Skip to content

Commit d504cb1

Browse files
SebaLukasPietfried
andauthored
docs: Adding an example iptables rules (EVerest#1776)
* docs: Adding an example iptables rules to ensure that internal services cannot be accessed via the powerline connection Signed-off-by: Sebastian Lukas <sebastian.lukas@pionix.de> * modul -> module, PowerLine -> powerline Signed-off-by: Sebastian Lukas <sebastian.lukas@pionix.de> * Update docs/source/how-to-guides/security-best-practices.rst Co-authored-by: Piet Gömpel <37657534+Pietfried@users.noreply.github.com> Signed-off-by: Sebastian Lukas <45936573+SebaLukas@users.noreply.github.com> --------- Signed-off-by: Sebastian Lukas <sebastian.lukas@pionix.de> Signed-off-by: Sebastian Lukas <45936573+SebaLukas@users.noreply.github.com> Co-authored-by: Piet Gömpel <37657534+Pietfried@users.noreply.github.com>
1 parent b2edf32 commit d504cb1

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

docs/source/how-to-guides/security-best-practices.rst

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,28 @@ The systemd service should start the manager process as root. It will
9191
then change the user for the child processes it forks (the modules) and
9292
set the capabilities as needed.
9393

94+
- To ensure that internal services cannot be accessed via the powerline connection,
95+
iptables can be used with the following rules. In this example the powerline module
96+
is on device seth0.
97+
98+
.. code-block::
99+
100+
ip6tables -S | grep seth0
101+
-A INPUT -i seth0 -p ipv6-icmp -j ACCEPT
102+
-A INPUT -i seth0 -p udp -m udp --dport 15118 -j ACCEPT
103+
-A INPUT -i seth0 -p tcp -m tcp --dport 50000 -j ACCEPT
104+
-A INPUT -i seth0 -p tcp -m tcp --dport 61341 -j ACCEPT
105+
-A INPUT -i seth0 -p tcp -m tcp --dport 64109 -j ACCEPT
106+
-A OUTPUT -o seth0 -p ipv6-icmp -j ACCEPT
107+
-A OUTPUT -o seth0 -p udp -m udp --sport 15118 -j ACCEPT
108+
-A OUTPUT -o seth0 -p tcp -m tcp --sport 50000 -j ACCEPT
109+
-A OUTPUT -o seth0 -p tcp -m tcp --sport 61341 -j ACCEPT
110+
-A OUTPUT -o seth0 -p tcp -m tcp --sport 64109 -j ACCEPT
111+
112+
According to the standard, port 15118 is used for SDP messages.
113+
:doc:`EvseV2G </reference/modules/EvseV2G>` uses the following ports: TCP (61341), TLS (64109).
114+
:doc:`Evse15118D20 </reference/modules/Evse15118D20>` integrates libiso15118 which uses port 50000 for TCP and TLS1.2/1.3.
115+
94116
General (non-EVerest-related) security aspects
95117
====================================================================
96118

0 commit comments

Comments
 (0)