54GL. (I tied three of them together via network and
literally with zip ties.)

I'm getting ready to use OpenWRT on the GL.iNet's GL-AR750.

I think that it's probably likely that the GL-AR750 could be used with
it's stock firmware (which is itself a custom OpenWRT) to tie your
network to your neighbors network.

You have the 1st interface towards your Internet connection (external
bridging DSL modem), the 2nd interface towards your LAN (likely with the
wireless), and the 3rd interface towards your neighbor's LAN (via wired
or wireless).

There are a LOT of things that can be done.
Post by bob prohaska
With my thanks!
:-)
--
Grant. . . .
unix || die
bob prohaska
2019-03-14 00:40:03 UTC
Permalink
Grant Taylor <***@tnetconsulting.net> wrote:

[on sharing broadband connections among neighbors]
Post by Grant Taylor
There are more questions. But this is certainly possible to do. Let's
start a new thread about that if you want to explore it.
I suspect attempting to multi-home my network via the neighbor's
WiFi is a little (lot?) beyond my skill level at this point.
Let's defer that conversation for later 8-)

More immediately, I've re-arranged my setup to eliminate the
use of static NAT: The modem is still in bridge mode, the
public hosts now use public IPs and my private hosts are
on a 192.168.1.x network using the Cayman's internal router.

The diagram looks like

phonejack------dslmodem/router------------privatenet
|
|
switch---------servers

To my surprise, even though the modem's internal switch is
now carrying public IP traffic, the same switch still carries
192.168.1.x traffic and the modem/router can be administered
via the local address. Is this what you meant by putting
unrouted traffic on a routed network?

Placing a single-point firewall between the wilder world and
my servers looks do-able using a second router (with appropriate
software) upstream of the servers. I'm imagining separate
modem, switches and routers in a layout like this:

phonejack-----modem
|
|
switch0---router1-----switch1------privatenet
|
|
router2----switch2----servers

I gather openWRT on the routers would allow me to implement firewall
functions, assuming I can figure out how to write firewall rules 8-)
Does this look like a reasonable setup?

It's kinda surprising what replacing a modem can lead to ......

8-)

bob prohaska
Grant Taylor
2019-03-14 20:18:01 UTC
Permalink
I suspect attempting to multi-home my network via the neighbor's WiFi
is a little (lot?) beyond my skill level at this point. Let's defer
that conversation for later 8-)
Maybe. Maybe not. That's the wonderful thing about skill level. You
can change it if you want to. ;-)
More immediately, I've re-arranged my setup to eliminate the use of
static NAT: The modem is still in bridge mode, the public hosts now use
public IPs and my private hosts are on a 192.168.1.x network using the
Cayman's internal router.
The diagram looks like
phonejack------dslmodem/router------------privatenet
|
|
switch---------servers
To my surprise, even though the modem's internal switch is now carrying
public IP traffic, the same switch still carries 192.168.1.x traffic
and the modem/router can be administered via the local address. Is this
what you meant by putting unrouted traffic on a routed network?
I don't remember the exact context or what was in my head when I typed that.

That certainly qualifies as putting multiple subnets on the same network
(broadcast domain). One subnet is globally routed and the other subnet
is not globally routed.

So, I'm going to say that yes, that's likely close to what I was thinking.

I wonder what sort of filtering, if any, that your modem / router does.
I'd hate to think that someone else on your same DSL network could get
creative with their network and access your private network across the DSL.

Note: There is likely no separation to prevent one of your servers from
having a private IP added to it and directly talking to your private
network.
Placing a single-point firewall between the wilder world and my servers
looks do-able using a second router (with appropriate software) upstream
of the servers. I'm imagining separate modem, switches and routers in
phonejack-----modem
|
|
switch0---router1-----switch1------privatenet
|
|
router2----switch2----servers
Please elaborate on what you mean by "with appropriate software".

Routers generally form a layer 3 /routed/ boundary. Something which I
thought you just did further up in the message.

Maybe "router" is an overly broad term. Perhaps you mean a device to
act as a firewall on layer 2. - Routers can do this, but terminology
gets tricky.
I gather openWRT on the routers would allow me to implement firewall
functions, assuming I can figure out how to write firewall rules 8-)
Depending on which router you run OpenWRT on, I think you can get by
with a single router. Use one port 0 (or 3) to connect to the modem,
port 1 to connect to switch 1, and port 2 to connect to switch 2.

Have OpenWRT do basic filtering (likely with EBTables or Bridged
Netfilter) between the modem on port 0 (3) and port 2 where the public
servers are connected. Do standard NAT for traffic leaving the LAN on
port 1.
Does this look like a reasonable setup?
Yes.

I do wonder if a second router is actually needed.
It's kinda surprising what replacing a modem can lead to ......
Yep.
8-)
;-)
--
Grant. . . .
unix || die
bob prohaska
2019-03-15 18:54:23 UTC
Permalink
Post by Grant Taylor
More immediately, I've re-arranged my setup to eliminate the use of
static NAT: The modem is still in bridge mode, the public hosts now use
public IPs and my private hosts are on a 192.168.1.x network using the
Cayman's internal router.
The diagram looks like
phonejack------dslmodem/router------------privatenet
|
|
switch---------servers
To my surprise, even though the modem's internal switch is now carrying
public IP traffic, the same switch still carries 192.168.1.x traffic
and the modem/router can be administered via the local address. Is this
what you meant by putting unrouted traffic on a routed network?
I don't remember the exact context or what was in my head when I typed that.
That certainly qualifies as putting multiple subnets on the same network
(broadcast domain). One subnet is globally routed and the other subnet
is not globally routed.
So, I'm going to say that yes, that's likely close to what I was thinking.
I wonder what sort of filtering, if any, that your modem / router does.
IIUC, in bridge mode the modem presents all traffic offered by the ISP
to the Cayman's internal switch. The switch then sorts traffic by IP/MAC
address among my servers and its own internal router.
Post by Grant Taylor
I'd hate to think that someone else on your same DSL network could get
creative with their network and access your private network across the DSL.
By DSL network do you mean the public subnet to which my modem is attached?
I agree that would be bad, but would seem equivalent to breaking the router,
a perennial risk.
Post by Grant Taylor
Note: There is likely no separation to prevent one of your servers from
having a private IP added to it and directly talking to your private
network.
I've wondered about that, and whether it would be a useful way to connect
from my private network to the servers in a way that's not visible to the
public net. I've played a little with ifconfig aliases, but failed to get
simultaneous communications using both public and private IP addresses.
Probably my error. If an intruder were to do it I think he'd have to root
a server, another perennial risk.
Post by Grant Taylor
Placing a single-point firewall between the wilder world and my servers
looks do-able using a second router (with appropriate software) upstream
of the servers. I'm imagining separate modem, switches and routers in
phonejack-----modem
|
|
switch0---router1-----switch1------privatenet
|
|
router2----switch2----servers
Please elaborate on what you mean by "with appropriate software".
Routers generally form a layer 3 /routed/ boundary. Something which I
thought you just did further up in the message.
Maybe "router" is an overly broad term. Perhaps you mean a device to
act as a firewall on layer 2. - Routers can do this, but terminology
gets tricky.
You're right, I'm being sloppy. According to the crab book the term secure
router is probably closer to right. What I'm really alluding to is the use
of a home router that can limit traffic to what's relevant to my servers
and not otherwise objectionable.
Post by Grant Taylor
I gather openWRT on the routers would allow me to implement firewall
functions, assuming I can figure out how to write firewall rules 8-)
Depending on which router you run OpenWRT on, I think you can get by
with a single router. Use one port 0 (or 3) to connect to the modem,
port 1 to connect to switch 1, and port 2 to connect to switch 2.
Have OpenWRT do basic filtering (likely with EBTables or Bridged
Netfilter) between the modem on port 0 (3) and port 2 where the public
servers are connected. Do standard NAT for traffic leaving the LAN on
port 1.
Does there have to be anything special about the router running openWRT
apart from sufficient RAM and flash memory? Any special hardware? I'm
gradually realizing that the switch directs traffic by IP number mapped to
MAC address, so traffic directed to a private address need not be offered
to a device using a public address. I was confusing switches and hubs.

It would be interesting to see how much extraneous traffic is actually
coming across the bridged modem. Would a packet sniffer or protocol analyzer
(wireshark, for example) let me see it? Conversely, could another ISP user
on the same subnet observe traffic among my servers?

This is getting complicated.....

Thanks for your patience!

bob prohaska
Grant Taylor
2019-03-15 22:16:14 UTC
Permalink
Post by bob prohaska
IIUC, in bridge mode the modem presents all traffic offered by the ISP
to the Cayman's internal switch.
Yes.

Technically many DSL modems use RFC 1483 Bridging to bridge encapsulate
Ethernet frames into ATM cells.

PPPoE has the added complication that the router sends PPP-over-Ethernet
frames out and those Ethernet frames are subsequently 1483 Bridged.

At least that's the case for traditional ATM based DSL networks. There
are older DSL networks that used Frame Relay in place of ATM. I think
there are newer DSL networks that use something in place of ATM.

But that's my understanding of how it works at a high level conceptual
view. Get the Ethernet frame from the router through the xDSL network
to the router at the ISP.

It's my understanding that Cable Modems are conceptually similar at the
10,000 foot view, but have different nuances.
Post by bob prohaska
The switch then sorts traffic by IP/MAC address among my servers and
its own internal router.
Mostly yes.

Most /switches/ operate on the Layer 2 MAC address.

Most /routers/ operate on the Layer 3 IP address.

I say /most/ because there are layer 3 switches and some routers can
also operate at layer 2.

So, an IP packet will:

1) The DSL modem demodulates the signal and provides ATM cells.
2) ATM cells are decapsulated and provide Ethernet frames.
3) Ethernet frames go to the switch.
4) The switch sends the frame out based on the destination MAC address.
5) The router or server receives the Ethernet frame.
6) Performs any firewalling and / or NAT processing.

This is where the path diverges depending on if the frame is to your
router or one of your servers.

Router:
7) Routes the packet to the proper destination IP.
(ARP happens at this point if needed.)
8) The router sends the new Ethernet frame to the switch.
9) GOTO step 4 above.

Server:
7) Sends the IP packet up the IP stack for processing.

Traffic to / from the private LAN actually passes through the same
switch twice, using different IPs (thanks to NAT) and different MAC
addresses.

This is a conceptual overview and makes a few assumptions. Said
assumptions would alter minutia and IMHO don't largely alter the overview.
Post by bob prohaska
By DSL network do you mean the public subnet to which my modem is attached?
Yes, I do.
Post by bob prohaska
I agree that would be bad, but would seem equivalent to breaking the
router, a perennial risk.
It actually doesn't require breaking anything.

Consider a common switch in step 4 above.

Someone on the same DSL network could conceptually configure one of
their machines with an IP address that matches your private network,
send an Ethernet frame to one of your internal MAC addresses and your
switch would see it come in from the DSL modem and send it directly to
your internal computer, just like it would do with an Ethernet frame
from your router. The switch has very little way to tell the difference.

I say conceptually because the ISP can configure the DSL network in such
a way that this is less likely to happen, and it is possible to teach a
switch to treat things differently. But this requires work and I
wouldn't bet on it happening. As such, I would assume that my internal
machines are directly accessible from other machines on the ISP's DSL
network.

This is where the Layer 2 firewall that I mentioned in a previous
message comes into play. Something to filter and protect the internal
machines.
Post by bob prohaska
I've wondered about that, and whether it would be a useful way to connect
from my private network to the servers in a way that's not visible to the
public net.
There is a reasonable chance that something else on the DSL network
would see broadcasts escape from your private network. Thus they would
learn about your internal network. They could use this knowledge to
perpetuate the attack I mentioned above.
Post by bob prohaska
I've played a little with ifconfig aliases, but failed to get simultaneous
communications using both public and private IP addresses. Probably my
error.
It should be simple to do.

ip addr add 192.0.2.123/24 dev eth0

Assuming that you are using Test-Net-1 and are connected to eth0.
Post by bob prohaska
If an intruder were to do it I think he'd have to root a server, another
perennial risk.
Yes, they would need something to give them remote access (any
vulnerable public service will suffice). Then they would likely need a
privilege escalation to go from non-root to root. (Assuming that the
service was running as something other than root.)

This is largely a question of /when/, not /if/. You can make the /when/
longer by keeping things up to date and trying to stay current.
Post by bob prohaska
You're right, I'm being sloppy.
I get the impression that some of this is somewhat new and / or we are
using the terms more precisely than you may have in the past. Sounds
like learning to me. IMHO learning > sloppy. ;-)
Post by bob prohaska
According to the crab book the term secure router is probably closer
to right.
I'm not familiar with "(the) crab book".
Post by bob prohaska
What I'm really alluding to is the use of a home router that can limit
traffic to what's relevant to my servers and not otherwise objectionable.
I am getting hung up on "router" as in a device that forwards traffic
from one IP subnet to a different IP subnet.

Seeing as how you want the /same/ IP subnet on both sides and are
forwarding based on the MAC addresses, that sounds like you are
switching or filtering based on layer 2.

