Files

381 lines
20 KiB
Plaintext
Raw Permalink Normal View History

Episode: 2538
Title: HPR2538: My geeky plans for the new house.
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr2538/hpr2538.mp3
Transcribed: 2025-10-19 05:03:03
---
This is HPR Episode 2538 entitled My Geeky Plans for the New House.
It is hosted by ITWI's and in about 27 minutes long and carrying an explicit flag.
The summary is, ITWI's talks about the new Geek infrastructure in his house.
This episode of HPR is brought to you by archive.org.
Support universal access to all knowledge by heading over to archive.org forward slash donate.
Support universal access to all knowledge of the new Geeky Plans for the New House.
Support universal access to all knowledge of the new Geeky Plans for the New House.
Support universal access to all knowledge of the new Geeky Plans for the New House.
Support universal access to all knowledge of the new Geeky Plans for the New House.
Support universal access to all knowledge of the new Geeky Plans for the New House.
Hey guys and girls, Nate Weiss calling from theNateWeiss.com podcast.
And since I am in between houses at the moment and running a busy company,
I don't have a lot of time to podcast.
Although I do have a lot of time to paint and I decided to combine both
and do kind of a series on being a Geek who is moving.
And in the previous shows, while I was painting this rather large living room,
I thought it would be a good idea to record a show.
So you're going to have some ambient noises from the cathedral that is not yet filled with furniture.
And you will have some this, which is the sound of the brush.
Just close your eyes.
Think of Mr. Miyagi.
I'll do a Mr. Miyagi here.
Paint on.
Paint on.
I'm doing all of the kind of, you know, karate kids stuff here.
Paint on.
Paint on.
Don't meet me in an allele.
I'm a real karate guy when I'm done with this.
That being said, I thought it would be a good idea to do a show on, you know,
being a Geek who is moving house.
So in the first chapter, installment, episode, whatever you want to call it.
Urge.
And we talked about, we talked about how I moved my cloud infrastructure to Office 365 from Google.
The second one I talked about what it's like to be a Geek was on the move,
was, you know, currently in between houses and who has to survive literally out of his backpack.
But today, in chapter three, I would like to talk to you about the new infrastructure in my new house.
Now, my philosophy is simple.
Less is more.
Although it's really nice to have a lab and God knows what amounts of geeky infrastructure to toy with.
At the end of the day, my philosophy is that I would very much like to just get things done and do those in a very productive and efficient manner.
That being said, I'm just get coffee here.
I decided to go for an optimal setup in my new house.
And that optimal setup meant that I had to redesign the network from the ground up.
Now, before we get started, coffee, I'll describe the situation.
Our new house is fairly large.
It's about 300 square meters in two floors.
So the ground floor and the floor with the bedrooms.
And we have a little building to the side, which I'm looking at right now, which is this...
I need to find a garage building with the door and two windows, which is going to be the office of our company.
These two buildings are connected via cat5 cable, so that's good.
And the challenge that I had was make sure that I get wireless coverage everywhere,
because we are cable cutters. We do not have...
We do not have just basic cable. We just only have Netflix, Wi-Fi, and that's it.
So we need pretty good Wi-Fi coverage, because there are only a few points in the house where there is a network connection.
So there's one in the living room behind the TV, which will be nice.
The ISPs router is in the garage.
And there is one connection upstairs, which also has a cat5 connection.
That's basically it.
Because I was triggered to...
That's not good, that's cold water.
Oh yeah, that's because I pressed the wrong button.
Not very smart of me.
So I'm going to get my coffee again.
So when I started to look at hardware, I first had to look at the architecture of my design,
because we have a company, and this company is an IT consultancy company,
and we give trainings in our new offices, so we are going to have guests there.
So immediately we are faced with a delicate and a nice challenge, which is,
how do you divide up your network in that new fancy house of yours,
to make sure that you can live a digital life with all of your digital devices,
and be connected to everything including your own data.
Have an office or a company that can access its data,
and that might also include foreign persons like, for example, staff,
wherever to hire them, or trainees, which I'm going to get.
