I have three clients behind my FreeBSD gateway/firewall. Two of the clients run 
FreeBSD and the other 
runs FreeBSD and Windows.  I would like for my firewall to be fairly tight, 
disallowing unspecified 
connections outbound. However, while I have no trouble getting most services up 
and running correctly
(qmail,apache,ssh,etc.), I am having trouble getting fetch (for portupgrade) to 
get through the 
firewall. I have tried 'fetch -p', which doesn't seem to work.  My question is, 
is it going to be 
possible to maintain a restrictive firewall and still have the ability to 
upgrade my ports from the 
inside clients?  Below is my  firewall (a slightly edited version of the one 
available in the handbook).

00005 allow ip from any to any via fxp0
00010 allow ip from any to any via lo0
00014 divert 8668 ip from any to any in via xl0
00015 check-state
00020 skipto 800 udp from any to X.X.X.X dst-port 53 out via xl0 keep-state
00021 skipto 800 udp from any to X.X.X.X dst-port 53 out via xl0 keep-state
00030 skipto 800 udp from any to X.X.X.X dst-port 67 out via xl0 keep-state
00040 skipto 800 tcp from any to any dst-port 80 out via xl0 setup keep-state
00050 skipto 800 tcp from any to any dst-port 443 out via xl0 setup keep-state
00060 skipto 800 tcp from any to any dst-port 25 out via xl0 setup keep-state
00061 skipto 800 tcp from any to any dst-port 110 out via xl0 setup keep-state
00070 skipto 800 tcp from me to any out via xl0 setup uid root keep-state
00080 skipto 800 icmp from any to any out via xl0 keep-state
00090 skipto 800 tcp from any to any dst-port 37 out via xl0 setup keep-state
00100 skipto 800 tcp from any to any dst-port 119 out via xl0 setup keep-state
00105 skipto 800 tcp from any to any dst-port 20,21 out via xl0 setup keep-state
00110 skipto 800 tcp from any to any dst-port 22 out via xl0 setup keep-state
00120 skipto 800 tcp from any to any dst-port 43 out via xl0 setup keep-state
00130 skipto 800 udp from any to any dst-port 123 out via xl0 keep-state
00300 deny ip from 192.168.0.0/16 to any in via xl0
00301 deny ip from 172.16.0.0/12 to any in via xl0
00303 deny ip from 127.0.0.0/8 to any in via xl0
00304 deny ip from 0.0.0.0/8 to any in via xl0
00305 deny ip from 169.254.0.0/16 to any in via xl0
00306 deny ip from 192.0.2.0/24 to any in via xl0
00307 deny ip from 204.152.64.0/23 to any in via xl0
00308 deny ip from 224.0.0.0/3 to any in via xl0
00315 deny tcp from any to any dst-port 113 in via xl0
00320 deny tcp from any to any dst-port 137 in via xl0
00321 deny tcp from any to any dst-port 138 in via xl0
00322 deny tcp from any to any dst-port 139 in via xl0
00323 deny tcp from any to any dst-port 81 in via xl0
00330 deny ip from any to any frag in via xl0
00332 deny tcp from any to any established in via xl0
00360 allow udp from X.X.X.X to any dst-port 68 in via xl0 keep-state
00370 allow tcp from any to me dst-port 80 in via xl0 setup limit src-addr 2
00380 allow tcp from any to me dst-port 22 in via xl0 setup limit src-addr 2
00390 allow tcp from any to me dst-port 25 in via xl0 setup limit src-addr 2
00400 deny log logamount 10 ip from any to any in via xl0
00450 deny log logamount 10 ip from any to any out via xl0
00800 divert 8668 ip from any to any out via xl0
00801 allow ip from any to any
00999 deny log logamount 10 ip from any to any
65535 deny ip from any to any

Any suggestions? Is is the standard solution to allow all outbound connections 
through?

Thanks,
Jason

_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to