Can something that is broadly called a router be coerced to behave this
way, probably. Is that it's default / preferred mode of operations,
doubtful.
Post by bob prohaska
Does there have to be anything special about the router running openWRT
apart from sufficient RAM and flash memory? Any special hardware?
Not really. At least not for what (I think) you are wanting to do.

There are some cases where you can potentially run into bandwidth
limitations, particularly depending on how the network interfaces are
connected to the CPU. (Ask if you want to go down this rabbit hole.)
Post by bob prohaska
I'm gradually realizing that the switch directs traffic by IP number
mapped to MAC address,
Close.

Traditional (L2) switches direct traffic by destination MAC address.
They actually have no concept of (L3) IP addresses.
Post by bob prohaska
so traffic directed to a private address need not be offered to a device
using a public address.
Traffic is directed to the destination MAC address, independent of what
IP address is in the IP packet.
Post by bob prohaska
I was confusing switches and hubs.
For this discussion, switches are just smart hubs and only send traffic
out the port that the destination MAC address is connected to.

Switches and hubs can largely be used interchangeably. At least from a
functionality point of view. Granted, you probably want to use a switch
unless you have a specific reason to use a hub.

Routers on the other hand, they behave significantly differently than
switches & hubs.
Post by bob prohaska
It would be interesting to see how much extraneous traffic is actually
coming across the bridged modem. Would a packet sniffer or protocol
analyzer (wireshark, for example) let me see it?
Absolutely.

Be warned, you might not like what you see. It will likely cause more
questions. Some of which you likely won't like the answers too. (But
that doesn't make them any valid questions.)
Post by bob prohaska
Conversely, could another ISP user on the same subnet observe traffic
among my servers?
They can /likely/ see broadcast traffic from your public servers and router.

If your switch is behaving properly, they shouldn't be able to see
traffic between your public servers.

If your switch is misbehaving or you use a hub, they /may/ be able to
see your server to server traffic. - This starts getting into the
minutia of how the ISP's network is configured and behaves. Usually
they are configured to behave like a switch too. So other subscribers
shouldn't see traffic that isn't to them. Broadcast traffic is to
everybody in the network, hence why it passes through the switch to
everybody.
Post by bob prohaska
This is getting complicated.....
Na. It's just a number of simple things that interact with each other.

Start understanding how each Lego piece works, and you can start doing
some fun ~> amazing things.

Now, when you start bending / breaking the rules and redefining how Lego
pieces behave, then it starts to get interesting.
Post by bob prohaska
Thanks for your patience!
You're welcome.

Thank you for the interest.
--
Grant. . . .
unix || die
bob prohaska
2019-03-16 07:01:47 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
IIUC, in bridge mode the modem presents all traffic offered by the ISP
to the Cayman's internal switch.
Yes.
Technically many DSL modems use RFC 1483 Bridging to bridge encapsulate
Ethernet frames into ATM cells.
PPPoE has the added complication that the router sends PPP-over-Ethernet
frames out and those Ethernet frames are subsequently 1483 Bridged.
At least that's the case for traditional ATM based DSL networks. There
are older DSL networks that used Frame Relay in place of ATM. I think
there are newer DSL networks that use something in place of ATM.
But that's my understanding of how it works at a high level conceptual
view. Get the Ethernet frame from the router through the xDSL network
to the router at the ISP.
It's my understanding that Cable Modems are conceptually similar at the
10,000 foot view, but have different nuances.
Post by bob prohaska
The switch then sorts traffic by IP/MAC address among my servers and
its own internal router.
Mostly yes.
Most /switches/ operate on the Layer 2 MAC address.
Most /routers/ operate on the Layer 3 IP address.
I say /most/ because there are layer 3 switches and some routers can
also operate at layer 2.
But in terms of consumer grade network switches, I gather they're MAC
address controlled and ignore IP addresses. It follows that consumer
routers ignore MAC addresses unless something special is done...
Post by Grant Taylor
1) The DSL modem demodulates the signal and provides ATM cells.
2) ATM cells are decapsulated and provide Ethernet frames.
3) Ethernet frames go to the switch.
4) The switch sends the frame out based on the destination MAC address.
Which does not have to be the same host as the one using the IP address?
Post by Grant Taylor
5) The router or server receives the Ethernet frame.
6) Performs any firewalling and / or NAT processing.
This is where the path diverges depending on if the frame is to your
router or one of your servers.
So, a firewall has to be hardware between steps 2 and 3?
Post by Grant Taylor
7) Routes the packet to the proper destination IP.
(ARP happens at this point if needed.)
8) The router sends the new Ethernet frame to the switch.
9) GOTO step 4 above.
7) Sends the IP packet up the IP stack for processing.
Traffic to / from the private LAN actually passes through the same
switch twice, using different IPs (thanks to NAT) and different MAC
addresses.
This is a conceptual overview and makes a few assumptions. Said
assumptions would alter minutia and IMHO don't largely alter the overview.
Post by bob prohaska
By DSL network do you mean the public subnet to which my modem is attached?
Yes, I do.
Post by bob prohaska
I agree that would be bad, but would seem equivalent to breaking the
router, a perennial risk.
It actually doesn't require breaking anything.
Consider a common switch in step 4 above.
Someone on the same DSL network could conceptually configure one of
their machines with an IP address that matches your private network,
send an Ethernet frame to one of your internal MAC addresses and your
switch would see it come in from the DSL modem and send it directly to
your internal computer, just like it would do with an Ethernet frame
from your router. The switch has very little way to tell the difference.
My first thought is that a packet with an unrouteable address would never
get to the public address of my router. It does seem that a packet sent
to a public IP address on my network but containing a MAC address of a
private host might reach the private host. That is somewhat disturbing.
It could come from anywhere. It would also sidestep NAT. It isn't obvious
how it could be converted to a useful two-way conversation by an attacker.
Post by Grant Taylor
I say conceptually because the ISP can configure the DSL network in such
a way that this is less likely to happen, and it is possible to teach a
switch to treat things differently. But this requires work and I
wouldn't bet on it happening. As such, I would assume that my internal
machines are directly accessible from other machines on the ISP's DSL
network.
Is there a way to test for this condition?
Post by Grant Taylor
This is where the Layer 2 firewall that I mentioned in a previous
message comes into play. Something to filter and protect the internal
machines.
Ok, I'm starting to see your point. I tend to think of a firewall as
part of a router. If the traffic hits the switch before the router
all bets are off.
Post by Grant Taylor
Post by bob prohaska
I've wondered about that, and whether it would be a useful way to connect
from my private network to the servers in a way that's not visible to the
public net.
There is a reasonable chance that something else on the DSL network
would see broadcasts escape from your private network. Thus they would
learn about your internal network. They could use this knowledge to
perpetuate the attack I mentioned above.
Post by bob prohaska
I've played a little with ifconfig aliases, but failed to get simultaneous
communications using both public and private IP addresses. Probably my
error.
It should be simple to do.
ip addr add 192.0.2.123/24 dev eth0
Assuming that you are using Test-Net-1 and are connected to eth0.
I tried alias, but it displaced the original address. Maybe add behaves
more as desired. I'll experiment further, but I'm pretty sure using
private addresses to communicate with public servers is no more private
than using public addresses. That rather defeats my original intent..
Post by Grant Taylor
Post by bob prohaska
If an intruder were to do it I think he'd have to root a server, another
perennial risk.
Yes, they would need something to give them remote access (any
vulnerable public service will suffice). Then they would likely need a
privilege escalation to go from non-root to root. (Assuming that the
service was running as something other than root.)
This is largely a question of /when/, not /if/. You can make the /when/
longer by keeping things up to date and trying to stay current.
Post by bob prohaska
You're right, I'm being sloppy.
I get the impression that some of this is somewhat new and / or we are
using the terms more precisely than you may have in the past. Sounds
like learning to me. IMHO learning > sloppy. ;-)
The basic ideas aren't all new, but some are and the level of detail is.
Post by Grant Taylor
Post by bob prohaska
According to the crab book the term secure router is probably closer
to right.
I'm not familiar with "(the) crab book".
Sorry, it's a whimsical reference to "TCP/IP Network Administration" by Craig
Hunt, published by O'Reilly. The cover features a crab, probably Dungenes
given the publisher's location. It's old, but I don't think it's wrong yet.
However, it's not the easiest read in the world. Is there something better?
Post by Grant Taylor
Post by bob prohaska
What I'm really alluding to is the use of a home router that can limit
traffic to what's relevant to my servers and not otherwise objectionable.
I am getting hung up on "router" as in a device that forwards traffic
from one IP subnet to a different IP subnet.
I tend to use the term "router" because I'd like to use a router to host
the service provided. Probably firewall is the more correct term, but may
imply more than I hope to need 8-)

However, it does seem that a router that's also a firewall needs to have
a somewhat different internal layout: Traffic must pass the firewall before
it can be presented to the switch. IIUC that's not the usual path in a
one-piece DSL modem/router.
Post by Grant Taylor
Seeing as how you want the /same/ IP subnet on both sides and are
forwarding based on the MAC addresses, that sounds like you are
switching or filtering based on layer 2.
My intent was more to block traffic based on IP address that is not
to my hosts, or from a known malicious host. I didn't consider the
case of traffic with a legitimate IP address for routing but a malicious
MAC address for delivery.
Post by Grant Taylor
Can something that is broadly called a router be coerced to behave this
way, probably. Is that it's default / preferred mode of operations,
doubtful.
I'm not entirely opposed to coercion applied to hardware 8-)
Post by Grant Taylor
Post by bob prohaska
Does there have to be anything special about the router running openWRT
apart from sufficient RAM and flash memory? Any special hardware?
Not really. At least not for what (I think) you are wanting to do.
I might want to do more than I planned. Originally, I just wanted to
filter malicious/pointless IP addresses. It sounds worth filtering for
destination IPs that don't match destination MAC addresses. Is that
within openWRT's ability on residential hardware?
Post by Grant Taylor
There are some cases where you can potentially run into bandwidth
limitations, particularly depending on how the network interfaces are
connected to the CPU. (Ask if you want to go down this rabbit hole.)
Let's not, for now. My hosts are slow, their purpose educational.
Post by Grant Taylor
Post by bob prohaska
I'm gradually realizing that the switch directs traffic by IP number
mapped to MAC address,
Close.
Traditional (L2) switches direct traffic by destination MAC address.
They actually have no concept of (L3) IP addresses.
Post by bob prohaska
so traffic directed to a private address need not be offered to a device
using a public address.
Traffic is directed to the destination MAC address, independent of what
IP address is in the IP packet.
That is a revelation to me. 8-|
Post by Grant Taylor
Post by bob prohaska
I was confusing switches and hubs.
For this discussion, switches are just smart hubs and only send traffic
out the port that the destination MAC address is connected to.
Switches and hubs can largely be used interchangeably. At least from a
functionality point of view. Granted, you probably want to use a switch
unless you have a specific reason to use a hub.
Routers on the other hand, they behave significantly differently than
switches & hubs.
Post by bob prohaska
It would be interesting to see how much extraneous traffic is actually
coming across the bridged modem. Would a packet sniffer or protocol
analyzer (wireshark, for example) let me see it?
Absolutely.
Be warned, you might not like what you see. It will likely cause more
questions. Some of which you likely won't like the answers too. (But
that doesn't make them any valid questions.)
Just tried to compile wireshark from the FreeBSD ports. The CLI version
installed successfully, but the docs are for the GUI version. It'll be
a minute (or many) before progress happens.

It seems that even if I put the Ethernet interface on a public host into
promiscuous mode it'll only see the packets sent to its MAC address by the
switch. In my case, that address is two hops away from the DSL modem. At
best it'll be one hop from the modem. Can a good whiff be had that far away?
Post by Grant Taylor
Post by bob prohaska
Conversely, could another ISP user on the same subnet observe traffic
among my servers?
They can /likely/ see broadcast traffic from your public servers and router.
If your switch is behaving properly, they shouldn't be able to see
traffic between your public servers.
If your switch is misbehaving or you use a hub, they /may/ be able to
see your server to server traffic. - This starts getting into the
minutia of how the ISP's network is configured and behaves. Usually
they are configured to behave like a switch too. So other subscribers
shouldn't see traffic that isn't to them. Broadcast traffic is to
everybody in the network, hence why it passes through the switch to
everybody.
Post by bob prohaska
This is getting complicated.....
Na. It's just a number of simple things that interact with each other.
Start understanding how each Lego piece works, and you can start doing
some fun ~> amazing things.
Now, when you start bending / breaking the rules and redefining how Lego
pieces behave, then it starts to get interesting.
Post by bob prohaska
Thanks for your patience!
You're welcome.
Thank you for the interest.
I'm beginning to understand your preference for routed networks.

bob prohaska
Grant Taylor
2019-03-17 04:51:25 UTC
Permalink
Post by bob prohaska
But in terms of consumer grade network switches, I gather they're MAC
address controlled and ignore IP addresses. It follows that consumer
routers ignore MAC addresses unless something special is done...
Most consumer (SOHO) grade switches function on layer 2, and only worry
about MAC addresses.

