This might sound very nooby, and no; I was not hacked by the secret underground bahn but yesterday something bad happened:
Testing OpenVPN server, messing around with lots of
e.g.
uci set firewall.@forwarding[-1].dest="lan"
uci commit firewall
and deleting a "newzone" firewall zone leaded to the loss of all networks in the zone config. E.g.:
In Luci interfaces, all interfaces were coloured with white / no colour instead of green and red.
In Zenmap all ports were open and also Luci was accessible on the internet.
I mean, even if I clicked around too fast and maybe did nooby things, how can this happen? And even if it is possible under certain circumstances, the "system" must avoid configurations getting active with settings like option network ' '
This was a OPENWRT-CON 2 alert condition (sound exciting, doesn't it) and I need to avoid it in future.
The system cannot decide whether such a configuration was intentional or not. The sole space char in the network list indicates that LuCI removed the items there. Maybe because you deleted and recreated interfaces via the ui.
Since you do not exactly remember what you did, it is unlikely that we'll reach further conclusions.
is there a situation where this kind of configuration makes sense? Should an active interface exist without being assigned to a firewall zone? option network ' '
The interfaces were always existing, but temporarily "white" - not assigned to a zone.
But this would be the solution to avoid the issue that WAN is completely open to the internet?
If there is no interface selected in the dropbear config is this then also the default which applies?
But still better close down all access instead of opening all interfaces...
There's no ideal solution.
The issue of potential device bricking has higher priority than potential permissive firewall policy.
And note that it is only relevant to modified network/firewall configuration when modification is performed without verification.