<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="it">
	<id>https://wiki.ampr.ari.it/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=IW1GEU</id>
	<title>AMPR ARI - Contributi dell&#039;utente [it]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ampr.ari.it/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=IW1GEU"/>
	<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=Speciale:Contributi/IW1GEU"/>
	<updated>2026-05-06T12:54:26Z</updated>
	<subtitle>Contributi dell&amp;#039;utente</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=Host_connessi&amp;diff=337</id>
		<title>Host connessi</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=Host_connessi&amp;diff=337"/>
		<updated>2024-04-03T09:12:05Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: aggiunti link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In questa pagina sono elencati gli host che sono risultati raggiungibili nelle ultime 24 ore&lt;br /&gt;
{{#get_external_data:db=ipam&lt;br /&gt;
 |data=Ip_addr=IpAddr,Hostname=hostname,LastSeen=lastSeen&lt;br /&gt;
}}&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
 ! Indirizzo IP !! Hostname !! Ultimo contatto {{#for_external_table:&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
 {{!}}-&lt;br /&gt;
 {{!}} [http://{{{Ip_addr}}} {{{Ip_addr}}}] {{!}}{{!}} [http://{{{Hostname}}} {{{Hostname}}}] {{!}}{{!}} {{{LastSeen}}}&lt;br /&gt;
 }}&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=329</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=329"/>
		<updated>2024-03-28T11:34:09Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* prompt colorato */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = ip -4 rule add from 44.32.33.xxx table r_AMPR&lt;br /&gt;
PostUp = ip -4 route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
PostUp = ip -4 route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
PostDown = ip -4 rule del from 44.32.33.xxx table r_AMPR&lt;br /&gt;
PostDown = ip -4 route del 44.0.0.0/9    via 44.32.32.1 dev wg0 table r_AMPR&lt;br /&gt;
postDown = ip -4 route del 44.128.0.0/10 via 44.32.32.1 dev wg0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Migliorie:&lt;br /&gt;
* aggiungere un drop dei bogons in ingresso&lt;br /&gt;
* specificare l&#039;interfaccia&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Terminal gems ==&lt;br /&gt;
&lt;br /&gt;
=== history alla BSD ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
Questa mostra il timestamp della history in classico stile BSD. es:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export HISTTIMEFORMAT=&amp;quot;%d/%m/%y %T &amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== prompt colorato ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
&lt;br /&gt;
root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;31m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
utente_non_root_in_verde@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;32m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server nella rete 44 AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=328</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=328"/>
		<updated>2024-03-27T21:05:14Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* tunnel wireguard - OK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = ip -4 rule add from 44.32.33.xxx table r_AMPR&lt;br /&gt;
PostUp = ip -4 route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
PostUp = ip -4 route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
PostDown = ip -4 rule del from 44.32.33.xxx table r_AMPR&lt;br /&gt;
PostDown = ip -4 route del 44.0.0.0/9    via 44.32.32.1 dev wg0 table r_AMPR&lt;br /&gt;
postDown = ip -4 route del 44.128.0.0/10 via 44.32.32.1 dev wg0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Migliorie:&lt;br /&gt;
* aggiungere un drop dei bogons in ingresso&lt;br /&gt;
* specificare l&#039;interfaccia&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Terminal gems ==&lt;br /&gt;
&lt;br /&gt;
=== history alla BSD ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
Questa mostra il timestamp della history in classico stile BSD. es:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export HISTTIMEFORMAT=&amp;quot;%d/%m/%y %T &amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== prompt colorato ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
&lt;br /&gt;
root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;31m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
utente_non_root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;32m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server nella rete 44 AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=327</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=327"/>
		<updated>2024-03-27T21:04:10Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* tunnel wireguard - OK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = ip -4 rule add from 44.32.33.xxx table r_AMPR&lt;br /&gt;
PostUp = ip -4 route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
PostUp = ip -4 route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
PostDown = ip -4 rule del from 44.32.33.xxx table r_AMPR&lt;br /&gt;
PostDown = ip -4 route del 44.0.0.0/9    via 44.32.32.1 dev wg0 table r_AMPR&lt;br /&gt;
postDown = ip -4 route del 44.128.0.0/10 via 44.32.32.1 dev wg0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Migliorie:&lt;br /&gt;
* aggiungere un drop dei bogons in ingresso&lt;br /&gt;
* specificare l&#039;interfaccia&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Terminal gems ==&lt;br /&gt;
&lt;br /&gt;
=== history alla BSD ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
Questa mostra il timestamp della history in classico stile BSD. es:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export HISTTIMEFORMAT=&amp;quot;%d/%m/%y %T &amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== prompt colorato ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
&lt;br /&gt;
root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;31m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
utente_non_root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;32m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server nella rete 44 AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=209</id>
		<title>IW1GEU sandbox</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=209"/>
		<updated>2024-03-18T09:57:01Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Esempio di elenco risorse */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= IW1GEU MediaWiki sandbox =&lt;br /&gt;
&lt;br /&gt;
== Esempio di elenco risorse ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ RISORSE AMPR &lt;br /&gt;
|-&lt;br /&gt;
! Categoria !! Gestione !! Indirizzo !! Descrizione !! Note !! Connettività&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IQ1GP || http://iq1gp.ampr.ari.it || OpenWebRX+ in sezione IQ1GP || Antenna Diamond V2000, banda limitata a 1M || ItGate VDSL&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IW1GEU || http://rem1.iw1geu.ampr.ari.it/ || KiwiSDR remoto IW1GEU || Antenna Wellbrook ALA1530LN || BBBELL FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://iw1geu.ampr.ari.it/ || Testing dashy || in test || Multiwire FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://[0:0:0:0:0:ffff:44.32.33.152]/ || Testing ipv4 mapped ipv6|| in test ||&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://vm.iw1geu.ampr.ari.it || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://44.32.33.162 || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://193.70.17.196 || Test routing asimmetrico su VM || ok via internet || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || ??? || http://44.24.135.34 || D-Star HF QSO Finder || anche via internet || &lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://frassinetto.iq1gp.ampr.ari.it || Frassinetto  || Ponte FM/D-Star VHF || RL-Net HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://corio.iq1gp.ampr.ari.it || Corio || Ponte D-Star UHF || PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://garne.iq1gp.ampr.ari.it || Monte Garnè || Ponti DMR e D-Star UHF || RL-Net FTTH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://prarostino.iq1gp.ampr.ari.it || Prarostino || Ponti DMR e D-Star UHF || ElsyNet + PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://penice.iq1gp.ampr.ari.it || Monte Penice || Ponte D-Star UHF || HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || IZ3MEZ || telnet://dxc.iz3mez.ampr.org:8000 || IZ3MEZ-8 DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://on0an.ampr.org:8000 || ON0AN DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://44.144.11.254:8000 || ON0AN DX Cluster || Old IP address ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://44.11.16.73:8000 || ON0AN DX Cluster || New IP address ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || axudp://44.11.16.73:93 || ON0AN DX Cluster || AX-UDP ||&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.1 || 44.32.32.1 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.2 || 44.32.32.2 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.60.44.3 || 44.60.44.3 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Idee di sviluppi futuri ==&lt;br /&gt;
=== Unico punto di accesso ai propri servizi ===&lt;br /&gt;
Avendo a disposizione un ip 44 personale e magari avendo più servizi da pubblicare, questo lo stack della la mia idea per un unico punto di accesso web:&lt;br /&gt;
* Pulsantiera, [https://dashy.to/ Dashy] - Pulsantiera con le icone dei propri servizi (web, sdr, meteo, cluster...)&lt;br /&gt;
* Reverse proxy e load balancer, [https://caddyserver.com/ Caddy] - Reverse proxy che maschera i servizi (Forse fattibile anche con nginx)&lt;br /&gt;
* Entrambi i servizi erogati da docker container che girano sul QNAP di casa o direttamente sulla Mikrotik RB5009&lt;br /&gt;
&lt;br /&gt;
=== WishList di servizi centrali ===&lt;br /&gt;
