Replies: 0 comments 6 replies
-
Optionally, I could put in an optional "paranoid" mode too. This would only allow the "modern network" to access the RetroNAS device on SSH/SFTP (TCP/22), Cockpit TLS (TCP9090) and SMB2 (TCP/445 only, no TCP/UDP 135-139 for SMB1/NetBIOS/NMB/WINS/RPC), with all other services denied (makes it difficult to test things from the modern network, but keeps people happy who are insisting that Linux-served SMB1 on their home network will cause planet-ending events, while they all continue to happily use plain-text FTP anyway). This could be a simple third option in the configuration page (where the retro/modern interfaces are specced. Just a yes/no item for "paranoid mode"). |
Beta Was this translation helpful? Give feedback.
-
We are currently looking into this into the firewalld branch, i have a working setup on an rpi that I am slowly replicating into this branch with a mind to make it flexible. Primary target will be rpi initially my current setup includes
i think sane defaults from this experiment for the rpi is something like this
this diagram is what i'll be working towards, with some options to override the interface assignments/nets i expect |
Beta Was this translation helpful? Give feedback.
-
I'm beginning to put some code together to build a "standalone" or "firewall" mode RetroNAS setup. The design goal is the following:
The RetroNAS device itself can be configured in one of two ways:
With two interfaces, one that we deem "the modern interface", the other we deem "the retro interface". The name indicates which side of the network that interface lives on (modern for your new computers and systems, retro for all your old computers/consoles). I'm calling this "router mode" for now.
With one interface where the RetroNAS will plug directly in to an old system with no upstream service. I'm calling this "standalone mode" for now.
From here, I'll load up a couple of services. For now I'm going with:
ISC-DHCP for DHCP serving. I'm choosing this over dnsmasq as the latter has severe limitations for future ideas we want to implement (PXE and/or network booting of a large variety of old computers, consoles, arcade systems, etc).
dnsmasq for DNS forwarding only. We won't be using the TFTP portion (we have that already in RetroNAS), nor the DHCP portion (as it's too limited, so we'll go with ISC-DHCP). It will purely for be forwarding the DNS provided to RetroNAS's "modern interface" and providing DNS services back down to the "retro interface" network. I am 100% against just pushing 8.8.8.8 to systems like so many other projects do, as that's terrible practice to force Google DNS on users without them knowing about it. Whatever DNS a user chooses for their household network, RetroNAS will obey and use via DHCP on the "modern interface" (alternatively, the user can configure upstream DNS manually if they wish).
firewalld - this will configure the basic portions we need depending on (1 - router) or (2 - standalone) modes, such as
The configuration page should be fairly simple:
In 99% of cases I envisage one the following use cases for people wanting this specific feature:
User has a home WiFi network, but requires RetroNAS to be wired in for latency/bandwidth reasons (OPL2/ps3netsrv/MiSTer/EtherDFS/etc all are better off wired than wireless). RetroNAS can then talk to the modern network over WiFi using that as the administrative interface, and connect in to the retro network via wired interface. This also helps if users don't have Ethernet cables into their gaming areas (a common feedback item I hear from users).
Users have a completely standalone retro network. Maybe they're travelling with a MiSTer device, maybe they just want a small RPi device tucked in behind their PS2 and direct-connects via a single Ethernet cable with no switch but is able to serve DHCP to the PS2, etc.
On top of all of this, I need to include a way to disable this. Should the user make a mistake in the configuration, there needs to be a way to undo the firewalling and set the device back to normal mode. This will likely just be an "undo" menu item for RetroNAS that turns off dhcpd and sets firewalld to an allow-all mode.
I'm not sure what to call this in the menus. "Router mode" might make the most sense to people intuitively? Or as per the subject of this discussion with "Network router/firewall/standalone mode" or something?
Discussion is open for further ideas, design criticisms, or any other commentary.
Beta Was this translation helpful? Give feedback.
All reactions