A few basic questions about features from a NOOB -
-
Ok to answer your question about killing states. See my below example.
I listed the states for my workstation at home (I am vpn'd in currentl).. so see lots of states, I xxx'd out my public IP. I then killed the states for that 192.168.1.100 IP and it killed 18 states.. See when look at states for that IP none listed. Red arrow, then look again and 1 state, then look again a few seconds later I see more states.
So the command pfctl -k IPaddress could be setup to run when after your schedule kicks in to kill kids sessions. Or you could issue a pfctl -f state
Which would kill all states - if possible target just his IP.. so doesn't break your connections.
-
To quote Daffy Duck - "Juh-rool, Juh-rool!" ;D lol As in Drool Drool.
My mouth is watering just thinking about that running every single night, shutting things down and letting me relax!!!!!!!!!!
I think that works perfectly with my plan which was to basically lock things and allowing only specific devices by MAC address in general, then setting the time limit to his IP or MAC. Then that command could be run and it would leave everything else alone. Right now I have my DD-WRT config'd to shut off his access at 11pm and reboot at 11:01PM. But, as I have said, it is a 50/50 thing. Sometimes it works and sometimes he still can connect. Can't wait to kick his ass out in 3 more years…lol
-
How tech savvy is your kid? If it were me, I'd be running it against his MAC. At the least, most kids nowadays know how to change an IP address :P That can be spoofed as well, which returns to my original question, how tech savvy?
-
Ok to answer your question about killing states. See my below example.
I listed the states for my workstation at home (I am vpn'd in currentl).. so see lots of states, I xxx'd out my public IP. I then killed the states for that 192.168.1.100 IP and it killed 18 states.. See when look at states for that IP none listed. Red arrow, then look again and 1 state, then look again a few seconds later I see more states.
I added to the Cron tab two jobs for two different IPs:
Should work every 08:05 pm, huh? :-) I will monitor this…
-
Ok to answer your question about killing states. See my below example.
I listed the states for my workstation at home (I am vpn'd in currentl).. so see lots of states, I xxx'd out my public IP. I then killed the states for that 192.168.1.100 IP and it killed 18 states.. See when look at states for that IP none listed. Red arrow, then look again and 1 state, then look again a few seconds later I see more states.
So the command pfctl -k IPaddress could be setup to run when after your schedule kicks in to kill kids sessions. Or you could issue a pfctl -f state
Which would kill all states - if possible target just his IP.. so doesn't break your connections.
Useful, John, thank you for this suggestion ;D
But, as always, I don't understand it: you first kill the states, then they are re-restablished by the system, then you have to kill them again via a cronjob? But won't they be established again then?
Or more fundamentally: shouldnt the firewall schedule take care of this automatically? As in: this is not a bug, it is a feature'? ( ;D )
-
@Hollander:
Useful, John, thank you for this suggestion ;D
But, as always, I don't understand it: you first kill the states, then they are re-restablished by the system, then you have to kill them again via a cronjob? But won't they be established again then?
Or more fundamentally: shouldnt the firewall schedule take care of this automatically? As in: this is not a bug, it is a feature'? ( ;D )
If you kill the states after a scheduled "end of internet access" the states can't be re-established…
-
yeah mine was just an example of the command, I don't have any firewall rules blocking access on a schedule. Just showing that I killed them, and they show all gone. Then sure they will try and reconnect. But in the posters case his new scheduled rule will prevent them from being created.
-
How tech savvy is your kid? If it were me, I'd be running it against his MAC. At the least, most kids nowadays know how to change an IP address :P That can be spoofed as well, which returns to my original question, how tech savvy?
My thought as well. By extension, the MAC address can often be changed too. You may have better success in a small network by blocking all network traffic EXCEPT the devices that you specifically want to allow during your restricted hours.
-
Thank you John and Chemlud ;D
It would have been perfect if, on using the schedules, functionality had been built in to kill states for that rule automatically, but this workaround will work too.
How tech savvy is your kid? If it were me, I'd be running it against his MAC. At the least, most kids nowadays know how to change an IP address :P That can be spoofed as well, which returns to my original question, how tech savvy?
My thought as well. By extension, the MAC address can often be changed too. You may have better success in a small network by blocking all network traffic EXCEPT the devices that you specifically want to allow during your restricted hours.
Is it that easy to spoof your LAN-ip adress, from, say, Win7? For even kids?
:o
A partial workaround might be static IP with deny unknown clients' on the DHCP-server(?) Of course, that also hardly is 100% fool proof, as kid might simply scan the LAN and take ip of parent (provided parent isn't online).
-
@Hollander:
Is it that easy to spoof your LAN-ip adress, from, say, Win7? For even kids?
:o
All it takes is access to the device manager where the settings for the network adapter device offers you a field where you can enter the MAC address you want to use instead of the pre-programmed one.
-
@Hollander:
For even kids?
Especially for kids! They don't know it might be or should be difficult so they poke around until intil it's done. They've never known a computer that wasn't on the internet or a firewall that couldn't be eventually broken. Also they probably have a lot of friends who are also learning about this stuff and there's literally thousands of pages on the web explaining how to do it. Safer to assume kids know more than you! ;)
Steve
-
Especially for kids! …
DHCP, with static mapping based on MAC, with "deny unknown clients", with static ARP. What would be the work-around to get internet access? :-\
EDIT: Cron job for killing states works apparently fine! However, it looks as if states for one of the users were already killed when the firewall went to "BLOCK"… strange...
