I’ve been running my server without a firewall for quite some time now, I have a piped instance and snikket running on it. I’ve been meaning to get UFW on it but I’ve been too lazy to do so. Is it a necessary thing that I need to have or it’s a huge security vulnerability? I can only SSH my server from only my local network and must use a VPN if I wanna SSH in outside so I’d say my server’s pretty secure but not the furthest I could take it. Opinions please?

  • non_burglar@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    4
    ·
    1 month ago

    Op means, as they said, a firewall on the server itself.

    NAT is, effectively, a firewall.

    No it isn’t. Stop giving advice on edge security.

    • hedgehog@ttrpg.network
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 month ago

      Are you saying that NAT isn’t effectively a firewall or that a NAT firewall isn’t effectively a firewall?

      • non_burglar@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        2
        ·
        1 month ago

        NAT simply maps IPS across subnet boundaries in such a way that upstream routing tables don’t need updating.

        If you use destination NAT forward rules to facilitate specific destination port access, you are using a firewall.

    • Monkey With A Shell@lemmy.socdojo.com
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      3
      ·
      1 month ago

      Assuming it’s not a 1-1 NAT it does make for a functional unidirectional firewall. Now, a pure router in the sense of simply offering a gateway to another subnet doesn’t do much, but the typical home router as most people think of it is creating a snat for multiple devices to reach out to the internet and without port forwarding effectively blocks off traffic from the outside in.

      • non_burglar@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 month ago

        Assuming it’s not a 1-1 NAT it does make for a functional unidirectional firewall.

        That’s like saying a router and firewall are the same thing. NAT appears to be a “firewall” because it’s usually deployed with one. NAT itself has no filtering functions the way you’re describing.

        Now, a pure router in the sense of simply offering a gateway to another subnet

        A “pure” router, as you put it, understands upstream subnets and routing tables. NAT does not, and is usually overlayed on top of an existing routing function.

        You can set up NAT between two subnets as an experiment with no iptables and it will do its job.

        • Monkey With A Shell@lemmy.socdojo.com
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          4
          ·
          1 month ago

          NAT in the sense used when people talk about at home is a source nat, or as we like to call it in the office space a hide address, everyone going to the adjacent net appears to be the same source IP and the system maintains a table of connections to correlate return traffic to.

          The other direction though, if you where on that upstream net and tried to target traffic towards the SNAT address above the router has no idea where to send it to unless there’s a map to designate where incoming connections need to be sent on the other side of the NAT so it ends up being dropped. I suppose in theory it could try and send it to everyone in the local side net, but if you get multiple responses everything is going to get hosed up.

          So from the perspective of session state initiation it can act as a firewall since without route maps it only will work from one side.