Most consumer (SOHO) grade routers function on layer 3, and only worry
about IP addresses. - However, they do need to worry about resolving
the MAC addresses of (directly deliverable) IPs in the locally attached
subnets. So they do care about MAC addresses for that. But that's not
what switches do.
Post by bob prohaska
Which does not have to be the same host as the one using the IP address?
Correct.

Switches learn the port that a source MAC address is connected to when
an Ethernet frame comes in. That way the switch (ideally) knows which
port a destination MAC address is connected to and thus what port to
send the Ethernet frame out. - I saw something from Bob come in the
yellow door, so I'll send things to Bob out the yellow door.

If a switch doesn't know what port the destination MAC address is
connected to, it will send (copies of) the Ethernet frame out all ports,
save for the port that it came in on.
Post by bob prohaska
So, a firewall has to be hardware between steps 2 and 3?
That's likely the ideal place to put a firewall that deals with Ethernet
frames. That's typically a Layer 2 firewall.
Post by bob prohaska
My first thought is that a packet with an unrouteable address would never
get to the public address of my router.
Sadly, that happens all too often.

It happens because other ISP clientele (or the ISP itself) has something
misconfigured (possibly plugging a DSL modem into a switch with private
computers) such that traffic meant for a LAN makes it out into the DSL
network.

There are other reasons it can happen, but they are (almost) all
directly connected to the same DSL network.
Post by bob prohaska
It does seem that a packet sent to a public IP address on my network
but containing a MAC address of a private host might reach the private
host.
Yes, such is possible.

Such an Ethernet frame would have to be sent by someone directly
connected to the DSL network.

MAC addresses are inherently layer 2 and do not cross a layer 3 boundary.

Usually, the ISP's router is a well behaved layer 3 boundary and would
never send an Ethernet frame like you are describing. Hence why such a
frame would need to come from someone on the same ISP network.
Post by bob prohaska
That is somewhat disturbing.
You're starting to see the security concerns that I was alluding to.
Post by bob prohaska
It could come from anywhere.
Not quite. See above.
Post by bob prohaska
It would also sidestep NAT.
Yes.
Post by bob prohaska
It isn't obvious how it could be converted to a useful two-way
conversation by an attacker.
Let's say I'm on the same DSL network as you. I can configure my
computer(s) to use 192.168.1.234 and send print jobs to your network
attacked printer at 192.168.1.111.

Since both IPs are in the 192.168.1.0/24 network, it will not be routed.
Which means that it will all be layer 2 traffic. I could send an ARP
request for 192.168.1.111 to learn your printer's MAC address.

Now, my computer and your printer think that each other are on the same
LAN in your house.

Now I can send print jobs that consume your ink / toner and use all the
paper in the printer. Thus performing a denial of service.

This is all possible because the DSL network is connected at layer 2
with your private LAN. If there was something separating them, I can't
do any of this. (At least not this way.)
Post by bob prohaska
Is there a way to test for this condition?
It depends what you mean by test, particularly how active (vs passive)
you mean.

You can use a network sniffer (tcpdump & Wireshark are good choices) to
sniff the traffic coming in from a DSL / Cable modem. If you see
private IPs or other traffic that you think shouldn't be on the
Internet, chances are good that the ISP is /not/ filtering things like
I'd like them to.
Post by bob prohaska
Ok, I'm starting to see your point. I tend to think of a firewall as
part of a router. If the traffic hits the switch before the router all
bets are off.
Yep. You got it.

What we typically call a "router" is really a piece of equipment that is
performing multiple functions. Usually the firewalling that is in SOHO
models is L3 filtering in the router portion. Frequently the switch is
a cheap and completely independent L2 switching chip with the physical
ports you see and a port that connects to the CPU. Thus any switching
functions are done by the basic chip and NOT the software running on the
router.

The router usually sees an outside (WAN) and an inside (LAN) interface
(which is really it's connection to the switch chip).
Post by bob prohaska
I tried alias, but it displaced the original address. Maybe add behaves
more as desired.
What are traditionally called "aliases" are weird. It also implies that
you're dealing with "ifconfig" instead of "ip". I never liked them.

You always had to know what alias number you were working with. You'd
use ifconfig to assign the main IP. Then you'd use ifconfig to assign
the alias IP to the alias interface, which was the interface name, with
a colon and an alias number appended.

ifconfig eth0 192.0.2.254
ifconfig eth0:1 192.0.2.1...
ifconfig eth0:2 192.0.2.2...

If you didn't use a unique ":#" after the physical interface name, you'd
likely get unexpected results.

To be honest, it's been so long since I've used that method, I don't
even know if it still works, or if it has somehow been broken.

Conversely adding IPs using the "ip" command is trivial and consistent.

ip addr add 192.0.2.254 dev eth0
ip addr add 192.0.2.1 dev eth0
ip addr add 192.0.2.2 dev eth0

Nice and consistent. Easily scriptable. No alias (interface) numbers
to deal with. :-)
Post by bob prohaska
I'll experiment further, but I'm pretty sure using private addresses
to communicate with public servers is no more private than using public
addresses. That rather defeats my original intent..
It depends what you're trying to keep private.

If you want a way to communicate with your servers that can't (really
SHOULD NOT) cross the Internet, then private IPs are good. I'd just use
a different private subnet on the outside of the router than I'm using
on the inside of the router for my private LAN. Say 192.168.10.254 to
be able to talk to the Cable modem at 192.168.10.100 to read stats,
while my internal LAN is 192.168.0.<something>.

Private IPs are /okay/. It's important to have the layer 3 routed
boundary between them.

Or at the very least have something that can do some filtering on layer
2 for you. (Most SOHO router switch chips can't.)

Aside: If you go the route of OpenWRT et al., there are options, but
they are more complex.
Post by bob prohaska
The basic ideas aren't all new, but some are and the level of detail is.
:-D
Post by bob prohaska
Sorry, it's a whimsical reference to "TCP/IP Network Administration" by
Craig Hunt, published by O'Reilly. The cover features a crab, probably
Dungenes given the publisher's location.
Ah. I know EXACTLY what you mean. I counter with "The Bat book".
(Sendmail, from the same line of books.)
Post by bob prohaska
It's old, but I don't think it's wrong yet.
Old doesn't necessarily mean that it's wrong or bad.

I think that line of books from that publisher says more about the
following.
Post by bob prohaska
However, it's not the easiest read in the world.
*nod*

I've not been impressed with O'Reilly books. At least not for learning.

Don't get me wrong. I think they are packed full of information, and a
*GREAT* /reference/ source. But I think they are a lot like man pages.
They are good for reference, but crap for learning something.
Especially for something that may be largely new to you.
Post by bob prohaska
Is there something better?
I don't know. I've not read the crab book so I can't compare.

I don't know how similar the subject material is, but I will say that
I'm currently reading TCP/IP Illustrated - Volume 1 - Second Edition.
My intention is to pick up smaller details that I've over looked in my
20 years of using & administering TCP/IP for myself and clients. I've
picked up many things that I appreciate. Though I question how useful
they are for many people. Think of it like getting a masters or PhD
half way through your career because you want to learn more about what
you've been using your entire career.

For starting, I have LONG referred people back to what I used to learn.
Linux's Networking How-To, commonly referred to as "net-3 how to". (Or
something similar.) It's a relatively small text file (compared to the
aforementioned books) that has a LOT of information in it. Obviously
it's Linux specific. But it is a good read. At least that's how I
remember it.
Post by bob prohaska
I tend to use the term "router" because I'd like to use a router to
host the service provided. Probably firewall is the more correct term,
but may imply more than I hope to need 8-)
Fair enough.
Post by bob prohaska
However, it does seem that a router that's also a firewall needs to have
a somewhat different internal layout: Traffic must pass the firewall
before it can be presented to the switch. IIUC that's not the usual path
in a one-piece DSL modem/router.
Now we get into the minutia of what the capabilities of devices are and
how they are configured.

Basic / simple DSL / Cable modem router switch combos should have the
modem component connected to the WAN interface of the router component.
The router component should have the LAN interface connected to the
switch component.
Post by bob prohaska
My intent was more to block traffic based on IP address that is not to
my hosts, or from a known malicious host. I didn't consider the case
of traffic with a legitimate IP address for routing but a malicious MAC
address for delivery.
Now you have considered a malicious actor.
Post by bob prohaska
I'm not entirely opposed to coercion applied to hardware 8-)
~chuckle~
Post by bob prohaska
I might want to do more than I planned. Originally, I just wanted to
filter malicious/pointless IP addresses. It sounds worth filtering for
destination IPs that don't match destination MAC addresses. Is that
within openWRT's ability on residential hardware?
I believe so.
Post by bob prohaska
Let's not, for now. My hosts are slow, their purpose educational.
ACK
Post by bob prohaska
That is a revelation to me. 8-|
Isn't learning fun. :-)
Post by bob prohaska
Just tried to compile wireshark from the FreeBSD ports. The CLI version
installed successfully, but the docs are for the GUI version. It'll be
a minute (or many) before progress happens.
Hum.

I've found tshark to be annoying. Or maybe it's just a personal bias
for tcpdump, which I'm more familiar with.

I'm guessing that there are more tutorials on tcpdump that target a
broad range of audiences. I'd bet that many tshark tutorials are
targeting more advanced Wireshark users that are comfortable with
sniffing network traffic. More as an alternate mode of Wireshark than a
general sniffer.
Post by bob prohaska
It seems that even if I put the Ethernet interface on a public host into
promiscuous mode it'll only see the packets sent to its MAC address
by the switch.
If you wait long enough, you should also see "broadcast" Ethernet frames
(like ARP uses).

You might also see frames destined to (what is called) an "unknown" MAC
address, thus flooded out all ports.

Then there is "multicast", which I'd be somewhat surprised if you see.

Collectively these are generally known as "B.U.M. frames". I say this
as you should see Ethernet frames destined to your MAC and / or B.U.M.
frames.

The switch should filter anything not to you or a B.U.M. frame.
Post by bob prohaska
In my case, that address is two hops away from the DSL modem.
Point of order: The term "hop(s)" usually implies routers.

I tend to hear "number of switches or (L2) devices" when referring to
what I think you mean.

I'm not trying to be pedantic. It's just that the different terms tend
to make some implications.
Post by bob prohaska
At best it'll be one hop from the modem. Can a good whiff be had that
far away?
If you are referring to the number of layer 2 devices, you can be many
""hops (L2 devices) away. As long as the modem and your sniffer are in
the same Layer 2 broadcast domain, you should be fairly good.

Note: I'm assuming that there isn't something like an L2 firewall
filtering and conditionally dividing the L2 broadcast domain. - This
is why I mentioned such as an option in a previous email.

The best way to know is to run the sniffer on a computer (device) that
is directly connected to the modem.
Post by bob prohaska
I'm beginning to understand your preference for routed networks.
:-)

Yep. That layer 3 routed boundary is nice.
--
Grant. . . .
unix || die
bob prohaska
2019-03-17 20:47:12 UTC
Permalink
[huge snip]

Denial of service is annoying, but presumably I could complain to my
ISP, who (after some delay) could make it go away. Surveillance is a
more worrying issue. Is it a significant threat in this (bridged DSL)
scenario, assuming my equipment is set up correctly?
Post by Grant Taylor
Post by bob prohaska
Is there a way to test for this condition?
It depends what you mean by test, particularly how active (vs passive)
you mean.
You can use a network sniffer (tcpdump & Wireshark are good choices) to
sniff the traffic coming in from a DSL / Cable modem. If you see
private IPs or other traffic that you think shouldn't be on the
Internet, chances are good that the ISP is /not/ filtering things like
I'd like them to.
Let's suppose I have a free-standing modem (I don't right now); would a
hub (not a switch) then be required to sample _all_ the traffic from the
modem and deliver it to something like tcpdump? I raise the issue because
I don't have a hub and it looks like they're not widely available.
Post by Grant Taylor
What we typically call a "router" is really a piece of equipment that is
performing multiple functions. Usually the firewalling that is in SOHO
models is L3 filtering in the router portion. Frequently the switch is
a cheap and completely independent L2 switching chip with the physical
ports you see and a port that connects to the CPU. Thus any switching
functions are done by the basic chip and NOT the software running on the
router.
The router usually sees an outside (WAN) and an inside (LAN) interface
(which is really it's connection to the switch chip).
Up to now I thought of routers as multi-homed hosts with a
distinguishable Ethernet interface for every physical port.
Clearly that's not how they usually work, but the misconception
colored my thinking and language.

