[FEATURE REQUEST] extension to hosts & dynamic DNS capability

Hi All,

A feature request if I may please? I did search but threads didn’t seem to match what I had in mind.

Presently in Firewall > Firewall Groups > hosts it is possible to
identify a host by its IP or MAC but for source routing it would
also be nice to route / filter on source domain name - particularly if
that source domain matches a specific DDNS entry

The sort of thing I seek to enable is

SOURCE: Somehost.no.ip.com
SOURCE PROTOCOL: TCP
FORWARD IP: 192.168.x.x
FORWARD PORT: XXYY

I envision this implemented as a 2 part GUI modification:

  1. To Add “Domain” as a host type in
    Firewall > Firewall Groups > hosts

  2. As an augmentation of the Dynamic DNS service page
    to add lists of hosts that the user wishes the firewall to track

    e.g. to have a new section of the DDNS page that displays:

       CLIENT HOST               FREQUENCY          COMMENT
    

    someserver.servehttp.com 15m freds server
    otherserver.myddns.org 15m teds server

To avoid caching the entire global DNS (!) I propose that the system only tracks domain names that are referenced in either page. reducing the total
network and server overhead

The goal here is to only allow hosts from specific domain names to get inbound port responses from RED such that

someserver.servehttp.com can be port forwarded or blocked
portscanner.thehack.net doesn’t even get a port response

Feasible ? I would love to see this added in a future release - it would be a gamechanger for me and several friends who all have dynamic IPs.

heres hoping !

regards

BB

I guess firewall-rules work with IP an MAC and not with DNS, which is an upper layer, so this could be hard to do?!

Greetz

1 Like

If you give an FQDN to the firewall (iptables), it will resolve it before applying it with an IP address. It is feasible to set up a monitor to reapply the rule if the IP address changes. This approach suits individual rules better than firewall groups as you need to test each FQDN individually. However, how do you cope with FQDNs that return multiple IP addresses?

1 Like

Or none.


This would be a major security concern because we DNS in general cannot be trusted. It would be too easy to forge a malicious response and therefore open firewall access to arbitrary IP addresses.

1 Like