-
I'm not saying that it's impossible to lock down a computer to prevent 'unauthorised' internet access. It's easy enough to put a security policy on a Windows box to prevent users changing the MAC but how many home computers have that?
I'm just saying that most computer literate school age children have probably come up against some sort of web/connection filter at some point and those who are minded to do so have probably looked into ways to get around it. Someone they are friends with will have suggested finding the MAC of a local authorised machine from the ARP table and changing your MAC to it. That friend will then gain popularity for doing so. Everybody wins. Except the network admin/parents!It would be a mistake to assume that just because users are children they will not be familiar with basic networking. It's in their interests to keep you thinking they aren't. ;)
Steve
-
@chemlud:
DHCP, with static mapping based on MAC, with "deny unknown clients", with static ARP. What would be the work-around to get internet access? :-\
Exactly what my thinking was and then running the CRON jobs. I am even thinking of VLAN-ing him to keep him completely separate and isolated. I already have him setup on a guest wifi network that is isolated from us. So, now I guess I have to buy a smart or managed switch. The $$$$ keeps flying away! lol
Kind of how it is setup on my DD-WRT router. Again, DD-WRT itself is 50/50 reliable and then there are fixes and new versions and then what was working doesn't work any more. lol I have a love/hate relationship with it. lol
I'm not saying that it's impossible to lock down a computer to prevent 'unauthorised' internet access. It's easy enough to put a security policy on a Windows box to prevent users changing the MAC but how many home computers have that?
I'm just saying that most computer literate school age children have probably come up against some sort of web/connection filter at some point and those who are minded to do so have probably looked into ways to get around it. Someone they are friends with will have suggested finding the MAC of a local authorised machine from the ARP table and changing your MAC to it. That friend will then gain popularity for doing so. Everybody wins. Except the network admin/parents!It would be a mistake to assume that just because users are children they will not be familiar with basic networking. It's in their interests to keep you thinking they aren't. ;)
Steve
Uhhhhh, YEP! lol Been through this. Trust me I am so freaking glad he is 19 now. From the time he was 14 it was a total battle royal. The parental software out there is a joke - Net Nanny, etc., I tried them all! The kids go to forums or chat and learn from each other how to hack it and bypass it. And the sw companies move like molasses when it comes to fixing their bugs. I spent 3 solid months playing email ping pong with Net Nanny actually helping them fix their own darn bugs and I just had had enough. By the time he was 17, I had to go to the extreme level. I literally had the machine locked down and frozen with Deep Freeze by Faronics with only his game folders and a homework folder on a separate isolated HD being the only things on his PC that he could alter. And it worked too! He was so pissed you could see the hate! lol I even had the BIOS locked with a password too.
So now he is a 19 yr old college freshman about to become a sophomore and a full summer ahead of him and I am not going to deal with him PCing into the wee small hours. I will pull the router plug out if I have to and that is in a steel locked cabinet that he definitely can't get to. lol Hence, why I drool over something rock solid and automated to save me the stress.
-
Agreed, a separate interface is the way go for real security.
Then put a super cheap switch between the router and the hostile machine. Power that switch from via timer. Done! ;)Steve
-
@chemlud:
@Hollander:
Useful, John, thank you for this suggestion ;D
But, as always, I don't understand it: you first kill the states, then they are re-restablished by the system, then you have to kill them again via a cronjob? But won't they be established again then?
Or more fundamentally: shouldnt the firewall schedule take care of this automatically? As in: this is not a bug, it is a feature'? ( ;D )
If you kill the states after a scheduled "end of internet access" the states can't be re-established…
Lately I checked for states after "end of internet" and after the subsequent Cron job to kill all states and found for one of the IPs active states 1.5 hours after the end of internet… How can that happen? :o
I would like to monitor the states via email report, but unfortunately there is no log for the states and I don't know the command to be executed to post the current states of the box.... Can anybody help me out, please? :)
-
I showed you the command to list states for an IP, or all of them pfctl -ss
You may need to kill both sides of the state.. When you kill the states, what do you show with the -ss for your host your worried about? You may need to use the -k twice, etc.
I would suggest you read the man on pfctl, I would of assumed that would of been step one after I gave the command example ;)
http://www.openbsd.org/cgi-bin/man.cgi?query=pfctl&sektion=8
NAME
pfctl - control the packet filter (PF) deviceSYNOPSIS
pfctl [-deghnPqrvz] [-a anchor] [-D macro=value] [-F modifier] [-f file]
[-i interface] [-K host | network] [-k host | network | label | id]
[-L statefile] [-o level] [-p device] [-S statefile]
[-s modifier [-R id]] [-t table -T command [address …]]
[-x level] -
Yess, I must confess I started with Linux/BSD last fall, so I'm far from pro… Should invest a little more time, but currently it is a little bit too much around here. I'll do my very best :D
-
Huh? From your title of the thread we understand your not a pro ;)
Given a command, with examples that showed listing of states doesn't seem too far reaching to think the person with the interest the function would breeze over the doc for the command given..
I would think the same thing be it a linux/bsd command or a windows cmd.. If I say told you to release your dhcp lease you could use ipconfig /releaseall
Wouldn't you look up the command ipconfig? Not like gave you example pfctl and then expected you to recompile your kernel ;)
-
cough I didn't start this thread, I actually hijacked it. cough, cough ::)
… but the pfctl does nicely what it is supposed to do with the mail report. Unfortunately the mail report allows eMails only at full hours (no minutes to be added to the job...). (edit: me idi**, found the jobs in Cron to edit the time of execution ;)). However, very nice indeed!
And I compiled my kernel with the router at the same time :P