Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. AdGuard Home
  3. adguard on upcoming Cloudron v6 DDoS reflection/amplification

adguard on upcoming Cloudron v6 DDoS reflection/amplification

Scheduled Pinned Locked Moved AdGuard Home
34 Posts 14 Posters 5.4k Views 16 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • doodlemania2D doodlemania2

    @robi you might have to put it behind a firewall then and only allow internal - you could then have your servers vpn in to your box to query it (I do that for one of my friends).
    There's another thread about making apps accessible only from OpenVPN - that would be a neat use case.

    D Offline
    D Offline
    drpaneas
    wrote on last edited by
    #22

    Would that be OK to configure the firewall on the machine where cloudron is running? In the documentation says to not touch iptables/ufw and similar stuff, so I guess it's not a good idea. Yet, since this is a very serious matter of having AdGuard running wild out there, I would propose to have the app configure the firewall itself -- instead of relying to 3rd party firewalls -- and make this configurable (enable/disable).

    Upon installation, it could ask you what you would like to do:

    1. Block port 53 - allow internal traffic only for AdGuard (recommended)
    2. Do not configure firewall.

    WDYT?

    nebulonN 1 Reply Last reply
    0
    • D drpaneas

      Would that be OK to configure the firewall on the machine where cloudron is running? In the documentation says to not touch iptables/ufw and similar stuff, so I guess it's not a good idea. Yet, since this is a very serious matter of having AdGuard running wild out there, I would propose to have the app configure the firewall itself -- instead of relying to 3rd party firewalls -- and make this configurable (enable/disable).

      Upon installation, it could ask you what you would like to do:

      1. Block port 53 - allow internal traffic only for AdGuard (recommended)
      2. Do not configure firewall.

      WDYT?

      nebulonN Offline
      nebulonN Offline
      nebulon
      Staff
      wrote on last edited by
      #23

      @drpaneas did you see the docs at https://docs.cloudron.io/apps/adguard-home/#securing-installation already?

      D 1 Reply Last reply
      0
      • nebulonN nebulon

        @drpaneas did you see the docs at https://docs.cloudron.io/apps/adguard-home/#securing-installation already?

        D Offline
        D Offline
        drpaneas
        wrote on last edited by
        #24

        @nebulon yes of course I've read those. My proposal is to have cloudron blocking the port 53 during the installation automatically -- instead of asking the user to do it manually in the docs. In that way we make AdGuard installation more secure by default, instead of relying to the end user to take care of it.

        1 Reply Last reply
        0
        • iamthefijI Offline
          iamthefijI Offline
          iamthefij
          App Dev
          wrote on last edited by
          #25

          This was something that came up early on when we were discussing AdGuardHome and PiHole. Most folks recommend only exposing something like this via a VPN without binding to 53 on your public network interface. A VPN still allows people to use it from anywhere but adds a layer of authentication.

          The way things are now, it's very likely that folks misconfigure their DNS server. Part of Cloudron's draw is that users don't have to think so hard about "doing the right thing". The best way to do that would be to not bind only to a VPN interface and support the VPN setting the DNS server as the default.

          A setting to "do the wrong thing" could be there for folks that really know what they are doing, but maybe a little more difficult to get to so someone who enables it will also know how to manage their firewalls. Either through their VPS provider or on the machine.

          Personally, I host mine at home and access over a VPN.

          1 Reply Last reply
          0
          • girishG Offline
            girishG Offline
            girish
            Staff
            wrote on last edited by
            #26

            One idea might be to fix the package to block all clients by default. I think we just need to put some wildcard to deny all the IP addresses. Would that make things better? This way user has a UI to manually white list their client IP addresses.

            robiR 1 Reply Last reply
            0
            • girishG girish

              One idea might be to fix the package to block all clients by default. I think we just need to put some wildcard to deny all the IP addresses. Would that make things better? This way user has a UI to manually white list their client IP addresses.

              robiR Offline
              robiR Offline
              robi
              wrote on last edited by
              #27

              @girish that doesn't work for most clients as they have dynamic IPs.

              Unless there's an auth of some sort, port knocking or VPN access to it.

              Let's go Wireguard. 🏁

              Conscious tech

              girishG 1 Reply Last reply
              2
              • robiR robi

                @girish that doesn't work for most clients as they have dynamic IPs.