* CA (Certification Authority) AMPR ARI che firma CSR (Client Signing Request) personali per permettere ai radioamatori di avere certificati per servizi SSL e TLS (HTTPS, login automatici etc), oppure trovare modo di automatizzare Letsencrypt in AMPR ARI&lt;br /&gt;
* Avere dati dei radioamatori su server centrale e un API server autenticato&lt;br /&gt;
* SSO (Single Sign On) sui servizi AMPR ARI&lt;br /&gt;
* Alla creazione/assegnazione dell&#039;ip44, creare il record PTR associato, così come viene creato il record A. &lt;br /&gt;
* Possibilità di concedere delega DNS del sottodominio di sezione&lt;br /&gt;
* Possibilità di aggiornare i propri record A/PTR del DNS ampr.ari.it&lt;br /&gt;
* &amp;lt;s&amp;gt;Possibilità di risposte DNS differenziate a seconda della provenienza del client ns. Es. un client 44 tenta di risolvere wiki.ampr.ari.it e gli viene specificato l&#039;ip44, mentre un client internet che chiede la stessa risoluzione gli niene risposto con l&#039;ip internet. DNS split-horizon? DNS views?&amp;lt;/s&amp;gt; Idea proposta e già scartata. Ci sono altri modi per raggiungere l&#039;obbiettivo di dirottare il traffico della propria utenza o su internet o su ip 44. Chi ne ha bisogno dovrà escogitare il metodo migliore.&lt;br /&gt;
* Possibilità di aggiornare in autonomia i propri dati su ipam (quali ad es: descrizione, uso)&lt;br /&gt;
* Permettere di richiedere il reset della password su tt.ari.it&lt;br /&gt;
* Un Yahoo/Altavista anni &#039;90 AMPR ARI tipo: [https://www.linkace.org/ LinkAce] ... per meglio far conoscere i servizi AMPR ai radioamatori senza pubblicarlo su internet&lt;br /&gt;
* Avere un servizio NTP per tutti gli afferenti al gw ARI&lt;br /&gt;
* Avere un centralino VoIP centrale ARI&lt;br /&gt;
* Avere un bel web.dx-cluster ARI tipo https://webcluster.ure.es https://dxheat.com/dxc/ o https://web.cluster.iz3mez.it/&lt;br /&gt;
&lt;br /&gt;
=== ip AMPR ARI su VM/VPS ===&lt;br /&gt;
* Come aggiungere un ip 44 AMPR ARI su un VPS esistente con stack ipv4?&lt;br /&gt;
* Come mantenere il doppio accesso internet e AMPR?&lt;br /&gt;
Ho preso appunti per lasciare una traccia di come fare.&lt;br /&gt;
Ho dedicato una pagina apposta [[APPPUNTI_VM_internet_e_AMPRNET| VM_internet_e_AMPRNET ]]&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=208</id>
		<title>IW1GEU sandbox</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=208"/>
		<updated>2024-03-18T09:47:20Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Esempio di elenco risorse */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= IW1GEU MediaWiki sandbox =&lt;br /&gt;
&lt;br /&gt;
== Esempio di elenco risorse ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ RISORSE AMPR &lt;br /&gt;
|-&lt;br /&gt;
! Categoria !! Gestione !! Indirizzo !! Descrizione !! Note !! Connettività&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IQ1GP || http://iq1gp.ampr.ari.it || OpenWebRX+ in sezione IQ1GP || Antenna Diamond V2000, banda limitata a 1M || ItGate VDSL&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IW1GEU || http://rem1.iw1geu.ampr.ari.it/ || KiwiSDR remoto IW1GEU || Antenna Wellbrook ALA1530LN || BBBELL FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://iw1geu.ampr.ari.it/ || Testing dashy || in test || Multiwire FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://vm.iw1geu.ampr.ari.it || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://44.32.33.162 || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://193.70.17.196 || Test routing asimmetrico su VM || ok via internet || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || ??? || http://44.24.135.34 || D-Star QSO Finder || anche via internet || &lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://frassinetto.iq1gp.ampr.ari.it || Frassinetto  || Ponte FM/D-Star VHF || RL-Net HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://corio.iq1gp.ampr.ari.it || Corio || Ponte D-Star UHF || PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://garne.iq1gp.ampr.ari.it || Monte Garnè || Ponti DMR e D-Star UHF || RL-Net FTTH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://prarostino.iq1gp.ampr.ari.it || Prarostino || Ponti DMR e D-Star UHF || ElsyNet + PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://penice.iq1gp.ampr.ari.it || Monte Penice || Ponte D-Star UHF || HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || IZ3MEZ || telnet://dxc.iz3mez.ampr.org:8000 || IZ3MEZ-8 DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://on0an.ampr.org:8000 || ON0AN DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://44.144.11.254:8000 || ON0AN DX Cluster || Old IP address ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://44.11.16.73:8000 || ON0AN DX Cluster || New IP address ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || axudp://44.11.16.73:93 || ON0AN DX Cluster || AX-UDP ||&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.1 || 44.32.32.1 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.2 || 44.32.32.2 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.60.44.3 || 44.60.44.3 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Idee di sviluppi futuri ==&lt;br /&gt;
=== Unico punto di accesso ai propri servizi ===&lt;br /&gt;
Avendo a disposizione un ip 44 personale e magari avendo più servizi da pubblicare, questo lo stack della la mia idea per un unico punto di accesso web:&lt;br /&gt;
* Pulsantiera, [https://dashy.to/ Dashy] - Pulsantiera con le icone dei propri servizi (web, sdr, meteo, cluster...)&lt;br /&gt;
* Reverse proxy e load balancer, [https://caddyserver.com/ Caddy] - Reverse proxy che maschera i servizi (Forse fattibile anche con nginx)&lt;br /&gt;
* Entrambi i servizi erogati da docker container che girano sul QNAP di casa o direttamente sulla Mikrotik RB5009&lt;br /&gt;
&lt;br /&gt;
=== WishList di servizi centrali ===&lt;br /&gt;
* CA (Certification Authority) AMPR ARI che firma CSR (Client Signing Request) personali per permettere ai radioamatori di avere certificati per servizi SSL e TLS (HTTPS, login automatici etc), oppure trovare modo di automatizzare Letsencrypt in AMPR ARI&lt;br /&gt;
* Avere dati dei radioamatori su server centrale e un API server autenticato&lt;br /&gt;
* SSO (Single Sign On) sui servizi AMPR ARI&lt;br /&gt;
* Alla creazione/assegnazione dell&#039;ip44, creare il record PTR associato, così come viene creato il record A. &lt;br /&gt;
* Possibilità di concedere delega DNS del sottodominio di sezione&lt;br /&gt;
* Possibilità di aggiornare i propri record A/PTR del DNS ampr.ari.it&lt;br /&gt;
* &amp;lt;s&amp;gt;Possibilità di risposte DNS differenziate a seconda della provenienza del client ns. Es. un client 44 tenta di risolvere wiki.ampr.ari.it e gli viene specificato l&#039;ip44, mentre un client internet che chiede la stessa risoluzione gli niene risposto con l&#039;ip internet. DNS split-horizon? DNS views?&amp;lt;/s&amp;gt; Idea proposta e già scartata. Ci sono altri modi per raggiungere l&#039;obbiettivo di dirottare il traffico della propria utenza o su internet o su ip 44. Chi ne ha bisogno dovrà escogitare il metodo migliore.&lt;br /&gt;
* Possibilità di aggiornare in autonomia i propri dati su ipam (quali ad es: descrizione, uso)&lt;br /&gt;
* Permettere di richiedere il reset della password su tt.ari.it&lt;br /&gt;
* Un Yahoo/Altavista anni &#039;90 AMPR ARI tipo: [https://www.linkace.org/ LinkAce] ... per meglio far conoscere i servizi AMPR ai radioamatori senza pubblicarlo su internet&lt;br /&gt;
* Avere un servizio NTP per tutti gli afferenti al gw ARI&lt;br /&gt;
* Avere un centralino VoIP centrale ARI&lt;br /&gt;
* Avere un bel web.dx-cluster ARI tipo https://webcluster.ure.es https://dxheat.com/dxc/ o https://web.cluster.iz3mez.it/&lt;br /&gt;
&lt;br /&gt;
=== ip AMPR ARI su VM/VPS ===&lt;br /&gt;
* Come aggiungere un ip 44 AMPR ARI su un VPS esistente con stack ipv4?&lt;br /&gt;
* Come mantenere il doppio accesso internet e AMPR?&lt;br /&gt;
Ho preso appunti per lasciare una traccia di come fare.&lt;br /&gt;
Ho dedicato una pagina apposta [[APPPUNTI_VM_internet_e_AMPRNET| VM_internet_e_AMPRNET ]]&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=192</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=192"/>
		<updated>2024-03-13T19:58:16Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* history alla BSD */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Migliorie:&lt;br /&gt;
* aggiungere un drop dei bogons in ingresso&lt;br /&gt;
* specificare l&#039;interfaccia&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Terminal gems ==&lt;br /&gt;
&lt;br /&gt;
=== history alla BSD ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
Questa mostra il timestamp della history in classico stile BSD. es:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export HISTTIMEFORMAT=&amp;quot;%d/%m/%y %T &amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== prompt colorato ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
&lt;br /&gt;
root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;31m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
utente_non_root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;32m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server nella rete 44 AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=Svxlink&amp;diff=190</id>
		<title>Svxlink</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=Svxlink&amp;diff=190"/>
		<updated>2024-03-13T11:21:18Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= SvxLink =&lt;br /&gt;
&lt;br /&gt;
SvxLink e&#039; un progetto di sm0svx nato nel 2003 come sistema flessibile general purpose per servizi digitali per radioamatori.&lt;br /&gt;
&lt;br /&gt;
Grazie ad un progetto di ARI CRER, e&#039; disponibile su AMPR un reflector per sperimentare questa tecnologia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gli obiettivi ==&lt;br /&gt;
L&#039;obiettivo principale e&#039; quello di fare rete tra di noi, associazioni sul territorio o singoli radioamatori, per sperimentare questa tecnologia su una piattaforma comune e che possa crescere secondo le nostre esigenze, quelle della comunità stessa degli.&lt;br /&gt;
&lt;br /&gt;
