Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. AdGuard Home
  3. adguard on upcoming Cloudron v6 DDoS reflection/amplification

adguard on upcoming Cloudron v6 DDoS reflection/amplification

Scheduled Pinned Locked Moved AdGuard Home
34 Posts 14 Posters 5.4k Views 16 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • humptydumptyH humptydumpty

    @brutalbirdie Wouldn't a raspberry pi with PiVPN and PiHole installed do the same thing for you?

    D Offline
    D Offline
    dylightful
    wrote on last edited by
    #11

    @humptydumpty No, Pihole is installed locally on the pi attached to the local VPN adapter (wg0 if you're using wireguard). PiVPN internally handles DNS queries and is not publicly resolvable from the public IP/

    Unless you install Pihole on your public facing adapter instead of your VPN adapter. Then you're in abit of trouble.....

    1 Reply Last reply
    1
    • D Offline
      D Offline
      dylightful
      wrote on last edited by
      #12

      I though ADGuard had an inbuilt feature to allow only whitelisted IP's through?

      girishG 1 Reply Last reply
      0
      • girishG girish

        I agree we should have a big warning with information highlighting security issues and how to go about handling them. I will update the https://docs.cloudron.io/apps/adguard-home/#security section in the docs.

        doodlemania2D Offline
        doodlemania2D Offline
        doodlemania2
        App Dev
        wrote on last edited by
        #13

        @girish I can help with this doc when you're read sir - I've got a PiHole on the public internet and simply block all requests at the router except requests from my IP address. If I'm not mistaken, we'll have some sort of control in 6 to whitelist/blacklist access by IP address to an app?

        1 Reply Last reply
        2
        • D dylightful

          I though ADGuard had an inbuilt feature to allow only whitelisted IP's through?

          girishG Offline
          girishG Offline
          girish
          Staff
          wrote on last edited by
          #14

          @dylightful said in adguard on upcoming Cloudron v6 DDoS reflection/amplification:

          I though ADGuard had an inbuilt feature to allow only whitelisted IP's through?

          Indeed, I will put this in the docs and the POSTINSTALL.

          robiR 1 Reply Last reply
          1
          • girishG girish

            @dylightful said in adguard on upcoming Cloudron v6 DDoS reflection/amplification:

            I though ADGuard had an inbuilt feature to allow only whitelisted IP's through?

            Indeed, I will put this in the docs and the POSTINSTALL.

            robiR Offline
            robiR Offline
            robi
            wrote on last edited by
            #15

            @girish couldn't it just be limited to the VPN interface which you get once connected? That way it remains private and there's no issue with dynamic IPs from home.

            Conscious tech

            girishG 1 Reply Last reply
            1
            • robiR robi

              @girish couldn't it just be limited to the VPN interface which you get once connected? That way it remains private and there's no issue with dynamic IPs from home.

              girishG Offline
              girishG Offline
              girish
              Staff
              wrote on last edited by
              #16

              @robi If I understand correctly, you are suggesting that we restrict the app to only private IPs by default. Maybe the IP blocks in https://en.wikipedia.org/wiki/Reserved_IP_addresses ? Thing is I would say the most common deployment of Cloudron is on a VPS and with that as the default a big chunk of people won't be able to use the app out of the box.

              I think a good solution is to add a app level firewall to Cloudron. I think it's something we can easily add for next release.

              robiR 1 Reply Last reply
              1
              • girishG girish

                @robi If I understand correctly, you are suggesting that we restrict the app to only private IPs by default. Maybe the IP blocks in https://en.wikipedia.org/wiki/Reserved_IP_addresses ? Thing is I would say the most common deployment of Cloudron is on a VPS and with that as the default a big chunk of people won't be able to use the app out of the box.

                I think a good solution is to add a app level firewall to Cloudron. I think it's something we can easily add for next release.

                robiR Offline
                robiR Offline
                robi
                wrote on last edited by
                #17

                @girish
                Not what I said, but in effect yes.

                What I am suggesting is to limit it to an actual interface not an IP. Anything flowing through a VPN interface for example which is a higher abstraction.

                Since private networks use RFC1918 addressing that's what ends up flowing through those interfaces. Hence the effect.

                Having a by default secure install is the only option IMO.
                Anyone installing it will need to configure it properly, be it for VPN access and network interfaces, or by going lower into the networking stack and using IP:port settings.

                It's also a question of liability for you, allowing deployment for DDoS or not.

                Subsequent modification is the users responsibility.

