Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deny VPN accessing applications extra open ports #26

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

PhasecoreX
Copy link

This pull request denies incoming_ports_ext_array and incoming_ports_lan_array from being accessed from the VPN. The idea is those should only be accessible from the LAN/host or the docker network.

Originally I had made a pull request on binhex/arch-delugevpn for this, but you have since moved it to this repo.

The custom VPN I am using seems to forward most/all ports automatically (they're dedicated IP addresses it seems). This is great, however it allows for the web ui and the daemon port (in Deluge) to also be accessible to the VPN network. A user could find my current VPN IP address (from the swarm, or just port scanning random IP addresses) and access either of those services. Granted, they are password protected, but it would be nice to have these ports closed/drop in the IP tables setup.

Not sure if there is a better/more secure way of solving this; all I know is that without this modification, I can see both ports 8112 and 58846 open when I use a port scanner on my VPNs IP address. When I use this modification, they are no longer open.

This denies incoming_ports_ext_array and incoming_ports_lan_array from being accessed form the VPN.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant