[Server-devel] IP Address Pools for XOs, known clients, and unknown clients on XS 0.6

John Watlington wad at laptop.org
Wed Jan 12 21:50:10 EST 2011


The best iptables hack like this I've seen routed "extraneous"
connections through a transparent web proxy which flipped
all images (swapped left and right).

Cheers,
wad

On Jan 12, 2011, at 11:46 AM, Jerry Vonau wrote:

> On Wed, 2011-01-12 at 10:03 -0600, Anna wrote:
>> I like to leave the AP open on my test XS 0.6 at home, but ran into an
>> issue with that yesterday.  I noticed the lights on my router blinking
>> like crazy, so I did a live tail on the squid access log to see what
>> was going on.
>> 
>> tail -f /var/log/squid/access.log
>> 
> <snip>
>> And because I'm ticked off, and inspired by
>> http://www.ex-parrot.com/pete/upside-down-ternet.html, it's time for
>> some fun with iptables.  In /etc/sysconfig/olpc-scripts/iptables-xs.in
>> I add a couple of lines like so:
>> 
> So I'm not the only one who likes fun with iptables, wish I could see
> the expression on their face when I tried something like that. 
> 
>> *nat
>> :PREROUTING ACCEPT [0:0]
>> :POSTROUTING ACCEPT [0:0]
>> :OUTPUT ACCEPT [0:0]
>> -A PREROUTING -s 172.18.124.0/24 -p tcp --dport 80 -j DNAT --to
>> 205.196.209.62
>> @@SQUID@@
>> -A POSTROUTING -o @@WAN@@ -j MASQUERADE
>> COMMIT
>> *filter
>> :INPUT ACCEPT [0:0]
>> :FORWARD ACCEPT [0:0]
>> :OUTPUT ACCEPT [0:0]
>> -A FORWARD -s 172.18.124.0/24 -p tcp --dport 443 -j DROP
> 
> This should take care of the rest of the outgoing connections..
> change to: 
> -A FORWARD -s 172.18.124.0/24 -p tcp ! --dport 80 -j DROP
> 
> add:
> -A FORWARD -s 172.18.124.0/24 -j DROP
> 
>> COMMIT
>> 
>> Restart dhcpd and iptables:
>> service dhcpd restart
>> service iptables restart
>> 
>> Now all unknown clients will have http traffic redirected to
>> http://kittenwar.com and their https traffic is dropped.
>> 
>> Obviously this isn't a deterrent to someone who can use an ssh proxy
>> for browsing, and it doesn't block traffic on other ports or
>> protocols, but most of my neighbors aren't of the networking savvy
>> sort (particularly the grotesque rednecks) and will likely conclude
>> "this darn internet ain't workin' no more."  If I lived near MIT, this
>> would not be an acceptable solution.  But I'm not terribly concerned
>> many folks around here know much about packet sniffing or MAC
>> spoofing.
>> 
> 
> His machine might be owned/spam-bot... Try the trivial change above.
> 
>> When guests come over and want to look at something other than
>> pictures of kittens, all I have to do is add the MAC to the list of
>> known clients, restart dhcpd, and tell them to renew their IP.
>> 
>> At the very least, now I know how to keep XOs and non-XO clients on
>> different IP ranges.
>> 
>> Anna Schoolfield
>> Birmingham
> 
> Jerry
> 
> _______________________________________________
> Server-devel mailing list
> Server-devel at lists.laptop.org
> http://lists.laptop.org/listinfo/server-devel



More information about the Server-devel mailing list