Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Allow Subdomains of a domain

    Firewalling
    5
    12
    1.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      silmaril
      last edited by

      I have a guest network, that only allows a handful of TCP ports for web and E-Mail (wich also works for most messengers).
      Now I would like add the possibility to use Signal Messenger for voice calls.

      As described on their website, I should allow all UDP traffic to *.whispersystems.org and *.signal.org.

      As I understand, pfsense firewall rules can only contain IPs and FQDNs via aliases.

      How is it possible to tackle this kind of rule that needs to allow traffic to all subdomains of a certain domain?

      KOMK 1 Reply Last reply Reply Quote 0
      • KOMK
        KOM @silmaril
        last edited by

        @silmaril That's going to be difficult. pfSense filters based on IP address, port & protocol as you've found. You're left with compiling a list of all IP addresses used by all subdomains of whispersystems.org and signal.org. Plus, with load-balancing each of those domains may resolve to many IP addresses. Not an easy task. Is this a home guest network? If so, why are you locking it down so tightly?

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @KOM
          last edited by johnpoz

          @kom said in Allow Subdomains of a domain:

          why are you locking it down so tightly?

          I would have the same question to be honest. Guest network is almost always isolated from your other network(s).. So who really cares where they go, you could just use same filtering you do for your own network to help prevent malware, bad stuff sort of thing.

          One thing that comes to mind is maybe to keep these guests from sucking all your bandwidth. That might be better accomplish by just rate limiting the amount of bandwidth the guests can use from your total available bandwidth.

          From what I read on the signal site, I think the wildcards are more suited if using a proxy. They state since the IPs change that firewall rules could be difficult, but suggest to fqdn that could be used.

          The underlying IPs are constantly changing, so it'd be hard to define accurate firewall rules.  
          
          If the wildcard FQDN config is not working properly and you notice issues with calling, allow turn2.voip.signal.org and sfu.voip.signal.org. These are subject to change at anytime.
          

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • S
            silmaril
            last edited by

            Maybe you are right and filtering too much in the guest network is not really the way to think about this.
            Separating it from the main network is the really important thing here.

            Thank you very much for not answering my question, but instead turning my thinking in a better direction ;-)

            JKnottJ 1 Reply Last reply Reply Quote 0
            • JKnottJ
              JKnott @silmaril
              last edited by

              @silmaril

              Here are my guest network rules:

              5e1fdfc1-7a8d-423a-be77-31bdce3237a2-image.png

              They only allow access to the Internet and pinging the guest LAN interface.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              KOMK 1 Reply Last reply Reply Quote 0
              • KOMK
                KOM @JKnott
                last edited by

                @jknott What is the purpose of your fourth rule?

                JKnottJ 1 Reply Last reply Reply Quote 0
                • JKnottJ
                  JKnott @KOM
                  last edited by

                  @kom

                  Guests are not allowed to do anything to the WAN address. It is normally possible to reach the WAN address from the LAN side. That rule blocks that.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  KOMK 1 Reply Last reply Reply Quote 0
                  • KOMK
                    KOM @JKnott
                    last edited by

                    @jknott Haha yes I figured what the rule does but I wanted to know why. What could they do that you would need to block it? Genuinely curious here as I've never seen such a rule used before.

                    noplanN JKnottJ 2 Replies Last reply Reply Quote 0
                    • noplanN
                      noplan @KOM
                      last edited by

                      @kom

                      Ad rule... Same here...

                      But why allow guest to LAN?

                      1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @KOM
                        last edited by

                        @kom

                        Just making sure they can't reach it at all. I am not aware of all possible attacks so it best to block everything that isn't needed.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @JKnott
                          last edited by

                          Wouldn't it be easier and easier to see if you just used the "this firewall" alias?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          JKnottJ 1 Reply Last reply Reply Quote 1
                          • JKnottJ
                            JKnott @johnpoz
                            last edited by

                            @johnpoz

                            I wasn't aware of that alias.

                            PfSense running on Qotom mini PC
                            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                            UniFi AC-Lite access point

                            I haven't lost my mind. It's around here...somewhere...

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.