Conversation

There's some legitimate for host-based firewalls such as avoiding accidental exposed services, determining which applications/services can use the network and access control for services only able to listen on loopback instead of a Unix domain socket.
A funny part about people using firewalls is that they generally make themselves much more vulnerable to DoS attacks due to overhead and limits on tracked connections. On Linux, having a single service listening externally with conntrack enabled breaks your SYN flood protection.
2
We consider it unacceptable which is why we disable listening on loopback for as many services as possible (MariaDB, PostgreSQL) and implement uid-based access control for stuff not supporting that via nftables as a workaround for software deficiencies.
1
6
Show replies