Hello fellow Linux enthusiasts!

As many of you know, Linux can be a powerful and flexible operating system, but it can also be daunting for new users, especially when it comes to securing their systems. With the abundance of information available online, it’s easy to get overwhelmed and confused about the best practices for firewall configuration and basic security.

That’s why I reaching out to the Linux community for help. I am looking users who are willing to share their expertise and write a comprehensive guide to Linux firewall and security.

The goal of this guide is to provide a centralized resource that covers the following topics:

Introduction to Linux firewalls (e.g., firewalld, ufw, etc.)
Understanding basic security principles (e.g., ports, protocols, network traffic)
Configuring firewalls for various scenarios (e.g., home networks, servers, VPNs)
Best practices for securing Linux systems (e.g., password management, package updates, file permissions)
Troubleshooting common issues and errors
Advanced topics (e.g., network segmentation, SELinux, AppArmor)

I am looking for a well-structured and easy-to-follow guide that will help new users understand the fundamentals of Linux firewall and security, while also providing advanced users with a comprehensive resource for reference.

If you’re interested in contributing to this project, please reply to this post with your experience and expertise in Linux firewall and security. We’ll be happy to discuss the details and work together to create a high-quality guide that benefits the Linux community.

Thank you for your time and consideration, and im looking forward to hearing from you!

  • apt_install_coffee@lemmy.ml
    link
    fedilink
    arrow-up
    25
    ·
    2 years ago

    I build Linux routers for my day job. Some advice:

    • your firewall should be an appliance first and foremost; you apply appropriate settings and then other than periodic updates, you should leave it TF alone. If your firewall is on a machine that you regularly modify, you will one day change your firewall settings unknowingly. Put all your other devices behind said firewall appliance. A physical device is best, since correctly forwarding everything to your firewall comes under the “will one day unknowingly modify” category.

    • use open source firewall & routing software such as OpenWRT and PFSense. Any commercial router that keeps up to date and patches security vulnerabilities, you cannot afford.

    • LordKitsuna@lemmy.world
      link
      fedilink
      arrow-up
      9
      ·
      2 years ago

      i just want to also toss opnsense into that list, a long time ago it forked off pfsense and these days it offers (in my opinion) a significantly easier and better UI as well as more up to date kernel and better tools for dealing with things like buffer bloat

    • LordKitsuna@lemmy.world
      link
      fedilink
      arrow-up
      7
      arrow-down
      4
      ·
      edit-2
      2 years ago

      Yeah I don’t even understand the point. The vast majority of people don’t even need a client side firewall. The only time you need to worry about a client side of firewall is if you’re on a laptop that you actually take out of your house ever or on a university or otherwise shared network. At home it’s completely meaningless and a waste of CPU Cycles.

      There are significantly better ways to address security, like how to enable a sandbox like firejail or bubblewrap or enable things like apparmor, firewall is probably one of the most inconsequential parts of security these days because it’s all handled by the local router

      • AProfessional@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        edit-2
        2 years ago

        Home networks are full of trash like iot devices, like smart speakers, tvs, plugs, etc. Average people should have firewalls. It’s free.

        • LordKitsuna@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          2 years ago

          If you genuinely wish to isolate those devices the correct way to do it is not with client firewalls but with a Smart Switch and vlans

          • AProfessional@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            2 years ago

            You may want them to communicate with each other to control them. Also setting up a vlan is quite complex for most users even if it has clear upsides.

  • aodhsishaj@lemmy.world
    link
    fedilink
    arrow-up
    9
    ·
    2 years ago

    This is a very broad subject. Are we talking straight iptables, or ufw/firewalld or at the app level with selinux/apparmor. Or at the firewall level like opnsense/pfsense? Or on the router side ddwrt and tomato etc. You can grab certain distros on either side, whonix/tails on the blueteam side, kali on the red team side. There are hardened kernels like zen and securelinux. There’s network security, but also kernel level stuff like run levels, tpm, uefi, etc.