Given a SOHO router constructed in the usual way, how can openWRT,
or any software, prevent a packet with a malicious MAC address
from evading the router?
Post by Grant Taylor
Post by bob prohaska
I tried alias, but it displaced the original address. Maybe add behaves
more as desired.
What are traditionally called "aliases" are weird. It also implies that
you're dealing with "ifconfig" instead of "ip". I never liked them.
[another big snip]

I'm on FreeBSD, which has a man page for ip but apparently no
executable shell command. It looks like I'm supposed to use
something like

ifconfig ue0 inet 192.168.1.n/28 add

to make a host answer to that address in addition to its existing
address. In that case n has to be between 1 and 7.
Post by Grant Taylor
Post by bob prohaska
I'll experiment further, but I'm pretty sure using private addresses
to communicate with public servers is no more private than using public
addresses. That rather defeats my original intent..
It depends what you're trying to keep private.
Passwords, credit card numbers, the usual stuff...
Post by Grant Taylor
If you want a way to communicate with your servers that can't (really
SHOULD NOT) cross the Internet, then private IPs are good. I'd just use
a different private subnet on the outside of the router than I'm using
on the inside of the router for my private LAN. Say 192.168.10.254 to
be able to talk to the Cable modem at 192.168.10.100 to read stats,
while my internal LAN is 192.168.0.<something>.
Private IPs are /okay/. It's important to have the layer 3 routed
boundary between them.
Or at the very least have something that can do some filtering on layer
2 for you. (Most SOHO router switch chips can't.)
I gather that making both private and public hosts answer to
192.168.0.n/28 would give then a (somewhat) private conversation,
since the router answers to 192.168.1.254. A private host
that needs to talk to the router as well still needs an address on
the router's network. That would appear to breach the layer 3
boundary. Is it fatal to privacy?
Post by Grant Taylor
Aside: If you go the route of OpenWRT et al., there are options, but
they are more complex.
Does the complexity entail choosing a particular kind of router, i.e.,
one with a specific hardware configuration?
Post by Grant Taylor
Ah. I know EXACTLY what you mean. I counter with "The Bat book".
(Sendmail, from the same line of books.)
Post by bob prohaska
It's old, but I don't think it's wrong yet.
Old doesn't necessarily mean that it's wrong or bad.
The "crab book" makes no mention of switches and how they work.
I think everybody was using vampire taps on coax at the time.....
A case of error by "not invented yet" 8-)
Post by Grant Taylor
For starting, I have LONG referred people back to what I used to learn.
Linux's Networking How-To, commonly referred to as "net-3 how to". (Or
Found and placed in my bookmarks.
Post by Grant Taylor
Now we get into the minutia of what the capabilities of devices are and
how they are configured.
Basic / simple DSL / Cable modem router switch combos should have the
modem component connected to the WAN interface of the router component.
The router component should have the LAN interface connected to the
switch component.
Should, as opposed to _does_?

[big snip]


Point of order accepted!
Post by Grant Taylor
The best way to know is to run the sniffer on a computer (device) that
is directly connected to the modem.
I tried tcpdump on a public host, excluding all traffic addressed
to or from that host. It was two switches (one inside the modem/router,
another outside) away from the modem. Here's an entry that looks strange:

13:45:58.676717 fc:25:3f:8a:a6:ba (oui Unknown) > 00:11:24:a9:f4:db (oui Unknown), ethertype Unknown (0x999a), length 133:
0x0000: 0109 0063 776c 3000 0000 0000 0000 0000 ...cwl0.........
0x0010: 0000 0000 0203 005f 0203 0200 2000 0000 ......._........
0x0020: 0000 0001 1b00 0000 0000 0000 0000 0000 ................
0x0030: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0040: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0050: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0060: 0000 0000 00f2 9e8f 7bcd 0444 e6e6 1913 ........{..D....
0x0070: 8655 e35b e700 00 .U.[...
. .cwl0................_.... ...........................................................................{..D.....U.[...

There's only one entry like this, tcpdump ran for about fifty minutes.
All the other entries appeared to have internal origns.


Thanks for reading this far, apologies if the snippage obscured context.

bob prohaska
Grant Taylor
2019-03-17 23:39:48 UTC
Permalink
Post by bob prohaska
Denial of service is annoying, but presumably I could complain to my
ISP, who (after some delay) could make it go away. Surveillance is a
more worrying issue. Is it a significant threat in this (bridged DSL)
scenario, assuming my equipment is set up correctly?
I would hope that the ISP could figure it out.

But I sure wouldn't hold my breath for some of the ISPs that I've worked
with to do so.

Also, how many people would realize that they are being attacked (DoSed)
by their printer printing pages of solid colors? Rather, how many
people would think that the printer had malfunctioned and would get mad
at it?

Of the people that realize that the printer didn't malfunction, how many
of them would suspect their computer was infected with something and go
down that deep rabbit hole?

All the while, not having any clue that it's someone maliciously doing
something across the ISP's network.
Post by bob prohaska
Let's suppose I have a free-standing modem (I don't right now); would
a hub (not a switch) then be required to sample _all_ the traffic from
the modem and deliver it to something like tcpdump? I raise the issue
because I don't have a hub and it looks like they're not widely available.
No, a hub is not required. A hub does make it easier.

You can connect the modem to a computer and use that computer to sniff
the traffic on the connected Ethernet interface.
Post by bob prohaska
Up to now I thought of routers as multi-homed hosts with a distinguishable
Ethernet interface for every physical port. Clearly that's not how they
usually work, but the misconception colored my thinking and language.
In some ways, you were close. It's just that most of them only have two
distinguishable Ethernet interfaces (maybe more for wireless, but that's
another story). One for the outside, and one for the inside.

Most routers have a small switch built in. One port goes to the CPU and
is seen as the inside interface. The other switch ports are available
for computers on the LAN to use.

It is possible for some routers to be configured such that they do have
more distinguishable ports (even through some of the small switches via
VLAN tagging). But this is atypical.
Post by bob prohaska
Given a SOHO router constructed in the usual way, how can openWRT,
or any software, prevent a packet with a malicious MAC address from
evading the router?
To me, "the usual way" means that the external modem is connected to the
WAN port and the LAN port is connected to the internal switch.

Thus the OS (OpenWRT, et al.) running has to route the traffic between
the two ports.

+-----+
+-----+ CPU +-----+-----+-----+-----+
| +-----+ | | | |
+--+--+ +--+--+--+--+--+--+--+--+
| WAN | | LAN | LAN | LAN | LAN |
+-----+ +-----+-----+-----+-----+

The usual way means that the CPU & OS sits between the modem / ISP
network and your internal computers. Thus the CPU must explicitly copy
the malicious Ethernet frame from the WAN interface to the LAN
interface. Usually such a copy would not happen.

If you decide to plug the DSL modem into one of the LAN ports, you would
need to do something to separate the LAN ports so that they can't talk
to each other without going through the CPU. Some SOHO routers can do
this via VLAN trunking between the small switch and the CPU. But this
is more complex and atypical.
Post by bob prohaska
I'm on FreeBSD, which has a man page for ip but apparently no executable
shell command.
What section is that man page from? Commands and libraries / protocols
are in different sections.
Post by bob prohaska
It looks like I'm supposed to use something like
ifconfig ue0 inet 192.168.1.n/28 add
to make a host answer to that address in addition to its existing
address. In that case n has to be between 1 and 7.
I'm not familiar with FreeBSD, so I can't comment. But what you're
saying does make sense.

Mostly. /28 can hold 16 IP addresses, 14 of which can be used, with a
router likely being of of them.
Post by bob prohaska
Passwords, credit card numbers, the usual stuff...
Okay.

I was thinking more internal private LAN and external private
administrative traffic that wouldn't cross the Internet.
Post by bob prohaska
I gather that making both private and public hosts answer to
192.168.0.n/28 would give then a (somewhat) private conversation, since
the router answers to 192.168.1.254. A private host that needs to talk to
the router as well still needs an address on the router's network. That
would appear to breach the layer 3 boundary. Is it fatal to privacy?
I'm not following.

I think you said your internal private LAN is 192.168.1.x/24.

Let's say that the outside of your router and your /public/ servers have
both a globally routed IP and a 10.10.10.x/24 IP.

Your internal workstations could talk from private 192.168.1.123 to
private 10.10.10.10 perfectly fine.
Post by bob prohaska
Does the complexity entail choosing a particular kind of router, i.e.,
one with a specific hardware configuration?
Somewhat.

The complexity does mean that you need a router that supports a feature.

Not so much a specific hardware configuration, as in package of memory,
number of ports, etc.

You will likely want to make sure that the router you choose has a
switch chipset that supports VLANs. I suspect there are many.
Post by bob prohaska
The "crab book" makes no mention of switches and how they work. I think
everybody was using vampire taps on coax at the time..... A case of
error by "not invented yet" 8-)
I tend to think of it as "omission" more so than "error". ():-)
Post by bob prohaska
Found and placed in my bookmarks.
Cool.

Feel free to ask questions if you want to. Email is most likely to get
my attention sooner.
Post by bob prohaska
Should, as opposed to _does_?
Should as in "that's my understanding, but I can't prove it". As in I
don't have any hard documentation that I can point at.

Every basic / simple DSL / Cable modem router switch combo that I can
remember having worked with as I type this post /does/....
Post by bob prohaska
Point of order accepted!
:-)
Post by bob prohaska
I tried tcpdump on a public host, excluding all traffic addressed to
or from that host. It was two switches (one inside the modem/router,
0x0000: 0109 0063 776c 3000 0000 0000 0000 0000 ...cwl0.........
0x0010: 0000 0000 0203 005f 0203 0200 2000 0000 ......._........
0x0020: 0000 0001 1b00 0000 0000 0000 0000 0000 ................
0x0030: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0040: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0050: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0060: 0000 0000 00f2 9e8f 7bcd 0444 e6e6 1913 ........{..D....
0x0070: 8655 e35b e700 00 .U.[...
. .cwl0................_.... ...........................................................................{..D.....U.[...
I don't recognize Ethertype 0x999a. Nor can I find anything quickly.
Post by bob prohaska
There's only one entry like this, tcpdump ran for about fifty minutes.
All the other entries appeared to have internal origns.
If they are truly coming from your systems, or replies there to, you are
probably fairly good.
Post by bob prohaska
Thanks for reading this far, apologies if the snippage obscured context.
You're welcome and you're good.
--
Grant. . . .
unix || die
bob prohaska
2019-03-19 03:00:40 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
Let's suppose I have a free-standing modem (I don't right now); would
a hub (not a switch) then be required to sample _all_ the traffic from
the modem and deliver it to something like tcpdump? I raise the issue
because I don't have a hub and it looks like they're not widely available.
No, a hub is not required. A hub does make it easier.
You can connect the modem to a computer and use that computer to sniff
the traffic on the connected Ethernet interface.
Wouldn't that necessarily displace normal network use? That'd` be ok for
a brief test, but not for prolonged monitoring. Perhaps a managed switch
could be set up as a sort of wiretap that wouldn't disturb normal use.
Post by Grant Taylor
Post by bob prohaska
Up to now I thought of routers as multi-homed hosts with a distinguishable
Ethernet interface for every physical port. Clearly that's not how they
usually work, but the misconception colored my thinking and language.
In some ways, you were close. It's just that most of them only have two
distinguishable Ethernet interfaces (maybe more for wireless, but that's
another story). One for the outside, and one for the inside.
Most routers have a small switch built in. One port goes to the CPU and
is seen as the inside interface. The other switch ports are available
for computers on the LAN to use.
It is possible for some routers to be configured such that they do have
more distinguishable ports (even through some of the small switches via
VLAN tagging). But this is atypical.
Post by bob prohaska
Given a SOHO router constructed in the usual way, how can openWRT,
or any software, prevent a packet with a malicious MAC address from
evading the router?
To me, "the usual way" means that the external modem is connected to the
WAN port and the LAN port is connected to the internal switch.
Thus the OS (OpenWRT, et al.) running has to route the traffic between
the two ports.
+-----+
+-----+ CPU +-----+-----+-----+-----+
| +-----+ | | | |
+--+--+ +--+--+--+--+--+--+--+--+
| WAN | | LAN | LAN | LAN | LAN |
+-----+ +-----+-----+-----+-----+
The usual way means that the CPU & OS sits between the modem / ISP
network and your internal computers. Thus the CPU must explicitly copy
the malicious Ethernet frame from the WAN interface to the LAN
interface. Usually such a copy would not happen.
If you decide to plug the DSL modem into one of the LAN ports, you would
need to do something to separate the LAN ports so that they can't talk
to each other without going through the CPU. Some SOHO routers can do
this via VLAN trunking between the small switch and the CPU. But this
is more complex and atypical.
Post by bob prohaska
I'm on FreeBSD, which has a man page for ip but apparently no executable
shell command.
What section is that man page from? Commands and libraries / protocols
are in different sections.
Section 4, Kernel Interface Manual
Post by Grant Taylor
Post by bob prohaska
Passwords, credit card numbers, the usual stuff...
Okay.
I was thinking more internal private LAN and external private
administrative traffic that wouldn't cross the Internet.
Well, that's part of it. When I connect to one of my servers
to do root-stuff I'd prefer that the conversation does
not get into public netspace, even with ssh encryption.

