dns-firewall

dns-firewall is a filtering DNS proxy server integrating into iptables firewalls written in Rust.

Whereas regular firewalls can only filter by destination IP address, this server can filter by destination domain name instead. It restricts outbound traffic of clients according to an allowlist. It can, for instance, be installed on a router to ensure that a set of managed servers or virtual machines only open connections to intended destinations, filtering out telemetry or other unwanted traffic.

Usage Tutorial

  1. Install the server

  2. Prepare your firewall

    dns-firewall uses a combination of iptables and ipset to dynamically manage firewall rules. Make sure you have both installed (on Ubuntu: sudo apt update && sudo apt install -y iptables ipset).

    Designate a chain that will be managed by dns-firewall, for example DNSALLOWLIST. ACCEPT rules will be created in this chain by the program. Note that any user-created rules will be removed from the chain on program start.

    It is your responsibility to block all traffic that has passed through the chain without being accepted. You can use either DROP or REJECT rules as usual.

    Example for the FORWARD chain:

    bash iptables -N DNSALLOWLIST iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A FORWARD -j DNSALLOWLIST iptables -A FORWARD -j LOG iptables -A FORWARD -j REJECT

    You can also filter traffic from localhost in the OUTPUT chain, but dns-firewall really is designed to be used on routers as part of the FORWARD chain.

  3. Configure the server

    Open /etc/dns-firewall/acl in a text editor, and configure access rules:

    ```

    General format to grant access to a domain: [client IP/subnet] -> [domain]:[protocol]:[port]

    To only allow DNS requests without adding firewall exceptions, use: [client IP/subnet] ~> [domain]

    Everything after # will be treated as comments and ignored.

    127.0.0.1 -> github.com:TCP:443 92.168.1.10 -> *.example.com:UDP:655 # You can use subdomain wildcards 2001:0db8:85a3:0000:0000:8a2e:0370:7334 -> example.com:TCP:22

    192.168.2.0/24 -> download.docker.com:TCP:443 192.168.2.0/24 -> registry-1.docker.io:TCP:443 192.168.2.0/24 -> auth.docker.io:TCP:443 192.168.2.0/24 -> production.cloudflare.docker.com:TCP:443

    192.168.1.10 ~> mail.local # Only allow DNS requests, don't add firewall rules 192.168.1.1 ~> * # Using wildcard is possible too, to allow all DNS requests

    92.168.1.10 -| wpad.example.com # Always block access to 'wpad.example.com', even if there is a more general wildcard allow rule 10.0.0.8 -| ads.example.com = 127.0.0.1 # Always resolve 'ads.example.com' to 127.0.0.1, does not add firewall exception ```

    Open /etc/dns-firewall/config.env in a text editor. Edit at least the following lines:

    upstream=192.168.1.1 chain=DNSALLOWLIST

  4. Run the server

    Run sudo systemctl start dns-firewall

    An application log (and any startup errors) will be printed to stderr. Use sudo systemctl status dns-firewall to look at potential errors.

  5. Reconfigure your DNS resolvers

    You have to ensure the filtered hosts are using the dns-firewall proxy server, for example by configuring it as DNS server either statically or as part of DHCP.

Building

Prerequisites:

Building:

cargo build --release

Packaging:

Installing:

How it works

  1. Incoming client requests will be filtered according to the access control list. If the client is not allowed to resolve the domain name, the server returns RCODE REFUSED immediately. Otherwise, it remembers the allowed destination sockets for the requested domain name.
  2. The server forwards client requests to the upstream server and awaits its response.
  3. The server invokes ipset to add ephemeral firewall rules for the resolved IP address(es) and remembered destination sockets.
  4. The server returns the resolved address to the client.

Configuration

Application Options:

The server is configured either via command line arguments or environment variables. When using systemd, the environment variables can be loaded from a configuration file (/etc/dns-firewall/config.env). All options can be queried by running dns-firewall --help. Help output:

``` dns-firewall 1.2.1

USAGE: dns-firewall [OPTIONS] --acl-file --firewall --upstream

FLAGS: -h, --help Prints help information -V, --version Prints version information

OPTIONS: --acl-file Path to the Access Control List (ACL) file [env: ACLFILE=] --firewall Firewall backend [env: FIREWALL=] [possible values: none, iptables] --bind IP address to bind proxy server to [env: BIND=] [default: 127.0.0.53] --bind-port Port to bind proxy server to [env: BINDPORT=] [default: 537] --chain Firewall chain (iptables backend only) [env: CHAIN=] --max-connections Maximum number of concurrent connections [env: MAXCONNECTIONS=] [default: 100] --max-rule-time Maximum duration of firewall rules, in seconds; may override TTL [env: MAXRULETIME=] --min-rule-time Minimum duration of firewall rules, in seconds; may override TTL [env: MINRULETIME=] [default: 5] --timeout Connection timeout, in seconds [env: TIMEOUT=] [default: 10] --upstream IP address of the upstream server [env: UPSTREAM=] --upstream-port Port of the upstream server [env: UPSTREAMPORT=] [default: 53] ```

Access Control List:

The access control list file, by default /etc/dns-firewall/acl, contains allow rules. By default (if the file is empty), all requests will be blocked.

The file must contain one rule on each line, with empty lines or comments (# This is a comment) being ignored. Rule syntax:

Logging

Application Log:

The application log is printed to stderr. After startup, it may look like this:

[INFO ] Using iptables backend, chain "DNSALLOWLIST" [ERROR] '/usr/sbin/ip6tables -F DNSALLOWLIST' failed: [exit code: 3] modprobe: ERROR: could not insert 'ip6_tables': Operation not permitted ip6tables v1.8.4 (legacy): can't initialize ip6tables table `filter': Table does not exist (do you need to insmod?) Perhaps ip6tables or your kernel needs to be upgraded. [WARN ] No IPv6 rules will be created. [INFO ] Server started!

Note that in the example environment, IPv6 was disabled at boot time, therefore dns-firewall will not be able to insert IPv6 rules. IPv4 will work fine though.

During execution, only hard errors will be logged to the application log. Messages that are related to incoming requests will go into the access log instead.

Access Log:

An access log will be printed to stdout. With systemd, use sudo journalctl -f -u dns-firewall to follow it. It looks like this:

192.168.4.58 -> [61785] r3.o.lencr.org 192.168.4.58 <- [61785] r3.o.lencr.org [149.126.86.73]:TCP:80 TTL:20 192.168.4.54 ~> [40720] this-domain-does-not.exist 192.168.4.54 <! [40720] Upstream returned error (OPCODE StandardQuery, RCODE NameError) 192.168.4.54 ~> [23619] mail.local 192.168.4.54 <~ [23619]

Syntax is as follows:

Questions?

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Maintenance

Update Dependencies

Use cargo-edit (cargo install cargo-edit) to update versions of all dependencies in Cargo.toml:

cargo upgrade

Release

  1. Update version in Cargo.toml and README.md
  2. Update version & release date in CHANGELOG.md
  3. Create packages (cargo deb)
  4. Commit changes
  5. Tag commit with version