And then of course there is the different blast zone, which are the strangers,
which are the people that come in here, that come here to follow one of these trainings,
which is just neat connectivity, and of course there is me, the geek,
thenightwise.com geek who likes to experiment and download and stuff like that.
So putting all of these things on one network is a bad idea.
You never know, so I decided to think long and hard how am I going to do this?
And I was inspired by the city of Carcasson.
If you don't know, the city of Carcasson, this is called too.
What the? My coffee maker is broken.
That's not good. Cold coffee. Not good at all.
Oh well, no coffee then.
So I was inspired by Carcasson. Now Carcasson is a walled city.
It's a city in the south of France that is fortified,
and that has not one, but two walls around it.
If the first wall were to be breached, there is still a second wall
to protect the city, and the attackers are caught between the first and the second wall
and they get their ass whooped.
So I thought, you know what, that would be a great way to design my infrastructure,
to have these concentric circles inside each other with increased security.
So here's what I came up with.
I have my internet connection, and right behind my internet connection
there is my ISP's modem router.
There's a modem there, and there's a router there, and it hands out IP packages
to whatever device you connect to either the LAN or the wired or the wireless ports.
And for your average Joe, this is fine.
This is absolutely fantastic, no problem.
And that is one of the places I do not ever want to put anything
that is even somewhat personal or confidential.
Because that router is managed by my ISP,
and I know what it's like when you're a tech, you have the night shift,
you're bored out of your skull, and you are thinking what to do now.
Let's poke around people's network.
Let's see what's on there.
So behind that router from my ISP,
I immediately put my own router firewall,
and my own router firewall is an edge router X by ubiquity.
If you are a network geek, you might want to consider this device,
not pushing you to buy anything, but this is pretty cool stuff.
It's really a nice piece of kit that has a lot of possibilities
for a device that is so small, that is so cheap, and yet so powerful.
It costs about 50 bucks, which is ridiculous.
And it has all of the fancy stuff that you wanted to have.
It can do, it has a firewall built-in, router, routing tables,
border gateway protocol, multiple subnets, VLAN, power over ether and that,
everything for 50 bucks.
When you think about it, it's hilarious.
I'm moving this very, very, very heavy cloth,
a piece of furniture here that is from the previous owner, and I hate it.
I hope that he will come and pick it up pretty soon,
because I don't like it.
But I have to move it, because I'm going to paint behind it.
And I'm sorry, move it again.
I have no idea how I'm going to get this out of the house without
springing major muscle like this.
Okay, so that being said, it's a great router, and that is my,
the router that protects my network.
Careful, careful, nightwise.
Try not to damage the house before you move in.
And this router basically divides my network into different zones.
And let's get back to the Carcasson analogy here.
So you have my router, my ISP's router, which is the outer defense zone of my network.
It is connected to the internet directly.
There is a firewall on there.
And, well, quite frankly, it's okay.
It's nice, you know.
No problem with that, works fine.
And that is my outer zone of defense.
It's managed by somebody else, which I don't care.
And in the zone, in the subnet behind that, which is the 192-168-1110 subnet,
I will put all of my geeky, nerdy stuff.
I will do all of my experimental stuff.
I will put some of my servers there.
I will probably have my BitTorrent client running and handing out ISOs to the world of open source distributions,
because I'm a good guy.
I like to share.
And I also do all of the experimental stuff there, no problem whatsoever.
That's my play zone.
It's a big DMZ zone.
If any, any ports get forwarded from the internet to my network,
it's going to be here in this zone, my DMZ slash play zone.
Any devices that are IoT and that do not need to be in the network of my clients,
being the technical tone, not the financial one.
I put there as well.
For example, my Plex server.
I put it there.
It's great.
I can access it from wherever.
So I can stream my Plex stuff.
I download a lot of YouTube stuff to keep and stream it off my Plex.
I like doing that.
I have archives of all backups of all of my old shows on there that I ripped from DVD legally.
It's my Plex server.
I put it there.
That's great.
Anything that is accessible to my clients that needs to be accessible without needing to be in the same subnet,
it's there.
Let me see what else is there.
Oh yeah, my Raspberry Pi whole DNS server, which I connect to when I don't want to get spammed.
That's there as well.