    My real question is who is the audience for this? What is their use case, what distro are they using? What is the proposed environment?

  • BoofStroke@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    2 years ago
    • use pfsense for a firewall. Using nftables, firewalld, etc should only really come into play if on an untrusted network. Firewalls on servers can cause more problems than they solve and are easy to misconfigure.
    • run lynis on your Linux servers to help get them compliant with CIS benchmarks
    • be careful with your reverse proxies
    • keep things patched
    • run only necessary services
    • configure needed services conservatively
    • no root logins
    • LordKitsuna@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      2 years ago

      i just want to also toss opnsense into that list, a long time ago it forked off pfsense and these days it offers (in my opinion) a significantly easier and better UI as well as more up to date kernel and better tools for dealing with things like buffer bloat

  • jollyrogue@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    2 years ago

    Interesting.

    What are the hosting details and contrib guidelines?

    And some other random notes…

    “Best practices for securing Linux” could probably be dropped. There are enough of those, and the topic could overrun the focus on firewalls. I could see a secure network section, but Linux might be too broad.

    What about opening it up to FOSS firewalls and networking in general? The BSDs, Illumos, Haiku, and others could be added. Linux could be the starting point, and the others could be added as people feel like it.

  • kugmo@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 years ago

    I’d love a good firewalld guide that’s kinda tldr and would go into the details later.

  • Stillhart@lemm.ee
    link
    fedilink
    arrow-up
    3
    ·
    2 years ago

    I tried using a guide online one time to build a linux router/firewall onto a passively-cooled mini-computer that I could leave on a shelf with no I/O connected… basically a replacement for the garbo off-the-shelf wifi routers that die every year. It worked…mostly. The problem is that the random little things that didn’t work right just were insurmountable for a linux noob who was just trying to follow a guide.

    I hate that spending money on the best ones you can buy STILL die after a year or two. And now they all require you to login so even more people can inspect all my network traffic.

    I’d love to see a guide that’s kept up to date for building a simple router/firewall, with sections like you have above for more information so people can unlock ports for unusual stuff or whatever. I mean, in a perfect world, you install a LTS OS and set it up and forget about it for a few years. Mine was like that except it required manual intervention every time it rebooted. If that wasn’t the case, it would have been perfect and I would be recommeding it to everyone.

    • LordKitsuna@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      2 years ago

      Instead of building one from scratch why not simply use one of the already made router operating systems? I would personally recommend opnsense, it has a nice easy to use web UI and can be setup in like maybe 20min.

      as for hardware you can use just about anything but i highly recommend these cute little dedicated router boxes. It is passively cooled, plenty powerful to handle wireguard VPN at gigabit speeds and should easily last you many many years without an issue.

      • Stillhart@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        2 years ago

        That’s the kind of box I’ve been using. Just been running linux on it. It’s been a few years, I’ll look into opnsense, thx.

  • hottari@lemmy.ml
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    2 years ago

    Have your tried the ArchWiki for the firewall programs you mentioned and their Security wiki as well? I usually find it resourceful and very comprehensive.

  • ReakDuck@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    2 years ago

    What kind of attacks could I expect on a Linux Machine? Especially when using bare Arch Linux and only setting up software that I consume (Minecraft Server, Zerotier)

  • Secret300@sh.itjust.works
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    2 years ago

    Been using Linux for 8 years. Never even touched a firewall. Well one time on Ubuntu server i used ufw to open a port but that was it

    • Espi@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      2 years ago

      While I think firewalls are overrated, they are also dead easy to set up, and the best kind of defense is defense in depth.

  • sir_reginald@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    2
    ·
    2 years ago

    This shouldn’t be targeted at the average used who does not need firewalls nor most networking stuff. If highly invested in security, maybe AppArmor/SELinux could come handy. Other topics I find interesting would be the use of VPNs with Wireguard, setup killswitches, how to configure a system-wide Tor proxy, etc.

    In stuff like that I could definitely help, depending on the conditions.