                Even if you had an app level firewall, how will it dynamically configure itself for a new client IP every hour? (there are ways but beyond the scope of this discussion)

                Conscious tech

                1 Reply Last reply
                1
                • girishG Offline
                  girishG Offline
                  girish
                  Staff
                  wrote on last edited by girish
                  #18

                  I am reading up on what the upstream project recommends because IMO it's actually fairly easy to do an IP based rate limit in the app itself. There are several issues around this:

                  • DNS amplification prevention
                  • Automatically block IP when it reaches a configurable requests limit
                  • Provide a smarter way to detect & block DNS amplification- Looks like they might add a setting for this
                  • Allow the use of IP blocklists to reject DNS requests from the listed IPs
                  D 1 Reply Last reply
                  1
                  • girishG girish

                    I am reading up on what the upstream project recommends because IMO it's actually fairly easy to do an IP based rate limit in the app itself. There are several issues around this:

                    • DNS amplification prevention
                    • Automatically block IP when it reaches a configurable requests limit
                    • Provide a smarter way to detect & block DNS amplification- Looks like they might add a setting for this
                    • Allow the use of IP blocklists to reject DNS requests from the listed IPs
                    D Offline
                    D Offline
                    dylightful
                    wrote on last edited by
                    #19

                    @girish
                    Playing around with ADGuard today. The inbuilt IP limiter works great and correctly blocks amp attacks.

                    Only issue i found was the ability to use DDNS hostnames as a whitelist for dynamic IP nets. CIDR works just aswell i guess...

                    robiR 1 Reply Last reply
                    1
                    • D dylightful

                      @girish
                      Playing around with ADGuard today. The inbuilt IP limiter works great and correctly blocks amp attacks.

                      Only issue i found was the ability to use DDNS hostnames as a whitelist for dynamic IP nets. CIDR works just aswell i guess...

                      robiR Offline
                      robiR Offline
                      robi
                      wrote on last edited by
                      #20

                      @dylightful said in adguard on upcoming Cloudron v6 DDoS reflection/amplification:

                      Playing around with ADGuard today. The inbuilt IP limiter works great and correctly blocks amp attacks.

                      Do you mean the requests per second limit?
                      Which setting blocks amp attacks?

                      Only issue i found was the ability to use DDNS hostnames as a whitelist for dynamic IP nets. CIDR works just aswell i guess...

                      I had an issue with this too, as I couldn't come up with a CIDR address that would exclude some of the abusing IPs without blocking my own (same network provider).

                      Conscious tech

                      doodlemania2D 1 Reply Last reply
                      0
                      • robiR robi

                        @dylightful said in adguard on upcoming Cloudron v6 DDoS reflection/amplification:

                        Playing around with ADGuard today. The inbuilt IP limiter works great and correctly blocks amp attacks.

                        Do you mean the requests per second limit?
                        Which setting blocks amp attacks?

                        Only issue i found was the ability to use DDNS hostnames as a whitelist for dynamic IP nets. CIDR works just aswell i guess...

                        I had an issue with this too, as I couldn't come up with a CIDR address that would exclude some of the abusing IPs without blocking my own (same network provider).

                        doodlemania2D Offline
                        doodlemania2D Offline
                        doodlemania2
                        App Dev
                        wrote on last edited by
                        #21

                        @robi you might have to put it behind a firewall then and only allow internal - you could then have your servers vpn in to your box to query it (I do that for one of my friends).
                        There's another thread about making apps accessible only from OpenVPN - that would be a neat use case.

                        D 1 Reply Last reply
                        1
                        • doodlemania2D doodlemania2

                          @robi you might have to put it behind a firewall then and only allow internal - you could then have your servers vpn in to your box to query it (I do that for one of my friends).
                          There's another thread about making apps accessible only from OpenVPN - that would be a neat use case.

                          D Offline
                          D Offline
                          drpaneas
                          wrote on last edited by
                          #22

                          Would that be OK to configure the firewall on the machine where cloudron is running? In the documentation says to not touch iptables/ufw and similar stuff, so I guess it's not a good idea. Yet, since this is a very serious matter of having AdGuard running wild out there, I would propose to have the app configure the firewall itself -- instead of relying to 3rd party firewalls -- and make this configurable (enable/disable).

                          Upon installation, it could ask you what you would like to do:

                          1. Block port 53 - allow internal traffic only for AdGuard (recommended)
                          2. Do not configure firewall.

                          WDYT?

                          nebulonN 1 Reply Last reply
                          0
                          • D drpaneas

                            Would that be OK to configure the firewall on the machine where cloudron is running? In the documentation says to not touch iptables/ufw and similar stuff, so I guess it's not a good idea. Yet, since this is a very serious matter of having AdGuard running wild out there, I would propose to have the app configure the firewall itself -- instead of relying to 3rd party firewalls -- and make this configurable (enable/disable).

