!kDYMmhJUsdeGgGGYwz:matrix.org

Networking

377 Members
84 Servers

Load older messages


SenderMessageTime
18 Jan 2023
@thelosmos1010:matrix.org@thelosmos1010:matrix.org joined the room.04:10:38
@thelosmos1010:matrix.org@thelosmos1010:matrix.org left the room.04:10:51
@seanjohnstontips:matrix.org@seanjohnstontips:matrix.orgRedacted or Malformed Event05:13:22
@warped:linuxdelta.comWarpedRedacted or Malformed Event05:45:58
@SnarkTest:matrix.orgAtypicalKernel banned @seanjohnstontips:matrix.org@seanjohnstontips:matrix.org (Spammer).05:51:26
@drgif:matrix.orgdrgif joined the room.13:22:49
@hank:myportal.socialHankThey must have been doing a true full spectrum operation on Matrix. That scammer showed up in some obscure meditation room I subscribe to lol15:30:11
@hbarsquared:matrix.orghbarsquared joined the room.22:36:13
19 Jan 2023
@thewaywardpilot:matrix.orgDaveM joined the room.16:04:14
@thewaywardpilot:matrix.orgDaveM changed their display name from David Massey to DaveM.16:07:10
@thewaywardpilot:matrix.orgDaveM set a profile picture.16:15:41
20 Jan 2023
@mrwacky:matrix.orgmrwacky joined the room.23:58:53
22 Jan 2023
@chaz042:matrix.orgchaz042 joined the room.21:31:46
@morack19:matrix.orgmorack19 joined the room.22:58:43
24 Jan 2023
@datagoose:matrix.orgdatagoose joined the room.18:12:55
25 Jan 2023
@defolos:matrix.orgdefolos joined the room.07:14:30
@splintter:matrix.orgAndreas

Hey do,
I am considering to implement a smart home with all the different thingymajobs and alike. Since I don't really trust them with potential spyware and security issues, I want to run them on their own subnet. My current router is an Linksys 1900 ACS (v2) with DD-WRT.

I am considering two options.

  1. Acquire a 2nd router. Place the secure subnet as a leg on the insecure router, intended for personal devices, LAN, etc.
  2. Acquire a new with complete subnet support, such that I can achieve the same thing, but with one router instead of nesting two.

My terminology is as follows
insecure - smart devices, server, smart tv, phones and stuff
secure - LAN devices, PC's, trusted devices.

Any recommendations? Thanks!

08:15:12
@pepin:globohomo.co@pepin:globohomo.coWhy not just create a new vlan and setup second wireless SSID?08:18:43
@splintter:matrix.orgAndreasUnsure if the smart stuff will work, since I am unsure if network isolation works, eg. the smart devices are allowed to connect to home assistant08:24:56
@pepin:globohomo.co@pepin:globohomo.coDd-wrt has a firewall08:26:12
@splintter:matrix.orgAndreasA firewall for external to internal connections. Therefore, internal traffic can just run loose and connect to anything. That's why I'd want to isolate the networks for trusted and untrusted devices.08:32:03
@warped:linuxdelta.comWarpedIf you don't trust VLANs and firewalls to work, then the only solution is 2 internet lines. Otherwise, you need to trust something. Nothing is 100%. If someone wants to get in, they will. A provider modem/router with 2 routers plugged in, for secure and insecure, will give you all the isolation you need without much setup. Added benefits are that you can have 2 WiFi channels, so they can't interfere with each other.08:39:51
@warped:linuxdelta.comWarped(I always turn off the internet provider's WiFi, or get them to)08:41:43
@splintter:matrix.orgAndreas
In reply to @warped:linuxdelta.com
If you don't trust VLANs and firewalls to work, then the only solution is 2 internet lines. Otherwise, you need to trust something. Nothing is 100%. If someone wants to get in, they will. A provider modem/router with 2 routers plugged in, for secure and insecure, will give you all the isolation you need without much setup. Added benefits are that you can have 2 WiFi channels, so they can't interfere with each other.

Thanks. This were the answer I were looking for. May have been unclear in my question.

As my ISP, I have the option of setting up my own router, and that is what I did. Therefore, I were looking for an option of separating the devices into trusted and untrusted categories by connecting them to different wireless networks.

As for my understanding of dd-wrt, yes, it has a firewall, but I don't know how it will work for wireless devices connected attempting to connect to a machine on my LAN.

And agreed, nothing is 100%, but I can still take my steps and isolate devices I trust versus those I don't (PCs versus IoT fluff)

09:05:47
@datagoose:matrix.orgdatagoose changed their profile picture.18:35:29
26 Jan 2023
@adevries:matrix.turtlesnet.cloudadevries Andreas: Steve Gibson from the Security Now podcast has suggested in the past a 3 router setup. You've got one router for the WAN and then 2 routers downstream from that one where 1 is for the LAN and secure devices and the other is for all the IoT stuff. That way you have 2 completely separated LANs and they know nothing about each other 14:55:38
@SnarkTest:matrix.orgAtypicalKernel
In reply to @splintter:matrix.org

Hey do,
I am considering to implement a smart home with all the different thingymajobs and alike. Since I don't really trust them with potential spyware and security issues, I want to run them on their own subnet. My current router is an Linksys 1900 ACS (v2) with DD-WRT.

I am considering two options.

  1. Acquire a 2nd router. Place the secure subnet as a leg on the insecure router, intended for personal devices, LAN, etc.
  2. Acquire a new with complete subnet support, such that I can achieve the same thing, but with one router instead of nesting two.

My terminology is as follows
insecure - smart devices, server, smart tv, phones and stuff
secure - LAN devices, PC's, trusted devices.

Any recommendations? Thanks!

Personally I have always used vlans and firewalls, also I would separate slightly further into the following VLANs

  1. Admin (router/switch config, IPMI/iDrac/etc, PAW)

  2. Hostile - no internet access + restricted vlan3 access (IOT, Smart TV)

  3. Server/Services

  4. Trusted Devices - full internet access, full access to vlan 3, stateful access into vlan 2

  5. Untrusted - Internet and as needed restricted access to vlan 2 and 3

  6. Guest - Internet access only

15:35:06
@SnarkTest:matrix.orgAtypicalKernel* Personally I have always used vlans and firewalls, also I would separate slightly further into the following VLANs 1 Admin (router/switch config, IPMI/iDrac/etc, PAW) 2 Hostile - no internet access + restricted vlan3 access (IOT, Smart TV) 3 Server/Services 4 Trusted Devices - full internet access, full access to vlan 3, stateful access into vlan 2 5 Untrusted - Internet and as needed restricted access to vlan 2 and 3 6 Guest - Internet access only15:36:33
@SnarkTest:matrix.orgAtypicalKernel

I follow the concept of least privilege, if something doesn't need to talk to something it doesn't.

Also I think in threat modeling terms, so not so much trusted/untrusted but more what bad behavior do I expect and gow to mitigate said bad behavior

15:40:54
@SnarkTest:matrix.orgAtypicalKernelI also just realized I used an uncommon acronym "PAW" stands for "privileged access workstation" Also if you want to be technical there are supposed to be multiple PAWs (users/identity, network configuration, data storage/management, server admin)15:44:26

Show newer messages


Back to Room ListRoom Version: 6