An SSH endpoint, so I can SSH in from anywhere and use stuff like SSH Shuttle,
which is an SSH VPN client, and set up encrypted connections from wherever I am,
all self-hosted.
That all goes into the 192 zone, and that works great.
Then, after that, there's my edge router.
And behind my edge router, there is another zone, which is the 172.16.60 zone.
And that's the zone for all of my clients.
My Macs are in there, my workstations are in there, both private and for my company.
We're only two of us. I'm not going to build different subnets for my company and for ourselves.
We don't have that. We have an integration.
So that's where all the clients live, and all the IoT devices that require those clients.
So what's there?
My Philips Hughes are there.
My Sonos player is there.
My laptops are there.
And stuff like that, all client-related stuff.
Also on there is a, and now I got a check to get the type right,
a ubiquity wireless access point that I'm going to buy a second one once we move into the offices.
And that machine has type number.
What's the type of this thing?
The APAC Pro, a professional grade SSID, and it's access point.
And the SSID that it broadcasts is the one that I use both for all of my clients related, for all of my clients.
So that's the second line, you know, that's behind my edge router here.
That's behind the second wall.
It is protected from the DMC by my edge router firewall.
And it is protected from the internet by both my router's ISP and my firewall, my edge router firewall.
And then it's time for level three.
Because what you can do with the edge router is create two subnets.
You can create one on one port, and you can create one on the other port.
You can also play around with VLANs and stuff, but I decided to go with the subnet because it gives me some possibilities.
And on there, on that second subnet, I've created, which is 172, 1650 zero, are my servers.
For example, my NAS drive.
That NAS drive houses all of the data from a company.
There is a personal server there that houses all of the data that we personally want to keep that we don't want on the company servers.
And that's there.
And those two servers are the only things that are there.
You have a very high subnet number.
I think I do a slash 20, 20 full.
I think it's slash 23.
I have to check.
So I only have two or three hosts in there.
No DHCP.
I mean, you can't accidentally plug in something to that network.
Not going to happen.
Not going to work.
And this is where my servers live.
Now, here comes the third wall of my line of defense.
Where I basically, well, close off all of the traffic to that server,
aside from the ports that I want to be open.
So port 139, I think, for Samber.
And that's it.
I have to go in ports the same thing.
Only the ports that need to be open get opened up.
So if you breach my ISP's router, well, tough.
Then you get onto my DMZ.
Then you need to breach my edge router.
And you will end up either in my, perhaps you'll,
you'll be hacking one of my clients.
You'll end up into my client lab.
Ooh, whoopty do.
You are one, you've breached one wall.
And.
But then you still need to breach the last wall.
You still need to get onto the third segment of my network,
which houses my server and all of the information there.
So the only thing that I haven't mentioned is that my clients,
including the guests that we have in our company,
that are in the 1672 60 VLAN because, well,
all of the clients are there.
But they, subnet, but they are on a separate VLAN,
which is my lost line of defense to keep out,
unwanted guests onto my servers.
So that's my setup for my new home, network-wise.
And I like the Carcasson inspiration that I got because it's really a layer of approach.
And it's something that I have been telling companies to do because they have this fancifier wall.
It protects us from the interest, from the dangers of the internet.
Yes, yes, it does.
Oh, that's my baggie.
It protects you from the danger from the internet.
That's true.
But you also have people working from home.
And these people who work from home, you know,
they just basically take their fancy laptop.
Go home.
Sorry, that's paint coming out of the back.
It's not me.
And...
Oh, it's disgusting.
I'm really sorry.
So this is the trick.
When you paint from a bucket, you know,
put a plastic bag in the bucket.
And when you're done, cut a hole in the plastic bag and squeeze out the rest of the paint
back into the paint container.
But also, always make sure that there's no one around because it makes a very...
a very, you know, icky sound.
But it does pull back the number, the amount of waste paint that you get every session
and you get to recover as much as possible.
It's so there.
Now, that being said.
So that is how networks get infected.
You have a great fancy firewall.
That's great.
And then, you know, Joe from Sales leaves home, plugs in that company laptop
onto his home network that is riddled with spyware because his oldest daughter
loves to download.