As more transactions move online banking will become a point of worry.
A VPN to financial institutions will be of some confort, once the
headaches setting it up subside.
Post by Grant Taylor
Post by bob prohaska
I gather that making both private and public hosts answer to
192.168.0.n/28 would give then a (somewhat) private conversation, since
the router answers to 192.168.1.254. A private host that needs to talk to
the router as well still needs an address on the router's network. That
would appear to breach the layer 3 boundary. Is it fatal to privacy?
I'm not following.
Let's say I have a private 10.10.10.n address on each of my servers,
so I can administer them from "inside". My workstation then needs an
address in the same subnet, so it can directly communicate with the
servers. However, the workstation also needs an address on the subnet
of the router's private network, so it can use NAT to access the ISP's
public network. A broadcast that reaches the private subnet of the
router will reach the workstation. Might the workstation then leak
information about the 10.10.10.n network? Would it matter?
Post by Grant Taylor
Post by bob prohaska
Does the complexity entail choosing a particular kind of router, i.e.,
one with a specific hardware configuration?
Somewhat.
The complexity does mean that you need a router that supports a feature.
Not so much a specific hardware configuration, as in package of memory,
number of ports, etc.
You will likely want to make sure that the router you choose has a
switch chipset that supports VLANs. I suspect there are many.
Ah!, so that's what I'm looking for. There are almost too many. In looking
at the openWRT website I was a little surprised to find they don't seem to
sort routers by VLAN compatiblity. Is there a different term I should be
using?

Setting up and using a VLAN is quite a bit more than I was bargaining
for, at least to begin with. I'd not even considered the possiblity.
Will VLAN-compatible routers work in a normal configuration?
Post by Grant Taylor
I don't recognize Ethertype 0x999a. Nor can I find anything quickly.
Post by bob prohaska
There's only one entry like this, tcpdump ran for about fifty minutes.
All the other entries appeared to have internal origns.
If they are truly coming from your systems, or replies there to, you are
probably fairly good.
Turns out the MAC address belongs to Apple, so it's probably my Airport
Extreme WAP. Tempest in a teapot, most likely.

Thank you!

bob prohaska
Grant Taylor
2019-03-19 03:34:03 UTC
Permalink
Post by bob prohaska
Wouldn't that necessarily displace normal network use? That'd` be ok for
a brief test, but not for prolonged monitoring. Perhaps a managed switch
could be set up as a sort of wiretap that wouldn't disturb normal use.
Yes.

If you have root access to a router that's capable of it, you can have
it sniff the traffic for you.

A managed switch configured to SPAN / MIRROR ports (or a hub) between
the modem and the router can also be used.
Post by bob prohaska
Section 4, Kernel Interface Manual
Ya. That's not commands. That's other documentation.
Post by bob prohaska
Well, that's part of it. When I connect to one of my servers to do
root-stuff I'd prefer that the conversation does not get into public
netspace, even with ssh encryption.
Please elaborate on what you mean by "netsapce". Are you talking about
the DSL network? Or globally routed IP addresses?
Post by bob prohaska
As more transactions move online banking will become a point of worry.
A VPN to financial institutions will be of some confort, once the
headaches setting it up subside.
I'll be shocked if banks support VPNs to normal residential customers.

I think we're going to have to settle for HTTPS (TLS) encrypted connections.
Post by bob prohaska
Let's say I have a private 10.10.10.n address on each of my servers,
so I can administer them from "inside". My workstation then needs an
address in the same subnet, so it can directly communicate with the
servers. However, the workstation also needs an address on the subnet
of the router's private network, so it can use NAT to access the ISP's
public network. A broadcast that reaches the private subnet of the router
will reach the workstation. Might the workstation then leak information
about the 10.10.10.n network? Would it matter?
Your workstation doesn't need an address in the 10.10.10.0/24 network.
It only needs an IP address from the "inside" network. Your
workstations can communicate through the router to the 10.10.10.0/24
network.

There are a few different ways that you can configure the router &
servers. But they all end up in you using private non-globally-routed
IP addresses between your workstation and your servers.
Post by bob prohaska
Ah!, so that's what I'm looking for. There are almost too many. In
looking at the openWRT website I was a little surprised to find they
don't seem to sort routers by VLAN compatiblity. Is there a different
term I should be using?
I don't know what the term would be.

It might be worth finding an OpenWRT support group that can answer more
questions specific to OpenWRT and possibly hardware recommendations.

It may be old and outdated, but I know that the Linksys WRT54GL will do
what you want. (I did it 10 ~ 15 years ago.)
Post by bob prohaska
Setting up and using a VLAN is quite a bit more than I was bargaining
for, at least to begin with. I'd not even considered the possiblity.
I'm not convinced that a VLAN is needed for what I think you're wanting
to do.
Post by bob prohaska
Will VLAN-compatible routers work in a normal configuration?
In short: Yes.

In not so short, once you start talking VLANs, things are further from
normal. You'd need to describe what you mean by "normal configuration".
(The conversation has gone quite a few places, and I don't want to
assume.)
Post by bob prohaska
Turns out the MAC address belongs to Apple, so it's probably my Airport
Extreme WAP. Tempest in a teapot, most likely.
Hum.
Post by bob prohaska
Thank you!
You're welcome.
--
Grant. . . .
unix || die
bob prohaska
2019-03-20 02:23:34 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
Well, that's part of it. When I connect to one of my servers to do
root-stuff I'd prefer that the conversation does not get into public
netspace, even with ssh encryption.
Please elaborate on what you mean by "netsapce". Are you talking about
the DSL network? Or globally routed IP addresses?
By "public netspace" I meant portions of the network visible to others.
If the ISP is leaky, that seems to include the DSL network, even if the
traffic isn't explictly sent to the ISP's gateway.
Post by Grant Taylor
Post by bob prohaska
Let's say I have a private 10.10.10.n address on each of my servers,
so I can administer them from "inside". My workstation then needs an
address in the same subnet, so it can directly communicate with the
servers. However, the workstation also needs an address on the subnet
of the router's private network, so it can use NAT to access the ISP's
public network. A broadcast that reaches the private subnet of the router
will reach the workstation. Might the workstation then leak information
about the 10.10.10.n network? Would it matter?
Your workstation doesn't need an address in the 10.10.10.0/24 network.
It only needs an IP address from the "inside" network. Your
workstations can communicate through the router to the 10.10.10.0/24
network.
Perhaps I don't understand what's meant by "an IP address from the inside
network". Wouldn't both the servers and the workstation need alias
addresses on the same non-routeable network, say 10.10.10.1 through
10.10.10.6 assuming five servers and one workstation? The servers would
have in addition their routable addresses, and the workstation its
private 192.168.1.n/24 address on the LAN for access to the router.

In essence I wanted to hide the administrative network from the router,
knowing I can't hide it from the router's switch.
Post by Grant Taylor
There are a few different ways that you can configure the router &
servers. But they all end up in you using private non-globally-routed
IP addresses between your workstation and your servers.
Can that traffic be made invisible to eavesdroppers outside my premises?
Post by Grant Taylor
It might be worth finding an OpenWRT support group that can answer more
questions specific to OpenWRT and possibly hardware recommendations.
I'll try to content myself with digging through FAQs and archives for now.
What I'm trying to learn can't be new.
Post by Grant Taylor
I'm not convinced that a VLAN is needed for what I think you're wanting
to do.
I believe (and fervently hope!) you're right 8-)
Post by Grant Taylor
Post by bob prohaska
Will VLAN-compatible routers work in a normal configuration?
In short: Yes.
In not so short, once you start talking VLANs, things are further from
normal. You'd need to describe what you mean by "normal configuration".
(The conversation has gone quite a few places, and I don't want to
assume.)
Let's suppose all I want to do is make it hard to attack the printer.
Post by Grant Taylor
Post by bob prohaska
Turns out the MAC address belongs to Apple, so it's probably my Airport
Extreme WAP. Tempest in a teapot, most likely.
Hum.
Is that hum as in "ho-hum" or hum as in "hmmmmm, what's going on?"?
One websearch found this link:
https://forum.huawei.com/enterprise/en/Case-share-Broadcasting-packets-with-ethertype-0x999a/thread/496447-863
which suggests the packet came from a diagnostic function on a Huawei device.
Does that conflict with the packet originating in an Apple WAP?

The takeaways so far seem to be:

A separate modem and router offers better monitoring possibilities.
A router that supports vlans has better privacy even if I choose not
to set up virtual private networks.

It still isn't clear if there's leakage into my private network from
the ISP's side. That will be much easier to test after the modem and
router are separated so a packet sniffer can be introduced.

Thank you!

bob prohaska
Grant Taylor
2019-03-20 21:19:42 UTC
Permalink
Post by bob prohaska
By "public netspace" I meant portions of the network visible to others.
If the ISP is leaky, that seems to include the DSL network, even if the
traffic isn't explictly sent to the ISP's gateway.
Okay. Thank you for clarifying.

That that tells me that you want some sort of firewall (or other
filtering device) between your servers and your ISP.
Post by bob prohaska
Perhaps I don't understand what's meant by "an IP address from the inside
network". Wouldn't both the servers and the workstation need alias
addresses on the same non-routeable network, say 10.10.10.1 through
10.10.10.6 assuming five servers and one workstation? The servers would
have in addition their routable addresses, and the workstation its
private 192.168.1.n/24 address on the LAN for access to the router.
No, that is not a requirement.

The servers can have their globally-routed IP and a non-globally-routed
IP outside your NATing router.

Your workstations can get their non-globally-routed IP from from a
different network.

Your workstations and servers would communicate between their different
non-globally-routed IPs through the (NATing) router.
Post by bob prohaska
In essence I wanted to hide the administrative network from the router,
knowing I can't hide it from the router's switch.
Okay. I don't remember that requirement.

Why do you want to hide the administrative network from the router?
Post by bob prohaska
Can that traffic be made invisible to eavesdroppers outside my premises?
You will need some sort of firewall (or other filtering device) between
your servers and your ISP to guarantee that none of your administrative
traffic leaks to your ISP for anyone to see.
Post by bob prohaska
I'll try to content myself with digging through FAQs and archives for now.
What I'm trying to learn can't be new.
It's likely not new. It is likely changing or at least updating as new
models are added to the list.

OpenWRT also adds support for new chipsets. So it's possible that
something that previously wasn't supported now has support.
Post by bob prohaska
I believe (and fervently hope!) you're right 8-)
~chuckle~
Post by bob prohaska
Let's suppose all I want to do is make it hard to attack the printer.
You want an external firewall ... between you and your ISP.
Post by bob prohaska
Is that hum as in "ho-hum" or hum as in "hmmmmm, what's going on?"?
The latter.
Post by bob prohaska
https://forum.huawei.com/enterprise/en/Case-share-Broadcasting-packets-with-ethertype-0x999a/thread/496447-863
which suggests the packet came from a diagnostic function on a Huawei
device. Does that conflict with the packet originating in an Apple WAP?
The article you linked to makes sense in a vacuum.

But it doesn't make sense with your previous statement about Apple.

Do you have a Huawei device?

Do you have an Apple WAP?
Post by bob prohaska
A separate modem and router offers better monitoring possibilities.
Yes.
Post by bob prohaska
A router that supports vlans has better privacy even if I choose not to
set up virtual private networks.
Point of order: VLANs and VPNs have two very different meanings.

Can a VLAN be considered a virtual private network by some definitions,
yes. But it is decidedly different than the common meaning of VPN.

Also, not using security you do have is hard to differentiate from not
having it.
Post by bob prohaska
It still isn't clear if there's leakage into my private network from the
ISP's side. That will be much easier to test after the modem and router
are separated so a packet sniffer can be introduced.
Agreed.
Post by bob prohaska
Thank you!
You're welcome.
--
Grant. . . .
unix || die
bob prohaska
2019-03-21 04:08:58 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
Perhaps I don't understand what's meant by "an IP address from the inside
network". Wouldn't both the servers and the workstation need alias
addresses on the same non-routeable network, say 10.10.10.1 through
10.10.10.6 assuming five servers and one workstation? The servers would
have in addition their routable addresses, and the workstation its
private 192.168.1.n/24 address on the LAN for access to the router.
No, that is not a requirement.
The servers can have their globally-routed IP and a non-globally-routed
IP outside your NATing router.
Your workstations can get their non-globally-routed IP from from a
different network.
Your workstations and servers would communicate between their different
non-globally-routed IPs through the (NATing) router.
Ok, so I'd add a static route to the router's internal table?
Is that somehow better than giving the workstation its own alias
address among the non-globally-routed IPs for the servers?
Post by Grant Taylor
Post by bob prohaska
In essence I wanted to hide the administrative network from the router,
knowing I can't hide it from the router's switch.
Okay. I don't remember that requirement.
I don't think I stated it, at least not clearly.
Post by Grant Taylor
Why do you want to hide the administrative network from the router?
Well, maybe it's wishful thinking on my part. I gather the router is
a point of potential leakage, so it seemed prudent to keep sensitive
traffic out of the router, to the extent possible. If it helps at all
it seems worth doing. It'll be a while before I understand how to
implement a firewall to stop all leakage.
Post by Grant Taylor
Post by bob prohaska
I'll try to content myself with digging through FAQs and archives for now.
What I'm trying to learn can't be new.
It's likely not new. It is likely changing or at least updating as new
models are added to the list.
OpenWRT also adds support for new chipsets. So it's possible that
something that previously wasn't supported now has support.
I've been poking around on openWRT.org and trying to locate supported
routers on Amazon. It's a fairly confusing search, I think it'll take
a while to make a reasonable choice. The fact that I care about power
consumption, and am not looking for high performance, puts me well out
of the mainstream. It seems most of the major manufacturers have had
problems with security and other scandals, so that criteria isn't much
help in narrowing the search.