Poter sperimentare all&#039;interno di piattaforma svxlink nazionale con il proprio ripetitore di sezione o costruirsi il proprio hotspot casalingo significa sperimentare una tecnologia digitale che valorizza ancora di più l&#039;aspetto analogico della tradizionale comunicazione FM. Ben consci che esistano più ripetitori che radioamatori, da sempre non si e&#039; voluto alimentare la creazione di nuovi sistemi e nuovi segnali contemporanei in aria, quanto valorizzare l&#039;esistente aggiungendogli nuove funzionalità, come strumento di crescita individuale ma anche collettivo per le nostre sezioni e per la categoria in genere. &lt;br /&gt;
&lt;br /&gt;
L&#039;approccio di base di quanto sviluppato fino ad ora dalla comunità che vi ha aderito rispecchia infatti il principio che un sistema aggiornato con svxlink debba continuare ad operare come prima, e in funzione delle necessita&#039; del territorio possa o meno essere interconnettibile ad altri nodi. Al centro del servizio reso disponibile viene infatti posto l&#039;utente finale, e non la rete di per se: l&#039;utente deve poter usufruire delle funzionalità in modo semplice e comprensibile, comprendendo in qualsiasi momento il funzionamento del sistema automatico. Per questo motivo sono disponibili linee guida e configurazioni di esempio che valorizzino il piu&#039; possibile questa tecnologia senza disorientare o complicare l&#039;utilizzo all&#039;utente.&lt;br /&gt;
&lt;br /&gt;
== Come aderire ==&lt;br /&gt;
In attesa di procedure automatiche, e&#039; possibile richiedere accesso al reflector tramite https://tt.ari.it/open.php selezionando la categoria &amp;quot;accesso al reflector&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Documentazione ==&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=Svxlink&amp;diff=189</id>
		<title>Svxlink</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=Svxlink&amp;diff=189"/>
		<updated>2024-03-13T11:20:12Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Gli obiettivi */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SvxLink e&#039; un progetto di sm0svx nato nel 2003 come sistema flessibile general purpose per servizi digitali per radioamatori.&lt;br /&gt;
&lt;br /&gt;
Grazie ad un progetto di ARI CRER, e&#039; disponibile su AMPR un reflector per sperimentare questa tecnologia.&lt;br /&gt;
&lt;br /&gt;
= SvxLink =&lt;br /&gt;
&lt;br /&gt;
== Gli obiettivi ==&lt;br /&gt;
L&#039;obiettivo principale e&#039; quello di fare rete tra di noi, associazioni sul territorio o singoli radioamatori, per sperimentare questa tecnologia su una piattaforma comune e che possa crescere secondo le nostre esigenze, quelle della comunità stessa degli.&lt;br /&gt;
&lt;br /&gt;
Poter sperimentare all&#039;interno di piattaforma svxlink nazionale con il proprio ripetitore di sezione o costruirsi il proprio hotspot casalingo significa sperimentare una tecnologia digitale che valorizza ancora di più l&#039;aspetto analogico della tradizionale comunicazione FM. Ben consci che esistano più ripetitori che radioamatori, da sempre non si e&#039; voluto alimentare la creazione di nuovi sistemi e nuovi segnali contemporanei in aria, quanto valorizzare l&#039;esistente aggiungendogli nuove funzionalità, come strumento di crescita individuale ma anche collettivo per le nostre sezioni e per la categoria in genere. &lt;br /&gt;
&lt;br /&gt;
L&#039;approccio di base di quanto sviluppato fino ad ora dalla comunità che vi ha aderito rispecchia infatti il principio che un sistema aggiornato con svxlink debba continuare ad operare come prima, e in funzione delle necessita&#039; del territorio possa o meno essere interconnettibile ad altri nodi. Al centro del servizio reso disponibile viene infatti posto l&#039;utente finale, e non la rete di per se: l&#039;utente deve poter usufruire delle funzionalità in modo semplice e comprensibile, comprendendo in qualsiasi momento il funzionamento del sistema automatico. Per questo motivo sono disponibili linee guida e configurazioni di esempio che valorizzino il piu&#039; possibile questa tecnologia senza disorientare o complicare l&#039;utilizzo all&#039;utente.&lt;br /&gt;
&lt;br /&gt;
== Come aderire ==&lt;br /&gt;
In attesa di procedure automatiche, e&#039; possibile richiedere accesso al reflector tramite https://tt.ari.it/open.php selezionando la categoria &amp;quot;accesso al reflector&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Documentazione ==&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=Svxlink&amp;diff=188</id>
		<title>Svxlink</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=Svxlink&amp;diff=188"/>
		<updated>2024-03-13T11:18:54Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SvxLink e&#039; un progetto di sm0svx nato nel 2003 come sistema flessibile general purpose per servizi digitali per radioamatori.&lt;br /&gt;
&lt;br /&gt;
Grazie ad un progetto di ARI CRER, e&#039; disponibile su AMPR un reflector per sperimentare questa tecnologia.&lt;br /&gt;
&lt;br /&gt;
== Gli obiettivi ==&lt;br /&gt;
L&#039;obiettivo principale e&#039; quello di fare rete tra di noi, associazioni sul territorio o singoli radioamatori, per sperimentare questa tecnologia su una piattaforma comune e che possa crescere secondo le nostre esigenze, quelle della comunità stessa degli.&lt;br /&gt;
&lt;br /&gt;
Poter sperimentare all&#039;interno di piattaforma svxlink nazionale con il proprio ripetitore di sezione o costruirsi il proprio hotspot casalingo significa sperimentare una tecnologia digitale che valorizza ancora di più l&#039;aspetto analogico della tradizionale comunicazione FM. Ben consci che esistano più ripetitori che radioamatori, da sempre non si e&#039; voluto alimentare la creazione di nuovi sistemi e nuovi segnali contemporanei in aria, quanto valorizzare l&#039;esistente aggiungendogli nuove funzionalità, come strumento di crescita individuale ma anche collettivo per le nostre sezioni e per la categoria in genere. &lt;br /&gt;
&lt;br /&gt;
L&#039;approccio di base di quanto sviluppato fino ad ora dalla comunità che vi ha aderito rispecchia infatti il principio che un sistema aggiornato con svxlink debba continuare ad operare come prima, e in funzione delle necessita&#039; del territorio possa o meno essere interconnettibile ad altri nodi. Al centro del servizio reso disponibile viene infatti posto l&#039;utente finale, e non la rete di per se: l&#039;utente deve poter usufruire delle funzionalità in modo semplice e comprensibile, comprendendo in qualsiasi momento il funzionamento del sistema automatico. Per questo motivo sono disponibili linee guida e configurazioni di esempio che valorizzino il piu&#039; possibile questa tecnologia senza disorientare o complicare l&#039;utilizzo all&#039;utente.&lt;br /&gt;
&lt;br /&gt;
== Come aderire ==&lt;br /&gt;
In attesa di procedure automatiche, e&#039; possibile richiedere accesso al reflector tramite https://tt.ari.it/open.php selezionando la categoria &amp;quot;accesso al reflector&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Documentazione ==&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=183</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=183"/>
		<updated>2024-03-13T10:47:25Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* prompt colorato */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Migliorie:&lt;br /&gt;
* aggiungere un drop dei bogons in ingresso&lt;br /&gt;
* specificare l&#039;interfaccia&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Terminal gems ==&lt;br /&gt;
&lt;br /&gt;
=== history alla BSD ===&lt;br /&gt;
&lt;br /&gt;
For the root user:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export HISTTIMEFORMAT=&amp;quot;%d/%m/%y %T &amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
La prima assegnazione imposta il timestamp della history in classico stile BSD. es:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
root@geu-ampr  history&lt;br /&gt;
  500  13/03/24 11:30:47 history&lt;br /&gt;
  501  13/03/24 11:35:34 cat .bash_profile&lt;br /&gt;
  502  13/03/24 11:36:41 history&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== prompt colorato ===&lt;br /&gt;
&lt;br /&gt;
Impostazioni da mettere nel proprio .bash_profile&lt;br /&gt;
&lt;br /&gt;
root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;31m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
utente_non_root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;32m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server nella rete 44 AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=182</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=182"/>
		<updated>2024-03-13T10:46:07Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Certificati SSL/TLS - TROVARE SOLUZIONE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Migliorie:&lt;br /&gt;
* aggiungere un drop dei bogons in ingresso&lt;br /&gt;
* specificare l&#039;interfaccia&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Terminal gems ==&lt;br /&gt;
&lt;br /&gt;
=== history alla BSD ===&lt;br /&gt;
&lt;br /&gt;
For the root user:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export HISTTIMEFORMAT=&amp;quot;%d/%m/%y %T &amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
La prima assegnazione imposta il timestamp della history in classico stile BSD. es:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
root@geu-ampr  history&lt;br /&gt;
  500  13/03/24 11:30:47 history&lt;br /&gt;
  501  13/03/24 11:35:34 cat .bash_profile&lt;br /&gt;
  502  13/03/24 11:36:41 history&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== prompt colorato ===&lt;br /&gt;
&lt;br /&gt;
root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;31m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
utente_non_root_in_rosso@hostname_in_azzurro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
export PS1=&#039;\[\e[0;32m\]\u\[\e[m\]\[\e[1;29m\]@\[\e[1;34m\]\h \[\e[1;32m\]\w\[\e[m\] \[\e[1;32m\]\$\[\e[m\] \[\e[29m\]&#039;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server nella rete 44 AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=180</id>