I don't know what from, I don't know where.
The machine gets infected and most of the time, they have local admin rights
because, you know, life...
An ITer's life wouldn't be interesting enough if you didn't.
And the PC gets infected.
And the next day, they come back to work.
And they just walk by your fancy firewall and plug in to your network.
And that entire investment that you made, sorry for the noise I'm cleaning my hands.
Pretty lot of paint on them though.
All the investment that you made in a fancy firewall is absolutely wasted
because people can physically walk past your firewall and plug in infected machines
into your network, which we call the dirty, dirty feet analogy.
So you have cleaned the house and people come in by the back door with muddy feet
and trample over your house.
And that's how servers get infected, you know.
In fact, you don't hack the firewall and you don't go after the server.
You just infect the stupid asshole clients and wait until he literally walks in to the company
and infect the network with that way.
So that's my approach to having a layered subnet, especially for your service,
is firewall law of the rest of the network.
And that's how I set it up here.
So even my wireless access points, that's the only place where I do do a layer two separation.
I use a separate SSID and I put them on a separate VLAN.
So they can access the internet, but they do not see the rest of my client network.
And that's my setup.
This is twofold.
It's either on one end.
It's to protect me from the people who are my guests.
I don't want people who are my guests to sniff around and, you know, learn all kinds of interesting things about my network.
I don't want somebody who is either in my class or in a lecture that I'm giving.
I use a little bit bold, which decides the wire shark or end map my entire network.
That's one, two.
I don't want my experimental stuff to come in contact with my professional activities.
I don't want to infect my network by accidentally downloading, I don't know,
somewhere, and accidentally infecting my own network and compromising my data.
So don't want that.
And I do not trust IoT devices.
Although I have a few, let's see, I have, I just scrubbed the paint off the tiles here before I leave.
Let me see.
I have two sonos, which I'm going to make.
I'm going to have three sonos soon.
I have two sonos.
I have some Philips Hughes.
I have a FOSCAM IoT webcam.
You know, stuff like that.
And these things don't always get patched right.
And sometimes they have holes.
And sometimes they get infected.
And how do you infect them?
Well, of course, with the dirty feed strategy, you just infect some windows client on the network with the Java exploits.
You scan the network for any interesting devices.
And while you use those interesting devices, you just open up some ports and what have you.
And you can do some interesting things.
You can let your malware use the IoT devices on the same network to wreak havoc.
And, you know, not something you want.
And this is not always in your control.
Because, well, probably frankly, windows and operating systems get updated on a regular basis.
But sometimes, you know, these Chinese providers of IoT devices just say,
we start going out of business.
And it never gets patched.
It never gets fixed.
And the security vulnerability inside your network continues to exist.
And that's something that you do not want.
So that's why I have my layered approach.
So in all, I still want it to be simple.
And I want it to be cheap.
I wanted to have some geeky hardware to play with without having to spend, you know, corporate bucks to get it done.
And the ubiquity devices are actually very good at doing just this.
And I am very happy with them.
And there were little bits.
They're a little harder to set up than your average.
I don't know.
Then your average dealing router.
But all in all, it went pretty fast.
I think it was up or running after 20 minutes.
And I was amazed at the possibilities that I have.
So as I scrub away a painting error that I did here.
Which is not going to come off.
I want to, you know, give you some inspiration about how I have set up my new network in my new house.
And what my philosophy is regarding all of this.
And I hope you enjoyed it.
My painting adventures for today are done.
I am off home to eat and work a little bit more.
And hopefully we'll see you soon.
You've been listening to Hacker Public Radio at HackerPublicRadio.org.
We are a community podcast network that releases shows every weekday Monday through Friday.
Today's show, like all our shows, was contributed by an HBR listener like yourself.
If you ever thought of recording a podcast, then click on our contributing to find out how easy it really is.
Hacker Public Radio was founded by the digital dog pound and the Infonomicon Computer Club.
And it's part of the binary revolution at binwreff.com.
If you have comments on today's show, please email the host directly.
Leave a comment on the website or record a follow-up episode yourself.
Unless otherwise status, today's show is released on the creative commons,
and the contribution, share a light, free to our license.