In fact, openWRT isn't a requirement. It just seems to be a good idea.
Post by Grant Taylor
Post by bob prohaska
Is that hum as in "ho-hum" or hum as in "hmmmmm, what's going on?"?
The latter.
Ok, not good.
Post by Grant Taylor
Post by bob prohaska
https://forum.huawei.com/enterprise/en/Case-share-Broadcasting-packets-with-ethertype-0x999a/thread/496447-863
which suggests the packet came from a diagnostic function on a Huawei
device. Does that conflict with the packet originating in an Apple WAP?
The article you linked to makes sense in a vacuum.
But it doesn't make sense with your previous statement about Apple.
Do you have a Huawei device?
Not that I know of. There's a D-link unmanaged switch, a Netopia modem/router
and the Apple Airport Extreme (flying saucer model).

The D-link switch is newest, about two years old. The Airport is about twelve
years old, the Netopia dates from 2004. The servers and workstation are
Raspberry Pi's less than two years old. There are three old Macs in the
house on wireless, but none were powered up.

Is ethertype 0x999a manufacturer specific? If it is, then something's odd.
Post by Grant Taylor
Post by bob prohaska
A separate modem and router offers better monitoring possibilities.
Yes.
Post by bob prohaska
A router that supports vlans has better privacy even if I choose not to
set up virtual private networks.
Point of order: VLANs and VPNs have two very different meanings.
Can a VLAN be considered a virtual private network by some definitions,
yes. But it is decidedly different than the common meaning of VPN.
Point of order accepted; I do understand they're different, but I was
thinking they required the same, or at least related, hardware. The
feature I'm most immediately interested in is the "router before
switch" topology you mentioned earlier in connection with VLANs. That
by itself seems like it would relieve the most imminent worry. Until
VPNs become the rule for retail financial transactions I don't foresee
using one.
Post by Grant Taylor
Also, not using security you do have is hard to differentiate from not
having it.
It's pretty clear the learning curve for secure communications is steep.
Buying hardware that supports security gives the choice of turning it on
later, once I know how. That seems prudent. I'm hesitant to buy something
that forces an immediate ascent of the learning curve. Especially at my
present rate 8-)
Post by Grant Taylor
Post by bob prohaska
It still isn't clear if there's leakage into my private network from the
ISP's side. That will be much easier to test after the modem and router
are separated so a packet sniffer can be introduced.
Agreed.
At the moment I'm thinking of buying an ADSL2+ standalone modem first. Once
I can make that work it'll be possible to sniff the ISP traffic intermittently.
That's enough to learn a little, when I get stuck I can just put the old
hardware back while figuring out what went wrong. In the meantime I'll look
for a better, more secure router/firewall. Quantifying "better, more secure"
promises to take some doing.

Thank you!

bob prohaska
Grant Taylor
2019-03-21 04:43:49 UTC
Permalink
Ok, so I'd add a static route to the router's internal table? Is that
somehow better than giving the workstation its own alias address among
the non-globally-routed IPs for the servers?
You'd add a route to the internal non-globally-routed IP network
pointing the server to the router's outside IP.

The internal workstations will already use the router as their default
gateway.

Thus the servers outside the router and the workstation inside the
router have a route to each other.
I don't think I stated it, at least not clearly.
Fair enough.

I'm okay with changes as long as they are acknowledged as such. (I hate
doubting myself and wondering what I forgot when.)
Well, maybe it's wishful thinking on my part. I gather the router is
a point of potential leakage, so it seemed prudent to keep sensitive
traffic out of the router, to the extent possible. If it helps at all it
seems worth doing. It'll be a while before I understand how to implement
a firewall to stop all leakage.
The router is actually a control point to provide filtering and reduce
leakage. Rather the firewall on the router.
I've been poking around on openWRT.org and trying to locate supported
routers on Amazon. It's a fairly confusing search, I think it'll take
a while to make a reasonable choice. The fact that I care about power
consumption, and am not looking for high performance, puts me well out
of the mainstream. It seems most of the major manufacturers have had
problems with security and other scandals, so that criteria isn't much
help in narrowing the search.
I wouldn't worry about the scandals, as most of them are related to the
firmware that ships from the factory. Seeing as how you're talking
about replacing that firmware with OpenWRT, you are in control of things.
In fact, openWRT isn't a requirement. It just seems to be a good idea.
I tend to agree.
Ok, not good.
I'm content with what you found about the Huawei loopback-detection.
Not that I know of. There's a D-link unmanaged switch, a Netopia
modem/router and the Apple Airport Extreme (flying saucer model).
Well, that lends credence to the Apple and tends to negate the Huawei.

Hum. I wonder what's going on. Or if Apple is also using the 0x999a
for something otherwise undocumented.
The D-link switch is newest, about two years old. The Airport is about
twelve years old, the Netopia dates from 2004. The servers and workstation
are Raspberry Pi's less than two years old. There are three old Macs in
the house on wireless, but none were powered up.
ACK
Is ethertype 0x999a manufacturer specific? If it is, then something's odd.
No. Ethertype is a 16-bit identifier to specify what the Ethernet frame
contains. Any device can send any Ethertype.
Point of order accepted; I do understand they're different, but I was
thinking they required the same, or at least related, hardware.
VLANs actually take very little processing power. Most things can do
it, many of which don't for one reason or another.

VPNs on the other hand, can take between some more processing power and
quite a bit more processing power.
The feature I'm most immediately interested in is the "router before
switch" topology you mentioned earlier in connection with VLANs. That
by itself seems like it would relieve the most imminent worry.
Okay.

I suspect that you might be interested in a router running OpenWRT that
can do the filtering between the modem and the servers / internal
router. Is that correct?

There are a couple of things that come to mind that I think will allow that.

· Bridging the WAN interface with the LAN interface / switch combined
with EBTables L2 filtering.
· Bridging the WAN interface with the LAN interface / switch combined
with IPTables L2 filtering.
· Proxy ARP routing between the WAN interface and the LAN interface /
switch with IPTables L3 filtering.

That would mean that the wild Internet is outside the first router, with
it protecting your DMZ. Your second router would be connected to the
DMZ like a server, and protecting your workstations on the inside.
Until VPNs become the rule for retail financial transactions I don't
foresee using one.
I don't think hat banking or retail will require VPNs.

Many of them do require HTTPS (TLS) encryption already.

VPNs would just be a LOT more overhead and a LOT more problematic to
configure / support. I don't see that happening.
It's pretty clear the learning curve for secure communications is steep.
Depending how deep you want to get into it, it can be. But I don't
think it needs to be. There's a LOT more that you could get into that's
not germane to what I think you're wanting to do.
Buying hardware that supports security gives the choice of turning it on
later, once I know how. That seems prudent. I'm hesitant to buy something
that forces an immediate ascent of the learning curve. Especially at my
present rate 8-)
I might suggest that you acquire an old Linksys WRT54GL or some other
OpenWRT capable router for minimal cost and play with it to see if you
can get it to do what you want. Maybe the switch port won't be correct,
or it will be a slower speed. But you might learn quite a bit along the
way. I also expect the cost would be minimal.
At the moment I'm thinking of buying an ADSL2+ standalone modem
first. Once I can make that work it'll be possible to sniff the
ISP traffic intermittently. That's enough to learn a little, when
I get stuck I can just put the old hardware back while figuring out
what went wrong. In the meantime I'll look for a better, more secure
router/firewall. Quantifying "better, more secure" promises to take
some doing.
That sounds reasonable.

I'd suggest a simple hub to go between the modem and router. That way
you can connect another machine to sniff the traffic without interfering
with said traffic.

You can insert the hub when you know you might want to sniff, and then
bypass / unplug it when you don't.

Physically small, low power four port 10/100 hubs should be dirt cheap.
Thank you!
You're welcome. :-)

Thank you for the engaging conversation.
--
Grant. . . .
unix || die
bob prohaska
2019-04-01 02:42:03 UTC
Permalink
Post by Grant Taylor
I suspect that you might be interested in a router running OpenWRT that
can do the filtering between the modem and the servers / internal
router. Is that correct?
That sounds like a good first step.
Post by Grant Taylor
There are a couple of things that come to mind that I think will allow that.
? Bridging the WAN interface with the LAN interface / switch combined
with EBTables L2 filtering.
? Bridging the WAN interface with the LAN interface / switch combined
with IPTables L2 filtering.
? Proxy ARP routing between the WAN interface and the LAN interface /
switch with IPTables L3 filtering.
That would mean that the wild Internet is outside the first router, with
it protecting your DMZ. Your second router would be connected to the
DMZ like a server, and protecting your workstations on the inside.
Let's see if I understand correctly. I gather the setup is

phoneline---dslmodem---router1---router2---privatenet
|
publichosts

where router1 runs EBTables and router2 runs IPTables. (I'll have to
look up those terms, EBTables is new and IPTables poorly understood.)

I did get a DLink DSL-520B modem working with my ISP in bridge mode, so
that's one (small) hurdle surmounted. At a minimum it'll need a switch.
Is a managed switch worth the cost and complexity over a dumb switch?
In particular, could it replace router1?
Post by Grant Taylor
I might suggest that you acquire an old Linksys WRT54GL or some other
OpenWRT capable router for minimal cost and play with it to see if you
can get it to do what you want. Maybe the switch port won't be correct,
or it will be a slower speed. But you might learn quite a bit along the
way. I also expect the cost would be minimal.
I like that idea but haven't seen any good candidates locally. I'll keep
looking.
Post by Grant Taylor
I'd suggest a simple hub to go between the modem and router. That way
you can connect another machine to sniff the traffic without interfering
with said traffic.
You can insert the hub when you know you might want to sniff, and then
bypass / unplug it when you don't.
What do you think of "passive taps", like this:
https://www.securityforrealpeople.com/2014/09/how-to-build-10-network-tap.html
If the signal degradation limits speed to 10Mbps that's ok. I can keep the
sampling lines short, probably under a meter.

Thanks again for reading!

bob prohaska
Grant Taylor
2019-04-03 19:05:52 UTC
Permalink
Post by bob prohaska
Let's see if I understand correctly. I gather the setup is
phoneline---dslmodem---router1---router2---privatenet
|
publichosts
where router1 runs EBTables and router2 runs IPTables.
I think it's possible that you can combine router1 and router2 into a
single device. I think the limiting factor would be the switch
configuration and if you wanted to do VLANs between the router's CPU /
OS or not. If you do, they can be one router (if there are enough
ports). If you don't, then you'd need separate routers.
Post by bob prohaska
(I'll have to look up those terms, EBTables is new and IPTables poorly
understood.)
"ebtables" (I stylize as "EBTables") is how Linux traditionally filtered
/bridged/ traffic. Ethernet Bridge Tables. ;-)

"iptables" (I stylize as "IPTables") is how Linux traditionally filtered
/routed/ traffic.

At some point, IPTables got the ability to filter /bridged/ traffic.
Hence the first and second bullet points.

Feel free to ask questions.
Post by bob prohaska
I did get a DLink DSL-520B modem working with my ISP in bridge mode, so
that's one (small) hurdle surmounted.
:-)
Post by bob prohaska
At a minimum it'll need a switch. Is a managed switch worth the cost and
complexity over a dumb switch? In particular, could it replace router1?
I personally like managed switches. But they are definitely not
/required/ for the configuration you outlined above. The management
comes into play when you start talking about VLANs.

I will say that I am happy with my TP-Link TL-SG108E 8 port gigabit
layer 2 managed switches. They aren't that expensive and do provide an
opportunity to play with VLANs if you /want/ to do so.
Post by bob prohaska
I like that idea but haven't seen any good candidates locally. I'll
keep looking.
Where are you located? I have one that I am not and have not used.
Presuming it powers on, you can have it for the price of shipping and a
soft drink. (Drink is optional.)
Post by bob prohaska
https://www.securityforrealpeople.com/2014/09/how-to-build-10-network-tap.html
If the signal degradation limits speed to 10Mbps that's ok. I can keep
the sampling lines short, probably under a meter.
I'm aware of them. I've never actually needed anything like it. I
think they will work at 10 Mbps and 100 Mbps. 1 Gbps uses different wiring.

I am curious how it relates to / fits in the larger discussion. I
usually see them discussed around things like an IDS / IPS or something
else where you want to make it so that a machine on the receiving side
of the tap is incapable of transmitting data.

Word to the wise: These taps may not work with all equipment. Fancier
equipment can get cranky at the disconnected Tx side and refuse to Rx
things. I don't know how prevalent this is, but it is a possibility.
Post by bob prohaska
Thanks again for reading!
You're welcome.