		<title>IW1GEU sandbox</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=180"/>
		<updated>2024-03-13T09:01:01Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Esempio di elenco risorse */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= IW1GEU MediaWiki sandbox =&lt;br /&gt;
&lt;br /&gt;
== Esempio di elenco risorse ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ RISORSE AMPR &lt;br /&gt;
|-&lt;br /&gt;
! Categoria !! Gestione !! Indirizzo !! Descrizione !! Note !! Connettività&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IQ1GP || http://iq1gp.ampr.ari.it || OpenWebRX+ in sezione IQ1GP || Antenna Diamond V2000, banda limitata a 1M || ItGate VDSL&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IW1GEU || http://rem1.iw1geu.ampr.ari.it/ || KiwiSDR remoto IW1GEU || Antenna Wellbrook ALA1530LN || BBBELL FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://iw1geu.ampr.ari.it/ || Testing dashy || in test || Multiwire FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://vm.iw1geu.ampr.ari.it || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://44.32.33.162 || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://193.70.17.196 || Test routing asimmetrico su VM || ok via internet || OVH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://frassinetto.iq1gp.ampr.ari.it || Frassinetto  || Ponte FM/D-Star VHF || RL-Net HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://corio.iq1gp.ampr.ari.it || Corio || Ponte D-Star UHF || PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://garne.iq1gp.ampr.ari.it || Monte Garnè || Ponti DMR e D-Star UHF || RL-Net FTTH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://prarostino.iq1gp.ampr.ari.it || Prarostino || Ponti DMR e D-Star UHF || ElsyNet + PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://penice.iq1gp.ampr.ari.it || Monte Penice || Ponte D-Star UHF || HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || IZ3MEZ || telnet://dxc.iz3mez.ampr.org:8000 || IZ3MEZ-8 DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://on0an.ampr.org:8000 || ON0AN DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://44.144.11.254:8000 || ON0AN DX Cluster || Old IP address ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || telnet://44.11.16.73:8000 || ON0AN DX Cluster || New IP address ||&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || ON0AN || axudp://44.11.16.73:93 || ON0AN DX Cluster || AX-UDP ||&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.1 || 44.32.32.1 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.2 || 44.32.32.2 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.60.44.3 || 44.60.44.3 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Idee di sviluppi futuri ==&lt;br /&gt;
=== Unico punto di accesso ai propri servizi ===&lt;br /&gt;
Avendo a disposizione un ip 44 personale e magari avendo più servizi da pubblicare, questo lo stack della la mia idea per un unico punto di accesso web:&lt;br /&gt;
* Pulsantiera, [https://dashy.to/ Dashy] - Pulsantiera con le icone dei propri servizi (web, sdr, meteo, cluster...)&lt;br /&gt;
* Reverse proxy e load balancer, [https://caddyserver.com/ Caddy] - Reverse proxy che maschera i servizi (Forse fattibile anche con nginx)&lt;br /&gt;
* Entrambi i servizi erogati da docker container che girano sul QNAP di casa o direttamente sulla Mikrotik RB5009&lt;br /&gt;
&lt;br /&gt;
=== WishList di servizi centrali ===&lt;br /&gt;
* CA (Certification Authority) AMPR ARI che firma CSR (Client Signing Request) personali per permettere ai radioamatori di avere certificati per servizi SSL e TLS (HTTPS, login automatici etc), oppure trovare modo di automatizzare Letsencrypt in AMPR ARI&lt;br /&gt;
* Avere dati dei radioamatori su server centrale e un API server autenticato&lt;br /&gt;
* SSO (Single Sign On) sui servizi AMPR ARI&lt;br /&gt;
* Alla creazione/assegnazione dell&#039;ip44, creare il record PTR associato, così come viene creato il record A. &lt;br /&gt;
* Possibilità di concedere delega DNS del sottodominio di sezione&lt;br /&gt;
* Possibilità di aggiornare i propri record A/PTR del DNS ampr.ari.it&lt;br /&gt;
* &amp;lt;s&amp;gt;Possibilità di risposte DNS differenziate a seconda della provenienza del client ns. Es. un client 44 tenta di risolvere wiki.ampr.ari.it e gli viene specificato l&#039;ip44, mentre un client internet che chiede la stessa risoluzione gli niene risposto con l&#039;ip internet. DNS split-horizon? DNS views?&amp;lt;/s&amp;gt; Idea proposta e già scartata. Ci sono altri modi per raggiungere l&#039;obbiettivo di dirottare il traffico della propria utenza o su internet o su ip 44. Chi ne ha bisogno dovrà escogitare il metodo migliore.&lt;br /&gt;
* Possibilità di aggiornare in autonomia i propri dati su ipam (quali ad es: descrizione, uso)&lt;br /&gt;
* Permettere di richiedere il reset della password su tt.ari.it&lt;br /&gt;
* Un Yahoo/Altavista anni &#039;90 AMPR ARI tipo: [https://www.linkace.org/ LinkAce] ... per meglio far conoscere i servizi AMPR ai radioamatori senza pubblicarlo su internet&lt;br /&gt;
* Avere un servizio NTP per tutti gli afferenti al gw ARI&lt;br /&gt;
* Avere un centralino VoIP centrale ARI&lt;br /&gt;
* Avere un bel web.dx-cluster ARI tipo https://webcluster.ure.es https://dxheat.com/dxc/ o https://web.cluster.iz3mez.it/&lt;br /&gt;
&lt;br /&gt;
=== ip AMPR ARI su VM/VPS ===&lt;br /&gt;
* Come aggiungere un ip 44 AMPR ARI su un VPS esistente con stack ipv4?&lt;br /&gt;
* Come mantenere il doppio accesso internet e AMPR?&lt;br /&gt;
Ho preso appunti per lasciare una traccia di come fare.&lt;br /&gt;
Ho dedicato una pagina apposta [[APPPUNTI_VM_internet_e_AMPRNET| VM_internet_e_AMPRNET ]]&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=156</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=156"/>
		<updated>2024-03-07T15:56:19Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Certificati SSL/TLS - TROVARE SOLUZIONE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Migliorie:&lt;br /&gt;
* aggiungere un drop dei bogons in ingresso&lt;br /&gt;
* specificare l&#039;interfaccia&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server nella rete 44 AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=155</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=155"/>
		<updated>2024-03-07T15:10:12Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* firewall - OK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Migliorie:&lt;br /&gt;
* aggiungere un drop dei bogons in ingresso&lt;br /&gt;
* specificare l&#039;interfaccia&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=154</id>
		<title>IW1GEU sandbox</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=154"/>
		<updated>2024-03-07T14:36:28Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* WishList di servizi centrali */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= IW1GEU MediaWiki sandbox =&lt;br /&gt;
&lt;br /&gt;
== Esempio di elenco risorse ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ RISORSE AMPR &lt;br /&gt;
|-&lt;br /&gt;
! Categoria !! Gestione !! Indirizzo !! Descrizione !! Note !! Connettività&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IQ1GP || http://iq1gp.ampr.ari.it || OpenWebRX+ in sezione IQ1GP || Antenna Diamond V2000, banda limitata a 1M || ItGate VDSL&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IW1GEU || http://rem1.iw1geu.ampr.ari.it/ || KiwiSDR remoto IW1GEU || Antenna Wellbrook ALA1530LN || BBBELL FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://iw1geu.ampr.ari.it/ || Testing dashy || in test || Multiwire FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://vm.iw1geu.ampr.ari.it || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://44.32.33.162 || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://193.70.17.196 || Test routing asimmetrico su VM || ok via internet || OVH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://frassinetto.iq1gp.ampr.ari.it || Frassinetto  || Ponte FM/D-Star VHF || RL-Net HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://corio.iq1gp.ampr.ari.it || Corio || Ponte D-Star UHF || PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://garne.iq1gp.ampr.ari.it || Monte Garnè || Ponti DMR e D-Star UHF || RL-Net FTTH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://prarostino.iq1gp.ampr.ari.it || Prarostino || Ponti DMR e D-Star UHF || ElsyNet + PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://penice.iq1gp.ampr.ari.it || Monte Penice || Ponte D-Star UHF || HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || IZ3MEZ || telnet://dxc.iz3mez.ampr.org:8000 || IZ3MEZ-8 DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.1 || 44.32.32.1 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.2 || 44.32.32.2 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.60.44.3 || 44.60.44.3 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Idee di sviluppi futuri ==&lt;br /&gt;
=== Unico punto di accesso ai propri servizi ===&lt;br /&gt;
Avendo a disposizione un ip 44 personale e magari avendo più servizi da pubblicare, questo lo stack della la mia idea per un unico punto di accesso web:&lt;br /&gt;
* Pulsantiera, [https://dashy.to/ Dashy] - Pulsantiera con le icone dei propri servizi (web, sdr, meteo, cluster...)&lt;br /&gt;
* Reverse proxy e load balancer, [https://caddyserver.com/ Caddy] - Reverse proxy che maschera i servizi (Forse fattibile anche con nginx)&lt;br /&gt;
* Entrambi i servizi erogati da docker container che girano sul QNAP di casa o direttamente sulla Mikrotik RB5009&lt;br /&gt;
&lt;br /&gt;
=== WishList di servizi centrali ===&lt;br /&gt;
* CA (Certification Authority) AMPR ARI che firma CSR (Client Signing Request) personali per permettere ai radioamatori di avere certificati per servizi SSL e TLS (HTTPS, login automatici etc), oppure trovare modo di automatizzare Letsencrypt in AMPR ARI&lt;br /&gt;
* Avere dati dei radioamatori su server centrale e un API server autenticato&lt;br /&gt;
* SSO (Single Sign On) sui servizi AMPR ARI&lt;br /&gt;