                Unless there's an auth of some sort, port knocking or VPN access to it.

                Let's go Wireguard. 🏁

                girishG Offline
                girishG Offline
                girish
                Staff
                wrote on last edited by
                #28

                @robi sure. The goal was only to make the user a bit more aware of the security settings. It doesn't solve anything else, as you say.

                mehdiM 1 Reply Last reply
                0
                • girishG girish

                  @robi sure. The goal was only to make the user a bit more aware of the security settings. It doesn't solve anything else, as you say.

                  mehdiM Offline
                  mehdiM Offline
                  mehdi
                  App Dev
                  wrote on last edited by
                  #29

                  @girish I think a reasonable default would be to blacklist all non-local IPs (RFC 1918) by default. That way, connecting from VPNs should work, connecting from LAN should work, but connecting from public internet would require manual white-listing.

                  iamthefijI 1 Reply Last reply
                  4
                  • mehdiM mehdi

                    @girish I think a reasonable default would be to blacklist all non-local IPs (RFC 1918) by default. That way, connecting from VPNs should work, connecting from LAN should work, but connecting from public internet would require manual white-listing.

                    iamthefijI Offline
                    iamthefijI Offline
                    iamthefij
                    App Dev
                    wrote on last edited by
                    #30

                    @mehdi I agree with this. However, it would also be important to have the ability to give the container a static internal IP and allow the configuration of the VPN app to set that container as the default DNS server.

                    L 1 Reply Last reply
                    0
                    • iamthefijI iamthefij

                      @mehdi I agree with this. However, it would also be important to have the ability to give the container a static internal IP and allow the configuration of the VPN app to set that container as the default DNS server.

                      L Offline
                      L Offline
                      lukas
                      wrote on last edited by
                      #31

                      so no way to let connect only from selected clients, like from specific indentifier? Would like to run AdGuard Home for some devices, but I don't have a static IP

                      KubernetesK 1 Reply Last reply
                      0
                      • L lukas

                        so no way to let connect only from selected clients, like from specific indentifier? Would like to run AdGuard Home for some devices, but I don't have a static IP

                        KubernetesK Offline
                        KubernetesK Offline
                        Kubernetes
                        App Dev
                        wrote on last edited by
                        #32

                        @lukas You can specify client IDs in Case you plan to use DoT or DoH method for DNS resolving. This can be configured for each browser and in iOS Devices as a Profile (export from Adguard Home). This may help?

                        L 1 Reply Last reply
                        0
                        • KubernetesK Kubernetes

                          @lukas You can specify client IDs in Case you plan to use DoT or DoH method for DNS resolving. This can be configured for each browser and in iOS Devices as a Profile (export from Adguard Home). This may help?

                          L Offline
                          L Offline
                          lukas
                          wrote on last edited by
                          #33

                          @Kubernetes sounds good, is there any guide how to do this correctly?

                          KubernetesK 1 Reply Last reply
                          0
                          • L lukas

                            @Kubernetes sounds good, is there any guide how to do this correctly?

                            KubernetesK Offline
                            KubernetesK Offline
                            Kubernetes
                            App Dev
                            wrote on last edited by Kubernetes
                            #34

                            @lukas you may have a look at the guide from Cloudron here: https://docs.cloudron.io/apps/adguard-home/#security

                            However the setup is pretty simple, go to the DNS Settings in Adguard Home and give some names for your client IDs IMG_0209.jpeg

                            When you entered ClientIDs the DNS will not be available anymore for anyone who is NOT in your Client IDs list. If you want to update your non static IP from your internet service provider, you could do that and put in your public IP. In that case your local clients can use the DNS even without having a named Client ID

                            Then you can use the Tab "Setup Guide" in Adguard Home to get guidance how to get your devices configured.

                            If you want to configure Chrome, Brave or Firefox for DoH you can then use the URL to your Adguard Home DNS Name with appending your ClientId like this for example:
                            https://DNS-NAME-TO-YOUR-ADGUARDHOME/dns-query/CLIENTID

                            Please be aware that you should understand what you do and in case of concerns just don't do it. You will be responsible yourself for anything you do.

                            1 Reply Last reply
                            2
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • Bookmarks
                            • Search