Category: Uncategorized

Status Update

Hey guys,
The volunteer staff here at Marbled Fennec Networks have been busy over
the past few days processing various updates and changes to our network
and policies.

First thing that you will notice is that as of March 25th, we are no longer
allowing project members to use their own DNS servers when on network. This
change has come about due to someone who couldnā€™t behave and decided to make
an attempt at going places they shouldnā€™t go. As a result, everyone using the
projectā€™s network will now have to rely on our internal DNS service which has
filtering deployed against unwanted domains and as a step further, we are
working towards deploying IPv4/v6 blocklist against known problematic subnets
and content servers. While we really do try to stay positioned as a neutral
carrier, we cannot allow the actions of our members to possibly put the project
in a bad light with our upstream providers. Sorry.

The second thing that is going on in the background is that we are looking into
setting up QoS based on data moved. This has been a manual process for a while,
but we are toying with the thought of automating it since we now have an NMS setup
that provides decent accounting and has an API that we can use.

The third thing that is being discussed is that we might, in the future, make it a
requirement for project members that the first address in their routed IPv6 subnet
is used as a PTR record to identify their subnet and traffic. For most subnets, we
do not use the ::0 address and instead place our router on ::1 and the memberā€™s
first client on ::2 and so on. If the volunteer staff do vote on this policy, the
::0 address will always get a PTR record created to the effect of something like
ā€œdevice_name.member_handle.marbledfennec.netā€. This will help identify who the
traffic belongs to as well as which network provider it came from for the outside
world, should anything unwanted occur. With us picking up more members and seeing
more traffic routed through us, it might be time to consider accountability on
both ends of the tunnel.

Anywho, yea, that is what we have been up to.

Skylar goofed upā€¦

You would think that I would be aware of the order of parsing for
firewall rules when placing them into effect at four in the morningā€¦
Apparently not. I apologize for the issues this caused in routing and
I have swapped the rules into the correct order for processing DNS
queries on our network.

If you guys notice that things break, please email me when you first
notice that it is broken! I want to keep the ship afloat and as you
guys can see, without extra eyes on the project, I sometimes make mistakes.

ā€”
Something else we are trying out and seeing how it works out with the DNS
resolver. Under the old method, domains that were blocked would simply be
responded to as 0.0.0.0 which makes the client have to timeout after a
while when loading webpages. On Catos, we are piloting the use of the
NXDOMAIN flag to see if it results in a better user experience when browsing
webpages that may have some of their content blocked by the DNS filtering.

Firewall changes, network tooling and more

Hey guys,
We made changes to our firewall rules as of today. Going forward,
the project will default to implementing rules that should provide
isolation between subnets. This has been on the road map for a
while but was a back burner task compared to getting the rest of the
network up and running.

We also finally have deployed a network management console internally
that is now handling network usage data for accounting and keeping an
eye on who is doing what on the network. Insight like this is a very
valuable tool that will help us plan future upgrades as well as spot
any potential issues in the network earlier.

Something that was overlooked during the planning and deployment phase
of our network was that we were allowing port 25 and port 465 to be used
on our network and it was something that just slipped our minds for a
long while. This has been corrected as of today. We are now dropping these
ports at the edge and on our wireguard interfaces. Project members are not
allowed to host mail servers on our network. The terms of service and
network management policies have been updated to reflect this change.

In addition, we have brought on a few more project members, which means
a few more /64 subnets have been setup for routing. Pretty cool to see
others taking notice of what we have built out over the past few years!