* Alla creazione/assegnazione dell&#039;ip44, creare il record PTR associato, così come viene creato il record A. &lt;br /&gt;
* Possibilità di concedere delega DNS del sottodominio di sezione&lt;br /&gt;
* Possibilità di aggiornare i propri record A/PTR del DNS ampr.ari.it&lt;br /&gt;
* &amp;lt;s&amp;gt;Possibilità di risposte DNS differenziate a seconda della provenienza del client ns. Es. un client 44 tenta di risolvere wiki.ampr.ari.it e gli viene specificato l&#039;ip44, mentre un client internet che chiede la stessa risoluzione gli niene risposto con l&#039;ip internet. DNS split-horizon? DNS views?&amp;lt;/s&amp;gt; Idea proposta e già scartata. Ci sono altri modi per raggiungere l&#039;obbiettivo di dirottare il traffico della propria utenza o su internet o su ip 44. Chi ne ha bisogno dovrà escogitare il metodo migliore.&lt;br /&gt;
* Possibilità di aggiornare in autonomia i propri dati su ipam (quali ad es: descrizione, uso)&lt;br /&gt;
* Permettere di richiedere il reset della password su tt.ari.it&lt;br /&gt;
* Un Yahoo/Altavista anni &#039;90 AMPR ARI tipo: [https://www.linkace.org/ LinkAce] ... per meglio far conoscere i servizi AMPR ai radioamatori senza pubblicarlo su internet&lt;br /&gt;
* Avere un servizio NTP per tutti gli afferenti al gw ARI&lt;br /&gt;
* Avere un centralino VoIP centrale ARI&lt;br /&gt;
* Avere un bel web.dx-cluster ARI tipo https://webcluster.ure.es https://dxheat.com/dxc/ o https://web.cluster.iz3mez.it/&lt;br /&gt;
&lt;br /&gt;
=== ip AMPR ARI su VM/VPS ===&lt;br /&gt;
* Come aggiungere un ip 44 AMPR ARI su un VPS esistente con stack ipv4?&lt;br /&gt;
* Come mantenere il doppio accesso internet e AMPR?&lt;br /&gt;
Ho preso appunti per lasciare una traccia di come fare.&lt;br /&gt;
Ho dedicato una pagina apposta [[APPPUNTI_VM_internet_e_AMPRNET| VM_internet_e_AMPRNET ]]&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=153</id>
		<title>IW1GEU sandbox</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=153"/>
		<updated>2024-03-07T14:36:05Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* WishList di servizi centrali */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= IW1GEU MediaWiki sandbox =&lt;br /&gt;
&lt;br /&gt;
== Esempio di elenco risorse ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ RISORSE AMPR &lt;br /&gt;
|-&lt;br /&gt;
! Categoria !! Gestione !! Indirizzo !! Descrizione !! Note !! Connettività&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IQ1GP || http://iq1gp.ampr.ari.it || OpenWebRX+ in sezione IQ1GP || Antenna Diamond V2000, banda limitata a 1M || ItGate VDSL&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IW1GEU || http://rem1.iw1geu.ampr.ari.it/ || KiwiSDR remoto IW1GEU || Antenna Wellbrook ALA1530LN || BBBELL FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://iw1geu.ampr.ari.it/ || Testing dashy || in test || Multiwire FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://vm.iw1geu.ampr.ari.it || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://44.32.33.162 || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://193.70.17.196 || Test routing asimmetrico su VM || ok via internet || OVH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://frassinetto.iq1gp.ampr.ari.it || Frassinetto  || Ponte FM/D-Star VHF || RL-Net HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://corio.iq1gp.ampr.ari.it || Corio || Ponte D-Star UHF || PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://garne.iq1gp.ampr.ari.it || Monte Garnè || Ponti DMR e D-Star UHF || RL-Net FTTH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://prarostino.iq1gp.ampr.ari.it || Prarostino || Ponti DMR e D-Star UHF || ElsyNet + PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://penice.iq1gp.ampr.ari.it || Monte Penice || Ponte D-Star UHF || HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || IZ3MEZ || telnet://dxc.iz3mez.ampr.org:8000 || IZ3MEZ-8 DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.1 || 44.32.32.1 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.2 || 44.32.32.2 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.60.44.3 || 44.60.44.3 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Idee di sviluppi futuri ==&lt;br /&gt;
=== Unico punto di accesso ai propri servizi ===&lt;br /&gt;
Avendo a disposizione un ip 44 personale e magari avendo più servizi da pubblicare, questo lo stack della la mia idea per un unico punto di accesso web:&lt;br /&gt;
* Pulsantiera, [https://dashy.to/ Dashy] - Pulsantiera con le icone dei propri servizi (web, sdr, meteo, cluster...)&lt;br /&gt;
* Reverse proxy e load balancer, [https://caddyserver.com/ Caddy] - Reverse proxy che maschera i servizi (Forse fattibile anche con nginx)&lt;br /&gt;
* Entrambi i servizi erogati da docker container che girano sul QNAP di casa o direttamente sulla Mikrotik RB5009&lt;br /&gt;
&lt;br /&gt;
=== WishList di servizi centrali ===&lt;br /&gt;
* CA (Certification Authority) AMPR ARI che firma CSR (Client Signing Request) personali per permettere ai radioamatori di avere certificati per servizi SSL e TLS (HTTPS, login automatici etc), oppure trovare modo di automatizzare Letsencrypt in AMPR ARI&lt;br /&gt;
* Avere dati dei radioamatori su server centrale e un API server autenticato&lt;br /&gt;
* SSO (Single Sign On) sui servizi AMPR ARI&lt;br /&gt;
* Alla creazione/assegnazione dell&#039;ip44, creare il record PTR associato, così come viene creato il record A. &lt;br /&gt;
* Possibilità di concedere delega DNS del sottodominio di sezione&lt;br /&gt;
* Possibilità di aggiornare i propri record A/PTR del DNS ampr.ari.it&lt;br /&gt;
* &amp;lt;s&amp;gt;Possibilità di risposte DNS differenziate a seconda della provenienza del client ns. Es. un client 44 tenta di risolvere wiki.ampr.ari.it e gli viene specificato l&#039;ip44, mentre un client internet che chiede la stessa risoluzione gli niene risposto con l&#039;ip internet. DNS split-horizon? DNS views?&amp;lt;/s&amp;gt; Idea proposta scartata. Ci sono altri modi per raggiungere l&#039;obbiettivo di dirottare il traffico della propria utenza o su internet o su ip 44. Chi ne ha bisogno dovrà escogitare il metodo migliore.&lt;br /&gt;
* Possibilità di aggiornare in autonomia i propri dati su ipam (quali ad es: descrizione, uso)&lt;br /&gt;
* Permettere di richiedere il reset della password su tt.ari.it&lt;br /&gt;
* Un Yahoo/Altavista anni &#039;90 AMPR ARI tipo: [https://www.linkace.org/ LinkAce] ... per meglio far conoscere i servizi AMPR ai radioamatori senza pubblicarlo su internet&lt;br /&gt;
* Avere un servizio NTP per tutti gli afferenti al gw ARI&lt;br /&gt;
* Avere un centralino VoIP centrale ARI&lt;br /&gt;
* Avere un bel web.dx-cluster ARI tipo https://webcluster.ure.es https://dxheat.com/dxc/ o https://web.cluster.iz3mez.it/&lt;br /&gt;
&lt;br /&gt;
=== ip AMPR ARI su VM/VPS ===&lt;br /&gt;
* Come aggiungere un ip 44 AMPR ARI su un VPS esistente con stack ipv4?&lt;br /&gt;
* Come mantenere il doppio accesso internet e AMPR?&lt;br /&gt;
Ho preso appunti per lasciare una traccia di come fare.&lt;br /&gt;
Ho dedicato una pagina apposta [[APPPUNTI_VM_internet_e_AMPRNET| VM_internet_e_AMPRNET ]]&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=152</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=152"/>
		<updated>2024-03-07T14:19:17Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Traffic shaping - DA RAGIONARCI ANCORA */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
Su una VM che non fa routing, questo approccio funziona in egress, cioè solo in uscita. &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Influenzare un pochino la banda in ingresso sarebbe possibili tramite ifb. Non sa quanto sia efficace. Da provare...&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ip link add name ifb0 type ifb&lt;br /&gt;
ip link set dev ifb0 up&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 handle ffff: ingress&lt;br /&gt;
tc filter add dev wg_ampr_ari0 parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0&lt;br /&gt;
tc qdisc add dev ifb0 root handle 1: htb default 11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
E&#039; possibile anche limitare il numero di pacchetti UDP in ingresso tramite iptables ma questo potrebbe danneggiare traffico legittimo e bisognerà creare eccezzioni.&lt;br /&gt;
Se la limitazione impatta sul VoIP o altri stream che non devono avere limitazione, si dovrà andare a creare una eccezzione a monte con un ACCEPT.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -A INPUT -p udp -m limit --limit 10/sec --limit-burst 20 -j ACCEPT&lt;br /&gt;
iptables -A INPUT -p udp -j DROP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pericoloso ma fattibile sarebbe far loggare ad iptables il blocco UDP e far anallizare il log a fail2ban per procedere di conseguenza.&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=151</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=151"/>
		<updated>2024-03-07T14:08:18Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* LetsEncrypt - TROVARE SOLUZIONE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Certificati SSL/TLS - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=150</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=150"/>
		<updated>2024-03-07T14:07:53Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* LetsEncrypt - TROVARE SOLUZIONE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LetsEncrypt - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt https://letsencrypt.org/docs/challenge-types/&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet (HTTP-01 challenge)&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità di un DNS aggiornabile via API (DNS-01 challenge)&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=149</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=149"/>
		<updated>2024-03-07T14:05:24Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* NS resolver selettivo - NON OK - DA RIVEDERE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LetsEncrypt - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità della possibilità di creare record DNS&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=148</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=148"/>
