I have an RPi4 connected to a fibre WAN.
- OpenWrt 22.03.5 r20134-5f15225c1e / LuCI openwrt-22.03 branch git-23.292.78392-9f66674
from which I forward 80/443 to
- HAproxy VM[192.168.1.1/24] on proxmox (in order to route http, and manage LEcerts), and then a few Debian 10,11,12 VMs/LXCs for web services [192.168.1.10-16/24].
another RPi4 connected using pihole as DNS/DHCP/adblock [192.168.1.3/24]
Outgoing traffic is fine and VPN is fine. I have not made any network changes (that I can remember anyway), but in the last couple of days/weeks (not sure when it changed since I can normally just work via the WG VPN I have from home->work) I notice that I cannot access 80/443 from external.
Even a simple nc -vz <IP> 80
fails. Anything via WG works perfectly.
It COULD be that my ISP has decided to block these but I just wanna make sure that my configs are screwed up before I start a fight with them unnecessarily.
Is there anything glaringly wrong here?
(I have clipped out the detailed configs from some of the rules where they are stock-std unchanged)
root@openwrt:~# cat /etc/config/firewall
config defaults
option syn_flood '1'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
config rule
option name 'Allow-Ping'
config rule
option name 'Allow-IGMP'
config rule
option name 'Allow-DHCPv6'
config rule
option name 'Allow-MLD'
config rule
option name 'Allow-ICMPv6-Input'
config rule
option name 'Allow-ICMPv6-Forward'
config rule
option name 'Allow-IPSec-ESP'
config rule
option name 'Allow-ISAKMP'
config zone
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option family 'ipv4'
list network 'wg_s2s_a'
list device 'wg_s2s_a'
option name 'WG'
config forwarding
option dest 'lan'
option src 'WG'
config forwarding
option src 'lan'
option dest 'WG'
config rule
option dest_port '80'
option name 'http80'
option target 'ACCEPT'
option proto 'tcp udp'
option family 'ipv4'
option dest '*'
option src '*'
config rule
option dest_port '443'
option name 'https443'
option target 'ACCEPT'
option proto 'tcp udp'
option family 'ipv4'
option dest '*'
option src '*'
config redirect
option dest_port '80'
option src 'wan'
option target 'DNAT'
option proto 'tcp udp'
option src_dport '80'
option name 'roxyHTTP'
option dest_ip '192.168.1.1'
option dest 'lan'
config rule
option dest 'lan'
option target 'ACCEPT'
option name 'WGvpn-in'
option family 'ipv4'
option src 'WG'
config redirect
option dest_port '443'
option src 'wan'
option src_dport '443'
option target 'DNAT'
option dest 'lan'
option name 'roxyHTTPS'
option dest_ip '192.168.1.1'
config rule
option src 'wan'
option name 'IPv6'
option family 'ipv6'
option target 'DROP'
option dest 'lan'
list proto 'all'
config rule 'wg_s2s_51820'
option name 'Allow-WireGuard-51820'
option src 'wan'
option dest_port '51820'
option proto 'udp'
option target 'ACCEPT'
root@openwrt:~# cat /etc/config/network
config interface 'loopback'
config globals 'globals'
option ula_prefix 'fd13:6652:efb1::/48'
config interface 'lan'
option proto 'static'
option netmask '255.255.255.0'
list dns '192.168.1.3'
option device 'br-lan'
option ipaddr '192.168.1.254'
config interface 'wan'
option proto 'pppoe'
option password '*******'
option username '*******'
list dns '192.168.1.3'
option peerdns '0'
option device 'eth1'
option ipv6 '0'
config interface 'wg_s2s_a'
option proto 'wireguard'
option private_key '************************'
option listen_port '51820'
config wireguard_wg_s2s_a 's2s_vpn_site_b'
option public_key '************************'
option preshared_key '************************'
option description 'Site B'
option route_allowed_ips '1'
option persistent_keepalive '25'
option endpoint_port '51820'
list allowed_ips '192.168.99.0/24'
config device
option name 'br-lan'
option type 'bridge'
list ports 'eth0'