Sorry for the late reply. I was traveling and wanted to give this the
time and attention it deserves.
--
Grant. . . .
unix || die
bob prohaska
2019-04-04 07:36:49 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
Let's see if I understand correctly. I gather the setup is
phoneline---dslmodem---router1---router2---privatenet
|
publichosts
where router1 runs EBTables and router2 runs IPTables.
I think it's possible that you can combine router1 and router2 into a
single device. I think the limiting factor would be the switch
configuration and if you wanted to do VLANs between the router's CPU /
OS or not. If you do, they can be one router (if there are enough
ports). If you don't, then you'd need separate routers.
Post by bob prohaska
(I'll have to look up those terms, EBTables is new and IPTables poorly
understood.)
"ebtables" (I stylize as "EBTables") is how Linux traditionally filtered
/bridged/ traffic. Ethernet Bridge Tables. ;-)
"iptables" (I stylize as "IPTables") is how Linux traditionally filtered
/routed/ traffic.
At some point, IPTables got the ability to filter /bridged/ traffic.
Hence the first and second bullet points.
Feel free to ask questions.
It's tempting to think bridged traffic is more complicated to filter
than routed traffic. True?
Post by Grant Taylor
Post by bob prohaska
I did get a DLink DSL-520B modem working with my ISP in bridge mode, so
that's one (small) hurdle surmounted.
:-)
Post by bob prohaska
At a minimum it'll need a switch. Is a managed switch worth the cost and
complexity over a dumb switch? In particular, could it replace router1?
I personally like managed switches. But they are definitely not
/required/ for the configuration you outlined above. The management
comes into play when you start talking about VLANs.
I will say that I am happy with my TP-Link TL-SG108E 8 port gigabit
layer 2 managed switches. They aren't that expensive and do provide an
opportunity to play with VLANs if you /want/ to do so.
Perhaps the cart has gotten slightly ahead of the horse, but I acquired
a Netgear GS108PE managed switch from the local BestBuy. It's in service
now and seems to work fine, but the management is more awkward than hoped.

The layout for now is

phoneline----DSLbridge---switch-----publichosts
|
|
router
|
workstation--WAP--privatenet

The switch defaults to management on a 192.168.0.x network in the
absence of a DHCP server (which I'm guessing must be upstream) and
it isn't obvious how to get at it from the private side. I probably
could use an alias address on one of the public hosts, but that seems
awkward. I could loop back a cable from the private side of the router
to the switch, but that makes me cringe even if it works 8-)

The router is a D-Link DI-524, updated to the latest firmware. It's
rather crude but will do for now. I'm guessing that a one-router setup
would put the router between modem and switch, using some sort of vlan
downstream to sort traffic between public and private nets; is that close?

[on getting a secondhand openWRT router]
Post by Grant Taylor
Post by bob prohaska
I like that idea but haven't seen any good candidates locally. I'll
keep looking.
Where are you located? I have one that I am not and have not used.
Presuming it powers on, you can have it for the price of shipping and a
soft drink. (Drink is optional.)
Thank you!

I'm in Davis, CA, a little west of Sacramento. There are thrift stores in
the area that have home networking equipment, I just need to keep looking.
There were a few Linksys routers for sale, but by the time I went back for
a second look they were gone. Not clear whether they were sold or scrapped.

OpenWRT makes much of the need for sufficient flash and RAM in routers for
current versions. They suggest 8 MB flash and 64 MB RAM. That's part of why
I hesitated. Likely, knowledgeable folks can tell by looking at the label,
but I can't, yet.
Post by Grant Taylor
Post by bob prohaska
https://www.securityforrealpeople.com/2014/09/how-to-build-10-network-tap.html
If the signal degradation limits speed to 10Mbps that's ok. I can keep
the sampling lines short, probably under a meter.
I'm aware of them. I've never actually needed anything like it. I
think they will work at 10 Mbps and 100 Mbps. 1 Gbps uses different wiring.
I am curious how it relates to / fits in the larger discussion. I
usually see them discussed around things like an IDS / IPS or something
else where you want to make it so that a machine on the receiving side
of the tap is incapable of transmitting data.
Word to the wise: These taps may not work with all equipment. Fancier
equipment can get cranky at the disconnected Tx side and refuse to Rx
things. I don't know how prevalent this is, but it is a possibility.
I thought of the passive tap as a cheap alternative to a managed switch.
That's now water under the bridge, assuming I _can_ manage the switch.
Post by Grant Taylor
Sorry for the late reply. I was traveling and wanted to give this the
time and attention it deserves.
I really appreciate your help!

bob prohaska
Grant Taylor
2019-04-04 18:08:29 UTC
Permalink
Post by bob prohaska
It's tempting to think bridged traffic is more complicated to filter
than routed traffic. True?
In a vacuum, I don't think filtering bridged traffic with EBTables is
any more difficult than filtering routed traffic with IPTables.

Some of the complexity can come from the network configuration that said
filtering fits within.
Post by bob prohaska
Perhaps the cart has gotten slightly ahead of the horse, but I acquired
a Netgear GS108PE managed switch from the local BestBuy. It's in service
now and seems to work fine, but the management is more awkward than hoped.
Cool.

Feel free to ask questions. I'll have to look at the manual and deduce
things about that switch.
Post by bob prohaska
The layout for now is
phoneline----DSLbridge---switch-----publichosts
|
|
router
|
workstation--WAP--privatenet
Assuming that the switch is not doing any VLANs, I'm going to go out on
a limb and say that there is no filtering between the ISP and the public
hosts.

Other than the lack of filtering, this is a perfectly valid network
configuration.
Post by bob prohaska
The switch defaults to management on a 192.168.0.x network in the absence
of a DHCP server (which I'm guessing must be upstream) and it isn't
obvious how to get at it from the private side.
I would probably configure the switch to use a static IP for it's
management interface and not even try to use DHCP and then fall back to
something. (There's also the chance that it can DHCP from the upstream
provider, if they support that.)
Post by bob prohaska
I probably could use an alias address on one of the public hosts, but
that seems awkward.
You're closer than you might realize. You can put the additional IP on
one of your public hosts, or you could put it on your router, which is
also connected to the same network. (This is what I have done many
times in the past.)
Post by bob prohaska
I could loop back a cable from the private side of the router to the
switch, but that makes me cringe even if it works 8-)
I would advise against that. Doing that effectively connects the public
side of your router to the private side. Then you're back to mixing the
two networks. Which I'm confident you want to avoid doing.
Post by bob prohaska
The router is a D-Link DI-524, updated to the latest firmware. It's
rather crude but will do for now. I'm guessing that a one-router setup
would put the router between modem and switch, using some sort of vlan
downstream to sort traffic between public and private nets; is that close?
Yes, that's quite close.

You can bridge traffic (with EBTables filtering) from the modem to a
VLAN that the public servers are connected to, and route / NAT to the
private VLAN where your internal systems are connected.

phoneline---DSLbridge---router===switch---[public VLAN]---public host
|
[private VLAN]
|
workstation---WAP---privatenet

--- regular Ethernet connection
=== VLAN trunk Ethernet connection
Post by bob prohaska
[on getting a secondhand openWRT router]
Thank you!
:-)
Post by bob prohaska
I'm in Davis, CA, a little west of Sacramento. There are thrift stores
in the area that have home networking equipment, I just need to keep
looking. There were a few Linksys routers for sale, but by the time I
went back for a second look they were gone. Not clear whether they were
sold or scrapped.
ACK

Things turn over faster in your area than in mine.
Post by bob prohaska
OpenWRT makes much of the need for sufficient flash and RAM in routers
for current versions. They suggest 8 MB flash and 64 MB RAM. That's part
of why I hesitated. Likely, knowledgeable folks can tell by looking at
the label, but I can't, yet.
I can't tell off hand.

I'd have to look at the OpenWRT site to see what models are supported.

If I was on the hunt, I'd probably make a cheat sheet, or bookmark it on
my smartphone. That way I could check while at the thrift store. ;-)
Post by bob prohaska
I thought of the passive tap as a cheap alternative to a managed switch.
Ah.

It is an alternative to a SPAN port. But I'm fairly sure that won't do
what (I think) you are wanting to do.
Post by bob prohaska
That's now water under the bridge, assuming I _can_ manage the switch.
I'm betting that you will be able to.
Post by bob prohaska
I really appreciate your help!
:-)

I enjoy helping ~> teaching people.

I actually had someone send me a couple 2-liters of soda internationally
as payment for helping them for about 9 months. I say internationally,
he was in Germany and had a friend in the same town as me proxy the
2-liters. The 2-liters were more of a joke. But it was a fun joke.

I did ask him, and I will ask you, to help someone else in the future if
you can. :-)
--
Grant. . . .
unix || die
bob prohaska
2019-04-06 04:00:19 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
It's tempting to think bridged traffic is more complicated to filter
than routed traffic. True?
In a vacuum, I don't think filtering bridged traffic with EBTables is
any more difficult than filtering routed traffic with IPTables.
Some of the complexity can come from the network configuration that said
filtering fits within.
Post by bob prohaska
Perhaps the cart has gotten slightly ahead of the horse, but I acquired
a Netgear GS108PE managed switch from the local BestBuy. It's in service
now and seems to work fine, but the management is more awkward than hoped.
Cool.
Feel free to ask questions. I'll have to look at the manual and deduce
things about that switch.
Post by bob prohaska
The layout for now is
phoneline----DSLbridge---switch-----publichosts
|
|
router
|
workstation--WAP--privatenet
Assuming that the switch is not doing any VLANs, I'm going to go out on
a limb and say that there is no filtering between the ISP and the public
hosts.
Other than the lack of filtering, this is a perfectly valid network
configuration.
At least now the public and private IPs aren't on the same switch.....
Post by Grant Taylor
Post by bob prohaska
The switch defaults to management on a 192.168.0.x network in the absence
of a DHCP server (which I'm guessing must be upstream) and it isn't
obvious how to get at it from the private side.
I would probably configure the switch to use a static IP for it's
management interface and not even try to use DHCP and then fall back to
something. (There's also the chance that it can DHCP from the upstream
provider, if they support that.)
Post by bob prohaska
I probably could use an alias address on one of the public hosts, but
that seems awkward.
You're closer than you might realize. You can put the additional IP on
one of your public hosts, or you could put it on your router, which is
also connected to the same network. (This is what I have done many
times in the past.)
Indeed, it seems to work, with a small twist. After a couple days' runtime
the switch wouldn't answer its default address. If it was power-cycled and
then pinged, it did answer. Looks like there's a timeout of some sort.

The DI-524 router does not seem to allow more than one static route, so it
isn't apparent how to let a host on the private net administer the switch.
Post by Grant Taylor
Post by bob prohaska
I could loop back a cable from the private side of the router to the
switch, but that makes me cringe even if it works 8-)
I would advise against that. Doing that effectively connects the public
side of your router to the private side. Then you're back to mixing the
two networks. Which I'm confident you want to avoid doing.
Please count that idea as a badly-bungled joke..!
Post by Grant Taylor
Post by bob prohaska
The router is a D-Link DI-524, updated to the latest firmware. It's
rather crude but will do for now. I'm guessing that a one-router setup
would put the router between modem and switch, using some sort of vlan
downstream to sort traffic between public and private nets; is that close?
Yes, that's quite close.
You can bridge traffic (with EBTables filtering) from the modem to a
VLAN that the public servers are connected to, and route / NAT to the
private VLAN where your internal systems are connected.
phoneline---DSLbridge---router===switch---[public VLAN]---public host
|
[private VLAN]
|
workstation---WAP---privatenet
--- regular Ethernet connection
=== VLAN trunk Ethernet connection
One option in the switch settings is a default route, which surprised me.
Now that's starting to make a little sense.
Post by Grant Taylor
Post by bob prohaska
[on getting a secondhand openWRT router]
Thank you!
:-)
Post by bob prohaska
I'm in Davis, CA, a little west of Sacramento. There are thrift stores
in the area that have home networking equipment, I just need to keep
looking. There were a few Linksys routers for sale, but by the time I
went back for a second look they were gone. Not clear whether they were
sold or scrapped.
ACK
Things turn over faster in your area than in mine.
Post by bob prohaska
OpenWRT makes much of the need for sufficient flash and RAM in routers
for current versions. They suggest 8 MB flash and 64 MB RAM. That's part
of why I hesitated. Likely, knowledgeable folks can tell by looking at
the label, but I can't, yet.
I can't tell off hand.
I'd have to look at the OpenWRT site to see what models are supported.
If I was on the hunt, I'd probably make a cheat sheet, or bookmark it on
my smartphone. That way I could check while at the thrift store. ;-)
I've so far resisted getting a smartphone...Not sure how much longer I can
hold out.
Post by Grant Taylor
Post by bob prohaska
I thought of the passive tap as a cheap alternative to a managed switch.
Ah.
It is an alternative to a SPAN port. But I'm fairly sure that won't do
what (I think) you are wanting to do.
Post by bob prohaska
That's now water under the bridge, assuming I _can_ manage the switch.
I'm betting that you will be able to.
The only barrier remaining is getting a usable browser on a public host.
FreeBSD is very good at CLI work, but GUI ports are kinda cranky, in
particular on ARM. Firefox worked for a while, but broke, and is a heavy
burden on a tiny computer. Lynx gets stuck at the login page. Epiphany
is next to try.
Post by Grant Taylor
Post by bob prohaska
I really appreciate your help!
:-)
I enjoy helping ~> teaching people.
I actually had someone send me a couple 2-liters of soda internationally
as payment for helping them for about 9 months. I say internationally,
he was in Germany and had a friend in the same town as me proxy the
2-liters. The 2-liters were more of a joke. But it was a fun joke.
I did ask him, and I will ask you, to help someone else in the future if
you can. :-)
Please be assured, I will!

bob prohaska
Grant Taylor
2019-04-07 04:04:36 UTC
Permalink
Post by bob prohaska
At least now the public and private IPs aren't on the same switch.....
:-)
Post by bob prohaska
Indeed, it seems to work, with a small twist. After a couple days' runtime
the switch wouldn't answer its default address. If it was power-cycled
and then pinged, it did answer. Looks like there's a timeout of some sort.
Hum. That's mildly concerning.
Post by bob prohaska
The DI-524 router does not seem to allow more than one static route, so it
isn't apparent how to let a host on the private net administer the switch.
Please count that idea as a badly-bungled joke..!
Been there. Done that. Moving on.
Post by bob prohaska
One option in the switch settings is a default route, which surprised me.
Now that's starting to make a little sense.
The switch's default route will be for the management traffic.
Post by bob prohaska
I've so far resisted getting a smartphone...Not sure how much longer I
can hold out.
Paper lists work perfectly fine for things you can research ahead of time.
Post by bob prohaska
The only barrier remaining is getting a usable browser on a public host.
FreeBSD is very good at CLI work, but GUI ports are kinda cranky, in
particular on ARM. Firefox worked for a while, but broke, and is a heavy
burden on a tiny computer. Lynx gets stuck at the login page. Epiphany
is next to try.
To each his / her own.
Post by bob prohaska
Please be assured, I will!
:-D
--
Grant. . . .
unix || die
bob prohaska
2019-04-08 05:08:42 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
One option in the switch settings is a default route, which surprised me.
Now that's starting to make a little sense.
The switch's default route will be for the management traffic.
Then maybe I don't understand.