		<updated>2024-03-07T10:29:03Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Traffic shaping - DA RAGIONARCI ANCORA */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo - NON OK - DA RIVEDERE == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LetsEncrypt - TROVARE SOLUZIONE ==&lt;br /&gt;
&lt;br /&gt;
Trovare soluzione per poter avere automatismi gratuiti di emissione/aggiornamento di certificati per SSL/TLS dei server AMPR ARI&lt;br /&gt;
&lt;br /&gt;
; LetsEncrypt&lt;br /&gt;
: * Metodo riconoscimento via WEB necessità il raggiungimento del ip 44 da LetsEncrypt/internet&lt;br /&gt;
: * Metodo riconoscimento via DNS necessità della possibilità di creare record DNS&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=147</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=147"/>
		<updated>2024-03-07T09:44:39Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Raggiungibilità servizi - OK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo - NON OK - DA RIVEDERE == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;br /&gt;
&lt;br /&gt;
== Traffic shaping - DA RAGIONARCI ANCORA ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Impostazione generale di shaping&lt;br /&gt;
tc qdisc add dev wg_ampr_ari0 root handle 1: htb default 11&lt;br /&gt;
&lt;br /&gt;
# massimo bitrate totale per interfaccia&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1: classid 1:1 htb rate 5000kbps&lt;br /&gt;
&lt;br /&gt;
# definizione classe limitata a 1000kpbs&lt;br /&gt;
tc class add dev wg_ampr_ari0 parent 1:1 classid 1:10 htb rate 1000kbps&lt;br /&gt;
&lt;br /&gt;
# Limita traffico UDP (protocollo 17) ridirigendolo alla classe limitante&lt;br /&gt;
tc filter add dev wg_ampr_ari0 protocol ip parent 1:0 prio 1 u32 match ip protocol 17 0xff flowid 1:10&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=146</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=146"/>
		<updated>2024-03-07T09:36:36Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Raggiungibilità servizi */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo - NON OK - DA RIVEDERE == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi - OK ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=145</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=145"/>
		<updated>2024-03-07T09:36:22Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* NS resolver selettivo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo - NON OK - DA RIVEDERE == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=144</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=144"/>
		<updated>2024-03-07T09:35:22Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* firewall */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall - OK ==&lt;br /&gt;
&lt;br /&gt;
Il firewall è molto personale e va implementato secondo le proprie esigenze. Questo vuole solo essere un punto di partenza.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTP&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment &amp;quot;servizio WEB HTTPS&amp;quot;&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=143</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=143"/>
		<updated>2024-03-07T09:32:56Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Test instradamento */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento - OK ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=142</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=142"/>
		<updated>2024-03-07T09:32:45Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* tunnel wireguard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard - OK ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=141</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=141"/>
		<updated>2024-03-07T09:32:36Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* interfacce */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce - OK == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=140</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=140"/>
		<updated>2024-03-07T09:32:03Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* reverse proxy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Raggiungibilità servizi ==&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=139</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=139"/>
		<updated>2024-03-07T09:10:54Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* reverse proxy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
:80 {&lt;br /&gt;
    root * /var/www/default&lt;br /&gt;
    php_fastcgi unix//run/php/php-fpm.sock&lt;br /&gt;
    file_server&lt;br /&gt;
    encode zstd gzip&lt;br /&gt;
    log {&lt;br /&gt;
        output file /var/log/caddy/default.access.log&lt;br /&gt;
        format console&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test raggiungibilità&lt;br /&gt;
* su ip numerico internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su dominio internet http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039; da internet&lt;br /&gt;
* su ip numerico AMPR ARI http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI&lt;br /&gt;
* su dominio AMPR ARI http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039; da AMPR ARI mentre da AMPR fuori ARI è da testare&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=138</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=138"/>
		<updated>2024-03-07T09:04:20Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* reverse proxy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
:80 {&lt;br /&gt;
    root * /var/www/default&lt;br /&gt;
    php_fastcgi unix//run/php/php-fpm.sock&lt;br /&gt;
    file_server&lt;br /&gt;
    encode zstd gzip&lt;br /&gt;
    log {&lt;br /&gt;
        output file /var/log/caddy/default.access.log&lt;br /&gt;
        format console&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet su ip numerico http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da internet su dominio http://vm.iw1geu.audric.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=137</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=137"/>
		<updated>2024-03-07T09:02:48Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Test instradamento */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test delle rotte &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# ip ro get 8.8.8.8&lt;br /&gt;
8.8.8.8 via 51.75.243.254 dev ens18 src 193.70.17.196&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.32.32.2&lt;br /&gt;
44.32.32.2 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
root@geu-ampr:~# ip ro get 44.88.0.1&lt;br /&gt;
44.88.0.1 via 44.32.32.1 dev wg_ampr_ari src 44.32.33.162&lt;br /&gt;
    cache&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 8.8.8.8&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.32.32.2&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# traceroute 44.88.0.1&lt;br /&gt;
traceroute to 44.88.0.1 (44.88.0.1), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.710 ms  25.698 ms  25.683 ms&lt;br /&gt;
 2  gw.hamgatect.ampr.org (44.88.0.1)  145.807 ms  145.784 ms *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
:80 {&lt;br /&gt;
    root * /var/www/default&lt;br /&gt;
    php_fastcgi unix//run/php/php-fpm.sock&lt;br /&gt;
    file_server&lt;br /&gt;
    encode zstd gzip&lt;br /&gt;
    log {&lt;br /&gt;
        output file /var/log/caddy/default.access.log&lt;br /&gt;
        format console&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=136</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=136"/>
		<updated>2024-03-06T22:32:20Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* reverse proxy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
:80 {&lt;br /&gt;
    root * /var/www/default&lt;br /&gt;
    php_fastcgi unix//run/php/php-fpm.sock&lt;br /&gt;
    file_server&lt;br /&gt;
    encode zstd gzip&lt;br /&gt;
    log {&lt;br /&gt;
        output file /var/log/caddy/default.access.log&lt;br /&gt;
        format console&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=135</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=135"/>
		<updated>2024-03-06T22:26:19Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* reverse proxy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
:80 {&lt;br /&gt;
    root * /var/www/default&lt;br /&gt;
    php_fastcgi unix//run/php/php-fpm.sock&lt;br /&gt;
    file_server&lt;br /&gt;
&lt;br /&gt;
    log {&lt;br /&gt;
        output file /var/log/caddy/default.access.log&lt;br /&gt;
        format console&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    encode zstd gzip&lt;br /&gt;
&lt;br /&gt;
    # Prevent access to dot-files, except .well-known&lt;br /&gt;
    @dotFiles {&lt;br /&gt;
      path */.*&lt;br /&gt;
      not path /.well-known/*&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=134</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=134"/>
		<updated>2024-03-06T18:48:44Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* reverse proxy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Nessuno dovrebbe arriva qui&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=133</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=133"/>
		<updated>2024-03-06T18:30:01Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* NS resolver selettivo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; DA RIVEDERE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=132</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=132"/>
		<updated>2024-03-06T18:28:41Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Vm di base */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables iptables-persistent systemd-resolved wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=131</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=131"/>
		<updated>2024-03-06T18:23:35Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Appunti di viaggio per gli addetti ai lavori */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; WORK IN PROGRESS - DA TESTARE &#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=130</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=130"/>