                            Upon installation, it could ask you what you would like to do:

                            1. Block port 53 - allow internal traffic only for AdGuard (recommended)
                            2. Do not configure firewall.

                            WDYT?

                            nebulonN Offline
                            nebulonN Offline
                            nebulon
                            Staff
                            wrote on last edited by
                            #23

                            @drpaneas did you see the docs at https://docs.cloudron.io/apps/adguard-home/#securing-installation already?

                            D 1 Reply Last reply
                            0
                            • nebulonN nebulon

                              @drpaneas did you see the docs at https://docs.cloudron.io/apps/adguard-home/#securing-installation already?

                              D Offline
                              D Offline
                              drpaneas
                              wrote on last edited by
                              #24

                              @nebulon yes of course I've read those. My proposal is to have cloudron blocking the port 53 during the installation automatically -- instead of asking the user to do it manually in the docs. In that way we make AdGuard installation more secure by default, instead of relying to the end user to take care of it.

                              1 Reply Last reply
                              0
                              • iamthefijI Offline
                                iamthefijI Offline
                                iamthefij
                                App Dev
                                wrote on last edited by
                                #25

                                This was something that came up early on when we were discussing AdGuardHome and PiHole. Most folks recommend only exposing something like this via a VPN without binding to 53 on your public network interface. A VPN still allows people to use it from anywhere but adds a layer of authentication.

                                The way things are now, it's very likely that folks misconfigure their DNS server. Part of Cloudron's draw is that users don't have to think so hard about "doing the right thing". The best way to do that would be to not bind only to a VPN interface and support the VPN setting the DNS server as the default.

                                A setting to "do the wrong thing" could be there for folks that really know what they are doing, but maybe a little more difficult to get to so someone who enables it will also know how to manage their firewalls. Either through their VPS provider or on the machine.

                                Personally, I host mine at home and access over a VPN.

                                1 Reply Last reply
                                0
                                • girishG Offline
                                  girishG Offline
                                  girish
                                  Staff
                                  wrote on last edited by
                                  #26

                                  One idea might be to fix the package to block all clients by default. I think we just need to put some wildcard to deny all the IP addresses. Would that make things better? This way user has a UI to manually white list their client IP addresses.

                                  robiR 1 Reply Last reply
                                  0
                                  • girishG girish

                                    One idea might be to fix the package to block all clients by default. I think we just need to put some wildcard to deny all the IP addresses. Would that make things better? This way user has a UI to manually white list their client IP addresses.

                                    robiR Offline
                                    robiR Offline
                                    robi
                                    wrote on last edited by
                                    #27

                                    @girish that doesn't work for most clients as they have dynamic IPs.

                                    Unless there's an auth of some sort, port knocking or VPN access to it.

                                    Let's go Wireguard. 🏁

                                    Conscious tech

                                    girishG 1 Reply Last reply
                                    2
                                    • robiR robi

                                      @girish that doesn't work for most clients as they have dynamic IPs.

                                      Unless there's an auth of some sort, port knocking or VPN access to it.

                                      Let's go Wireguard. 🏁

                                      girishG Offline
                                      girishG Offline
                                      girish
                                      Staff
                                      wrote on last edited by
                                      #28

                                      @robi sure. The goal was only to make the user a bit more aware of the security settings. It doesn't solve anything else, as you say.

                                      mehdiM 1 Reply Last reply
                                      0
                                      • girishG girish

                                        @robi sure. The goal was only to make the user a bit more aware of the security settings. It doesn't solve anything else, as you say.

                                        mehdiM Offline
                                        mehdiM Offline
                                        mehdi
                                        App Dev
                                        wrote on last edited by
                                        #29

                                        @girish I think a reasonable default would be to blacklist all non-local IPs (RFC 1918) by default. That way, connecting from VPNs should work, connecting from LAN should work, but connecting from public internet would require manual white-listing.

                                        iamthefijI 1 Reply Last reply
                                        4
                                        • mehdiM mehdi

                                          @girish I think a reasonable default would be to blacklist all non-local IPs (RFC 1918) by default. That way, connecting from VPNs should work, connecting from LAN should work, but connecting from public internet would require manual white-listing.

                                          iamthefijI Offline
                                          iamthefijI Offline
                                          iamthefij
                                          App Dev
                                          wrote on last edited by
                                          #30

                                          @mehdi I agree with this. However, it would also be important to have the ability to give the container a static internal IP and allow the configuration of the VPN app to set that container as the default DNS server.

                                          L 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • Bookmarks
                                          • Search