Is it a destination for logging information?

In this case all the hosts can "see" the ISP's default gateway and
send their traffic to it through the switch.

Thanks for reading!

bob prohaska
Grant Taylor
2019-04-08 05:20:54 UTC
Permalink
Post by bob prohaska
Then maybe I don't understand.
Switching is (usually) a layer 2 operation and doesn't care about IP
addresses, much less gateways. (I say usually because some special
switches operate on layer 3.)
Post by bob prohaska
Is it a destination for logging information?
No, it's not a destination. It's a route to something that's not on the
local subnet.

The switch's default gateway is really functionally the same as the
default gateway for your computer. It's a route to use to get to
something that's not in the locally attached subnet.

For a switch, this is applicable to the management traffic. Like your
access to it via web and / or ssh. The switch won't use the default
gateway as part of the process of switching traffic based on layer 2 MAC
addresses.
Post by bob prohaska
In this case all the hosts can "see" the ISP's default gateway and
send their traffic to it through the switch.
That should be the case with what ever the switch's default gateway is
configured to be.
Post by bob prohaska
Thanks for reading!
You're welcome.
--
Grant. . . .
unix || die
bob prohaska
2019-04-09 02:34:39 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
Is it a destination for logging information?
No, it's not a destination. It's a route to something that's not on the
local subnet.
The switch's default gateway is really functionally the same as the
default gateway for your computer. It's a route to use to get to
something that's not in the locally attached subnet.
For a switch, this is applicable to the management traffic. Like your
access to it via web and / or ssh. The switch won't use the default
gateway as part of the process of switching traffic based on layer 2 MAC
addresses.
Given this layout

phoneline-------dslbridge----------switch------publichosts
|
router
|
privatenet
|
workstation

would the gateway for the switch then be the public IP of the router?

At this point the router knows only about the ISP's gateway, so it's
not obvious how to move traffic from the workstation to the switch's
192.168.x.y address.

The router can be told its own IP, the ISP's gateway IP, netmask and
a MAC address, but I think the MAC address refers to what the router
advertises, not a destination. Looks like there's no option for adding
static routes.

No matter, I just learned a great deal!

Thank you,

bob prohaska
Grant Taylor
2019-04-09 02:55:55 UTC
Permalink
Post by bob prohaska
Given this layout
phoneline-------dslbridge----------switch------publichosts
|
router
|
privatenet
|
workstation
would the gateway for the switch then be the public IP of the router?
Yes, that's what I would use.
Post by bob prohaska
At this point the router knows only about the ISP's gateway, so it's
not obvious how to move traffic from the workstation to the switch's
192.168.x.y address.
I would add the 192.168.x.y address to the router's outside. But I
don't know if that's possible with the firmware that's on it now.
Post by bob prohaska
The router can be told its own IP, the ISP's gateway IP, netmask and
a MAC address, but I think the MAC address refers to what the router
advertises, not a destination. Looks like there's no option for adding
static routes.
I would think the router would use it's own MAC address. At least
unless you had the router clone a MAC address. (Something I almost
never do.)
Post by bob prohaska
No matter, I just learned a great deal!
Cool!
Post by bob prohaska
Thank you,
You're welcome.
--
Grant. . . .
unix || die
bob prohaska
2019-04-10 00:35:07 UTC
Permalink
Post by Grant Taylor
Post by bob prohaska
At this point the router knows only about the ISP's gateway, so it's
not obvious how to move traffic from the workstation to the switch's
192.168.x.y address.
I would add the 192.168.x.y address to the router's outside. But I
don't know if that's possible with the firmware that's on it now.
Far as I can tell it isn't possible. Another reason to look for a better
router.


Thank you very much, the solution was most unexpected.

bob prohaska
Grant Taylor
2019-04-10 01:28:16 UTC
Permalink
Post by bob prohaska
Far as I can tell it isn't possible. Another reason to look for a
better router.
ACK
Post by bob prohaska
Thank you very much, the solution was most unexpected.
You're very welcome. You know where I'll be. :-)
--
Grant. . . .
unix || die
Grant Taylor
2019-03-20 21:40:04 UTC
Permalink
Post by bob prohaska
https://forum.huawei.com/enterprise/en/Case-share-Broadcasting-packets-with-ethertype-0x999a/thread/496447-863
which suggests the packet came from a diagnostic function on a Huawei device.
I have added Ethertype 0x999a to Wikipedia's Ethertype page based on the
link that you found.
--
Grant. . . .
unix || die
Johann Beretta
2019-04-05 07:04:36 UTC
Permalink
Post by bob prohaska
The modem/routers I've contemplated have four switch ports unless I want
commercial grade equipment, which seems extravagant.
I'm coming in to this conversation in the middle, so I probably don't
have all the facts, but from what I have read so far, I'd suggest you
take a very detailed look at MikroTik's line of switches/routers and the
base operating system for it, RouterOS.

I suspect these routers and/or switches may be able to solve your issues
or at least solve some of them.

RouterOS is deceptively powerful and well documented so it bears a look.

(not affiliated with MikroTik, I just use their routers, exclusively, to
handle routing for my ISP)
bob prohaska
2019-04-06 04:38:56 UTC
Permalink
Post by Johann Beretta
Post by bob prohaska
The modem/routers I've contemplated have four switch ports unless I want
commercial grade equipment, which seems extravagant.
I bought an 8 port managed switch. It was slightly more extravagant than
intended. Less so than earlier options found. An existing simple router
provides the private network for now, but a better router is desirable.
Post by Johann Beretta
I'm coming in to this conversation in the middle, so I probably don't
have all the facts, but from what I have read so far, I'd suggest you
take a very detailed look at MikroTik's line of switches/routers and the
base operating system for it, RouterOS.
I suspect these routers and/or switches may be able to solve your issues
or at least solve some of them.
RouterOS is deceptively powerful and well documented so it bears a look.
(not affiliated with MikroTik, I just use their routers, exclusively, to
handle routing for my ISP)
I'd not paid much attention to MikroTik, but they seem well-represented on
Amazon. They also seem well-supported by openWRT.

I'll keep an eye peeled!

As a (probably unrealistic) side question, is there any established
protocol for evaluating network equipment with regard to security?
Manufacturers eagerly describe features and performance, but nobody
says a word about audits for buffer overruns and backdoors. Underwriter's
Laboratories made a good business out of testing electrical equipment
for demonstrable fire safety flaws in design and construction.

Is there any parallel in network equipment security? Is it even possible?
First guess I'd say "no", only because I can't think of a way. Hopefully
others are more skillful.

Thanks for reading

bob prohaska
Johann Beretta
2019-04-13 16:27:28 UTC
Permalink
Post by bob prohaska
As a (probably unrealistic) side question, is there any established
protocol for evaluating network equipment with regard to security?
Manufacturers eagerly describe features and performance, but nobody
says a word about audits for buffer overruns and backdoors. Underwriter's
Laboratories made a good business out of testing electrical equipment
for demonstrable fire safety flaws in design and construction.
Is there any parallel in network equipment security? Is it even possible?
First guess I'd say "no", only because I can't think of a way. Hopefully
others are more skillful.
Thanks for reading
bob prohaska
Well, most routers are running some closed source OS, so auditing would
be nearly impossible.

Using MikroTik as an example, because that's what I use, there are
updates and fixes quite regularly. That's probably about the best you
can hope for short of building (or using) a router based on OpenBSD (a
Unix variant). OpenBSD has the best reputation in computing for "secure
out of the box".

Consumer routers are definitely out.. They get a couple of updates and
then are EOL (end of life) pretty quickly. Once that happens you're
screwed if an exploit is discovered. You want something that is updated
regularly and not abandoned.
bob prohaska
2019-04-13 23:01:01 UTC
Permalink
Post by Johann Beretta
Well, most routers are running some closed source OS, so auditing would
be nearly impossible.
Perhaps "auditing" is over-specific. Would "testing" be more feasible?
Things like buffer overflows, unsecured ports or services, acceptance of
admin traffic on the WAN side. Admittedly, the odds of knocking correctly
on a deliberate backdoor are very poor, but any testing seems better than
none.
Post by Johann Beretta
Using MikroTik as an example, because that's what I use, there are
updates and fixes quite regularly. That's probably about the best you
can hope for short of building (or using) a router based on OpenBSD (a
Unix variant). OpenBSD has the best reputation in computing for "secure
out of the box".
Consumer routers are definitely out.. They get a couple of updates and
then are EOL (end of life) pretty quickly. Once that happens you're
screwed if an exploit is discovered. You want something that is updated
regularly and not abandoned.
What do you think of things like openWRT, dd-WRT, tomato or other
open-source software running on a consumer-grade router? From afar
it would seem to offer both inexpensive hardware and ongoing updates.
However, I've never gotten close enough to any of them to actually
know what they're like to work with. Flashing new firmware doesn't
seem like a great barrier. Cross-compiling the firmware is probably
more than I want to tackle.


Thanks for reading, and any insights...

bob prohaska
Johann Beretta
2019-04-14 03:09:58 UTC
Permalink
Post by bob prohaska
Perhaps "auditing" is over-specific. Would "testing" be more feasible?
Things like buffer overflows, unsecured ports or services, acceptance of
admin traffic on the WAN side. Admittedly, the odds of knocking correctly
on a deliberate backdoor are very poor, but any testing seems better than
none.
I don't know. Maybe.. I have a gut feeling that testing would only catch
old and well known vulnerabilities. The ones the hackers seem to
exploit are the brand new ones..

If you discover, for example, some new exploit in a Netgear router you
know is no longer in production, I think it would be reasonable to
assume that it's not going to be patched.. More than likely the router
is no longer maintained.. If I was the bad guy, I'd be looking for
those routers to infect. You're gonna infect it and it'll probably
never be patched.. Basically you'll own it until it's replaced or dies.
Post by bob prohaska
What do you think of things like openWRT, dd-WRT, tomato or other
open-source software running on a consumer-grade router? From afar
it would seem to offer both inexpensive hardware and ongoing updates.
However, I've never gotten close enough to any of them to actually
know what they're like to work with. Flashing new firmware doesn't
seem like a great barrier. Cross-compiling the firmware is probably
more than I want to tackle.
I don't have much experience with any of those so I cannot comment with
any authority. I remember trying DD-WRT on a Ubiquiti PowerBridge way
back in the day. I wasn't overly impressed and quickly abandoned the
idea of running 3rd party firmware on Ubiquiti's hardware. That's not
to suggest that it's not great firmware.. It just didn't do it for me.

I have been far more impressed with RouterOS and the RouterBoard
hardware. My current business router is a Cloud Core CCR1009-7G-1C-1S+
with 9 CPU cores & 2 Gigs of RAM and and at home I'm using a Cloud
Router CRS109-8G-1S-2HnD Switch (kinda like a switch and router in one).

The CCR1009 is rated at several gigabits per second, but for me it's
usually averaging about 400mbps 24 hours a day.. Sometimes a little
more, sometimes a little less. This device is rock solid stable. It
only gets rebooted to apply firmware updates that are relevant, so
sometimes it goes 6 months at a time and it's never crashed.
Post by bob prohaska
Thanks for reading, and any insights...
bob prohaska
Loading...