		<updated>2024-03-06T17:57:20Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* reverse proxy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WORK IN PROGRESS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Test risposte da:&lt;br /&gt;
* da internet http://193.70.17.196 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR ARI su dominio http://vm.iw1geu.ampr.ari.it &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
* da AMPR fuori ARI su ip numerico http://44.32.33.162 &#039;&#039;&#039;??? boh!? chi mi dice se funziona?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=129</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=129"/>
		<updated>2024-03-06T17:54:20Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* NS resolver selettivo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WORK IN PROGRESS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test configurazione &#039;&#039;&#039;da rivedere&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@geu-ampr:~# resolvectl status&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Global&lt;br /&gt;
         Protocols: +LLMNR +mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
  resolv.conf mode: stub&lt;br /&gt;
Current DNS Server: 8.8.8.8&lt;br /&gt;
        DNS Servers 44.32.32.2 44.60.44.3 44.32.32.1 8.8.8.8&lt;br /&gt;
         DNS Domain ampr.ari.it ~.&lt;br /&gt;
&lt;br /&gt;
Link 2 (ens18)&lt;br /&gt;
Current Scopes: LLMNR/IPv4 LLMNR/IPv6&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
    DNS Domain: DOMAINS&lt;br /&gt;
&lt;br /&gt;
Link 3 (wg_ampr_ari)&lt;br /&gt;
Current Scopes: none&lt;br /&gt;
     Protocols: -DefaultRoute +LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=128</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=128"/>
		<updated>2024-03-06T17:46:55Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* test instradamento */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WORK IN PROGRESS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=127</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=127"/>
		<updated>2024-03-06T17:46:24Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* firewall */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WORK IN PROGRESS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== test instradamento ==&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso internet &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets&lt;br /&gt;
 1  551.255.69.252 (551.255.69.252)  0.505 ms  0.508 ms  0.669 ms&lt;br /&gt;
 2  510.17.50.50 (510.17.50.50)  0.521 ms  0.618 ms  0.697 ms&lt;br /&gt;
 3  510.73.17.66 (510.73.17.66)  0.199 ms&lt;br /&gt;
 4  510.95.64.136 (510.95.64.136)  0.574 ms&lt;br /&gt;
 5  * * *&lt;br /&gt;
 6  510.200.2.69 (10.200.2.69)  3.965 ms  3.929 ms&lt;br /&gt;
 7  * * *&lt;br /&gt;
 8  * * *&lt;br /&gt;
 9  66.249.94.133 (66.249.94.133)  4.942 ms dns.google (8.8.8.8)  4.100 ms 142.250.234.43 (142.250.234.43)  4.897 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR ARI &#039;&#039;&#039;OK&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.32.32.2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.32.32.2 (44.32.32.2), 30 hops max, 60 byte packets&lt;br /&gt;
 1  44.32.32.1 (44.32.32.1)  25.891 ms  25.864 ms  25.882 ms&lt;br /&gt;
 2  44.32.32.2 (44.32.32.2)  28.531 ms  28.537 ms  28.528 ms&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Test instradamento verso AMPR fuori da AMR ARI &#039;&#039;&#039;FALLITO rivedere perchè&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute 44.88.0.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
traceroute to 44.88.0.9 (44.88.0.9), 30 hops max, 60 byte packets&lt;br /&gt;
 1  51.255.69.252 (51.255.69.252)  0.573 ms  0.635 ms  0.829 ms&lt;br /&gt;
 2  10.17.50.58 (10.17.50.58)  0.420 ms 10.17.50.50 (10.17.50.50)  0.496 ms 10.17.50.56 (10.17.50.56)  0.414 ms&lt;br /&gt;
 3  10.73.16.112 (10.73.16.112)  0.242 ms 10.73.16.114 (10.73.16.114)  0.206 ms 10.73.17.64 (10.73.17.64)  0.185 ms&lt;br /&gt;
 4  10.95.64.158 (10.95.64.158)  0.663 ms  0.416 ms 10.95.64.156 (10.95.64.156)  0.522 ms&lt;br /&gt;
 5  lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.296 ms  4.535 ms  4.240 ms&lt;br /&gt;
 6  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  82.450 ms nyc-ny1-sbb2-8k.nj.us (192.99.146.133)  73.537 ms lon-thw-sbb1-nc5.uk.eu (54.36.50.240)  4.281 ms&lt;br /&gt;
 7  nyc-ny1-sbb1-8k.nj.us (192.99.146.127)  77.398 ms be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.989 ms  81.534 ms&lt;br /&gt;
 8  be102.bhs-g1-nc5.qc.ca (198.27.73.204)  83.947 ms be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  101.642 ms be101.chi-ch2-sbb2-8k.il.us (192.99.146.141)  94.279 ms&lt;br /&gt;
 9  be101.chi-ch2-sbb1-8k.il.us (198.27.73.207)  99.965 ms 10.200.4.208 (10.200.4.208)  94.478 ms *&lt;br /&gt;
10  * * 10.200.3.193 (10.200.3.193)  153.552 ms&lt;br /&gt;
11  eqix-sv5.cenic.com (206.223.117.118)  144.400 ms  152.549 ms 10.200.3.193 (10.200.3.193)  149.355 ms&lt;br /&gt;
12  eqix-sv5.cenic.com (206.223.117.118)  147.728 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  162.321 ms *&lt;br /&gt;
13  * dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  152.430 ms dc-svl-agg8--svl-agg10-300g.cenic.net (137.164.11.81)  163.969 ms&lt;br /&gt;
14  dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  157.846 ms dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.862 ms dc-lax-agg8--svl-agg8--100ge--2.cenic.net (137.164.11.20)  158.459 ms&lt;br /&gt;
15  dc-tus-agg8--lax-agg8-300g.cenic.net (137.164.11.83)  154.960 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  159.300 ms  154.293 ms&lt;br /&gt;
16  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  162.148 ms sand1-agg-01--tus-agg8--300g--01.cenic.net (137.164.11.85)  153.691 ms  153.621 ms&lt;br /&gt;
17  ucsd--sand1-agg-01--100g--01.cenic.net (137.164.23.177)  157.586 ms *  160.222 ms&lt;br /&gt;
18  * * *&lt;br /&gt;
19  sdsc-7710-7--mcore-vl2995-p2p.ucsd.edu (132.239.255.50)  152.531 ms  152.202 ms *&lt;br /&gt;
20  * * *&lt;br /&gt;
21  * * *&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=126</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=126"/>
		<updated>2024-03-06T17:36:48Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* firewall */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WORK IN PROGRESS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Oltre ad iptables viene usato il pacchetto iptables-persistnet che salva in /etc/iptables le regole e le attiva all&#039;avvio.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attivazione/ripristino delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-restore &amp;lt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Salvataggio delle regole di firewall&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Se si fanno dei cambiamenti a mano da riga di comando direttamente con iptables, occorre salvarle per ritrovarsele attive dopo un riavvio.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables-save &amp;gt;/etc/iptables/rules.v4&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=125</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=125"/>
		<updated>2024-03-06T17:32:43Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* tunnel wireguard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WORK IN PROGRESS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abilitazione del servizio per l&#039;avvio automatico:&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
systemctl enable wg-quick@wg_ampr_ari0.service&lt;br /&gt;
systemctl start wg-quick@wg_ampr_ari0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=124</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=124"/>
		<updated>2024-03-06T16:47:50Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* interfacce */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WORK IN PROGRESS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=123</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=123"/>
		<updated>2024-03-06T16:46:42Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* Appunti di viaggio per gli addetti ai lavori */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WORK IN PROGRESS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
La VM nasce con connettività internet del provider di hosting.&lt;br /&gt;
Si vuole ottenere che un servizio di rete venga erogato verso internet se richiesto da internet e verso la 44 se richiesto da AMPR.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
    dns-nameservers 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=120</id>
		<title>IW1GEU sandbox</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=IW1GEU_sandbox&amp;diff=120"/>
		<updated>2024-03-06T16:13:50Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* WishList di servizi centrali */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= IW1GEU MediaWiki sandbox =&lt;br /&gt;
&lt;br /&gt;
== Esempio di elenco risorse ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;margin:auto&amp;quot;&lt;br /&gt;
|+ RISORSE AMPR &lt;br /&gt;
|-&lt;br /&gt;
! Categoria !! Gestione !! Indirizzo !! Descrizione !! Note !! Connettività&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IQ1GP || http://iq1gp.ampr.ari.it || OpenWebRX+ in sezione IQ1GP || Antenna Diamond V2000, banda limitata a 1M || ItGate VDSL&lt;br /&gt;
|-&lt;br /&gt;
| RICEVITORE-REMOTO || IW1GEU || http://rem1.iw1geu.ampr.ari.it/ || KiwiSDR remoto IW1GEU || Antenna Wellbrook ALA1530LN || BBBELL FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://iw1geu.ampr.ari.it/ || Testing dashy || in test || Multiwire FTTH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://vm.iw1geu.ampr.ari.it || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://44.32.33.162 || Test routing asimmetrico su VM || ok via AMPR || OVH&lt;br /&gt;
|-&lt;br /&gt;
| ALTRO || IW1GEU || http://193.70.17.196 || Test routing asimmetrico su VM || ok via internet || OVH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://frassinetto.iq1gp.ampr.ari.it || Frassinetto  || Ponte FM/D-Star VHF || RL-Net HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://corio.iq1gp.ampr.ari.it || Corio || Ponte D-Star UHF || PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://garne.iq1gp.ampr.ari.it || Monte Garnè || Ponti DMR e D-Star UHF || RL-Net FTTH&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://prarostino.iq1gp.ampr.ari.it || Prarostino || Ponti DMR e D-Star UHF || ElsyNet + PSA HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DASHBOARD-PONTE || IQ1GP || http://penice.iq1gp.ampr.ari.it || Monte Penice || Ponte D-Star UHF || HiperLan&lt;br /&gt;
|-&lt;br /&gt;
| DX-CLUSTER || IZ3MEZ || telnet://dxc.iz3mez.ampr.org:8000 || IZ3MEZ-8 DX Cluster || ||&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.1 || 44.32.32.1 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.32.32.2 || 44.32.32.2 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|-&lt;br /&gt;
| DNS-RESOLVER || ARI || 44.60.44.3 || 44.60.44.3 || Dominio *.ampr.ari.it risolvibili anche da internet || Aruba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Idee di sviluppi futuri ==&lt;br /&gt;
=== Unico punto di accesso ai propri servizi ===&lt;br /&gt;
Avendo a disposizione un ip 44 personale e magari avendo più servizi da pubblicare, questo lo stack della la mia idea per un unico punto di accesso web:&lt;br /&gt;
* Pulsantiera, [https://dashy.to/ Dashy] - Pulsantiera con le icone dei propri servizi (web, sdr, meteo, cluster...)&lt;br /&gt;
* Reverse proxy e load balancer, [https://caddyserver.com/ Caddy] - Reverse proxy che maschera i servizi (Forse fattibile anche con nginx)&lt;br /&gt;
* Entrambi i servizi erogati da docker container che girano sul QNAP di casa o direttamente sulla Mikrotik RB5009&lt;br /&gt;
&lt;br /&gt;
=== WishList di servizi centrali ===&lt;br /&gt;
* CA (Certification Authority) AMPR ARI che firma CSR (Client Signing Request) personali per permettere ai radioamatori di avere certificati per servizi SSL e TLS (HTTPS, login automatici etc), oppure trovare modo di automatizzare Letsencrypt in AMPR ARI&lt;br /&gt;
* SSO (Single Sign On) sui servizi AMPR ARI&lt;br /&gt;
* Un Yahoo/Altavista anni &#039;90 AMPR ARI tipo: [https://github.com/sissbruecker/linkding linkding], [https://www.linkace.org/ LinkAce] ... per meglio far conoscere i servizi AMPR ai radioamatori senza per forza farlo sapere ad internet/google/bing...&lt;br /&gt;
* Alla creazione/assegnazione dell&#039;ip44, creare il record PTR associato, così come viene creato il record A. &lt;br /&gt;
* Possibilità di concedere delega DNS del sottodominio di sezione&lt;br /&gt;
* Possibilità di aggiornare i propri record A/PTR del DNS ampr.ari.it&lt;br /&gt;
* Possibilità di risposte DNS differenziate a seconda della provenienza del client ns. Es. un client 44 tenta di risolvere wiki.ampr.ari.it e gli viene specificato l&#039;ip44, mentre un client internet che chiede la stessa risoluzione gli niene risposto con l&#039;ip internet. DNS split-horizon? DNS views?&lt;br /&gt;
* Possibilità di aggiornare in autonomia i propri dati su ipam (quali ad es: descrizione, uso)&lt;br /&gt;
* Permettere di richiedere il reset della password su tt.ari.it&lt;br /&gt;
* Avere un servizio NTP per tutti gli afferenti al gw ARI&lt;br /&gt;
* Avere un centralino VoIP centrale ARI&lt;br /&gt;
&lt;br /&gt;
=== ip AMPR ARI su VM/VPS ===&lt;br /&gt;
* Come aggiungere un ip 44 AMPR ARI su un VPS esistente con stack ipv4?&lt;br /&gt;
* Come mantenere il doppio accesso internet e AMPR?&lt;br /&gt;
Ho preso appunti per lasciare una traccia di come fare.&lt;br /&gt;
Ho dedicato una pagina apposta [[APPPUNTI_VM_internet_e_AMPRNET| VM_internet_e_AMPRNET ]]&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=119</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=119"/>
		<updated>2024-03-06T15:57:42Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* firewall */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
    dns-nameservers 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type destination-unreachable/source-quench              -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s --limit-burst 10 -j ACCEPT -m comment --comment &amp;quot;ping si ma non troppo&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/m --limit-burst 1  -j LOG --log-prefix &amp;quot;ICMP flood scampato: &amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type echo-request -j DROP&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
	<entry>
		<id>https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=118</id>
		<title>APPPUNTI VM internet e AMPRNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.ampr.ari.it/index.php?title=APPPUNTI_VM_internet_e_AMPRNET&amp;diff=118"/>
		<updated>2024-03-06T15:13:34Z</updated>

		<summary type="html">&lt;p&gt;IW1GEU: /* firewall */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Appunti di viaggio per gli addetti ai lavori =&lt;br /&gt;
&lt;br /&gt;
== Vm di base ==&lt;br /&gt;
Questa è una VM debian minimal su OVH che ha una configurazione di rete MOLTO particolare.&lt;br /&gt;
&lt;br /&gt;
Se funziona qui, ci sono altissime probabilità che funioni anche da voi.&lt;br /&gt;
&lt;br /&gt;
Pacchetti base installalti: iptables ipset wireguard ssh caddy&lt;br /&gt;
&lt;br /&gt;
== interfacce == &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/network# cat interfaces&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;source /etc/network/interfaces.d/*&lt;br /&gt;
auto lo&lt;br /&gt;
iface lo inet loopback&lt;br /&gt;
&lt;br /&gt;
allow-hotplug eth0&lt;br /&gt;
iface eth0 inet static&lt;br /&gt;
    address ip.in.ter.net/32&lt;br /&gt;
    post-up ip route add              gw.in.ter.net dev eth0&lt;br /&gt;
    post-up ip route add  default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del default via gw.in.ter.net dev eth0&lt;br /&gt;
    pre-down ip route del             gw.in.ter.net dev eth0&lt;br /&gt;
    dns-nameservers 8.8.8.8&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== tunnel wireguard ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;[Peer]&lt;br /&gt;
PublicKey = PUBLICKEY&lt;br /&gt;
AllowedIPs = 44.0.0.0/9, 44.128.0.0/10&lt;br /&gt;
Endpoint = 5.144.187.34:13236&lt;br /&gt;
PresharedKey = PRESHAREDKEY&lt;br /&gt;
&lt;br /&gt;
[Interface]&lt;br /&gt;
ListenPort = 51820&lt;br /&gt;
PrivateKey = PRIVATEKEY&lt;br /&gt;
Address = 44.32.33.xxx/21&lt;br /&gt;
# Se si usa questa riga DNS, tutte le richieste dns verranno dirottate li. Usare systemd-resolved per avere un risolutore specifico per dominio&lt;br /&gt;
#DNS = 44.32.32.2, 44.60.44.3, 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
# Creare riga &amp;quot;585 r_AMPR&amp;quot; in /etc/iproute2/rt_tables&lt;br /&gt;
Table = r_AMPR&lt;br /&gt;
&lt;br /&gt;
PostUp = /etc/wireguard/wg_ampr_ari-up0.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/wireguard# cat wg_ampr_ari0-up.sh &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 &amp;gt;/dev/null ||true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1&lt;br /&gt;
&lt;br /&gt;
ip route del 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route del 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR &amp;gt;/dev/null |true&lt;br /&gt;
ip route add 44.0.0.0/9    via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
ip route add 44.128.0.0/10 via 44.32.32.1 dev wg_ampr_ari0 table r_AMPR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== firewall ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/iptables# cat rules.v4 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [0:0]&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [0:0]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
# Generated by iptables-save v1.8.9 (nf_tables) on Wed Mar  6 14:11:24 2024&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [79:8052]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [118:18860]&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT&lt;br /&gt;
-A INPUT -p udp -m udp --dport 51820 -j ACCEPT -m comment --comment &amp;quot;WireGuard&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type 3/4                -j ACCEPT -m comment --comment &amp;quot;PMTU Discovery&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type 8 -s 44.0.0.0/9    -j ACCEPT -m comment --comment &amp;quot;ping solo da AMPR&amp;quot;&lt;br /&gt;
-A INPUT -p icmp --icmp-type 8 -s 44.128.0.0/10 -j ACCEPT -m comment --comment &amp;quot;ping solo da AMPR&amp;quot;&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT&lt;br /&gt;
-A INPUT -s ip.qth -m comment --comment &amp;quot;Casa&amp;quot; -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Wed Mar  6 14:11:24 2024&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== NS resolver selettivo == &lt;br /&gt;
Resolver di default e resolver specifico per dominio e sottodomini di ampr.ari.it &lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat ampr.ari.it.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
Domains=ampr.ari.it&lt;br /&gt;
DNS=44.32.32.2 44.60.44.3 44.32.32.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/systemd/resolved.conf.d# cat dns_servers.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[Resolve]&lt;br /&gt;
DNS=8.8.8.8&lt;br /&gt;
Domains=~.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== reverse proxy ==&lt;br /&gt;
&amp;lt;pre&amp;gt;root@geu-ampr:/etc/caddy# cat Caddyfile&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
vm.iw1geu.ampr.ari.it:80 {&lt;br /&gt;
	root * /var/www/vm.iw1geu.ampr.ari.it&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
my.ip.ampr.net:80 {&lt;br /&gt;
	root * /var/www/my.ip.ampr.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
ip.in.ter.net:80 {&lt;br /&gt;
	root * /var/www/ip.in.ter.net&lt;br /&gt;
	file_server&lt;br /&gt;
}&lt;br /&gt;
:80 {&lt;br /&gt;
	respond &amp;quot;Makkè quarzo vuoi!??&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>IW1GEU</name></author>
	</entry>
</feed>