Per Phil Dibowitz's suggestion:

Attached is an altered version of my ipf.conf file. It is only altered to change the real IPs to bogus IPs for protection / paranoia. Realizing the confusion introduced by bogus IPs, our subnet is 70 (xxx.xxx.70.xx). So, in my previous Email, substitute all references to subnet 78 with subnet 70 (ipmonlog, etc.) 
 
Phil is right. As shown in the attached file, blocks are done by Rule 18: block in log all 
 
Thanks, in advance, for any help that you may offer. 
 
Charles 
 
-----Original Message----- 
From: Phil Dibowitz <[EMAIL PROTECTED]> 
To: IP Filter <[email protected]> 
Sent: Sun, 17 Jun 2007 6:57 pm 
Subject: Re: IPFilter 4.1.13 on Solaris 8 ... What am I missing? 
 
 
[EMAIL PROTECTED] wrote: 
 
As described below, I am still unable to deploy IPFilter because it 
blocks communication among trusted hosts within my domain. Since the 
Email below, I've explicitly coded "pass in quick ..." statements for 
each IP address in my subnet, yet blocks still occur. 
 
What am I missing? 
 
According to these lines: 
 
Computer 123.456.78.11: 
29/11/2006 12:16:35.785428 eri0 @0:18 b 123.456.78.59,52740 -> 
123.456.78.11,32772 PR tcp len 20 40 -AF IN 
29/11/2006 12:16:36.713333 eri0 @0:18 b 123.456.78.59,52740 -> 
123.456.78.11,32772 PR tcp len 20 40 -AF IN 
 
It's blocked by rules 18, and NOT by OOW. Since you haven't included 18 
rules, I suspect you're not giving us your whole ruleset. Without your whole 
ruleset, people are unlikely to look into this very far. 
 
-- 
Phil Dibowitz [EMAIL PROTECTED]
Open Source software and tech docs Insanity Palace of Metallica 
http://www.phildev.net/ http://www.ipom.com/ 
 
"Never write it in C if you can do it in 'awk'; 
Never do it in 'awk' if 'sed' can handle it; 
Never use 'sed' when 'tr' can do the job; 
Never invoke 'tr' when 'cat' is sufficient; 
Avoid using 'cat' whenever possible" -- Taylor's Laws of Programming 
 
 
________________________________________________________________________ 

Check Out the new free AIM(R) Mail -- 2 GB of storage and industry-leading spam and email virus protection. 


________________________________________________________________________
Check Out the new free AIM(R) Mail -- 2 GB of storage and industry-leading spam and email virus protection.
# Block selected broadcasts w/o logging:
  block in quick         proto udp from any to 123.456.71.255 port = 631  # 
Printer broadcast
  block in quick         proto udp from any to 123.456.71.255 port = 137  # 
Netbios
  block in quick         proto udp from any to 123.456.71.255 port = 138  # 
Netbios
  block in quick         proto udp from any to 123.456.71.255 port = 139  # 
Netbios
  block in quick         proto udp from any to 255.255.255.255            #
  block in quick         proto tcp from any to any            port = 135  # 
Netbios
  block in quick         proto udp from any to any            port = 137  # 
Netbios
  block in quick         proto udp from any to any            port = 138  # 
Netbios
  block in quick         proto tcp from any to any            port = 139  # 
Netbios
  block in quick         proto udp from any to any            port = 1026 # 
CAP: Calendar Access Protocal
  block in quick         proto udp from any to any            port = 1027 # 
CAP: Calendar Access Protocal
  block in quick         proto 2 from any to 224.0.0.1                    # 
Broadcast from 123.456.68.1
  block in quick         proto tcp/udp from any to any        port = 445  # 
Microsoft-DS
  block in quick         proto tcp/udp from any to any        port = 1433 # 
MS-SQL-Server
  block in quick         proto tcp/udp from any to any        port = 1434 # 
MS-SQL-Monitor
  block in quick         proto tcp/udp from any to any        port = 4899 # 
RAdmin
  block in quick         proto tcp/udp from any to any        port = 3306 # 
MySQL

# Outbound packets:
# pass out log all      # Debug
  pass out     all      # 
  pass out                  proto icmp from any to any keep state
# Corrects traceroute failure and intermitent OOW packets from being blocked 
(Hmmm ... maybe?):
  pass out                  proto tcp/udp from any to any keep state keep frags

# Inbound packets:
# pass in  log all      # Debug
# If you're not on the list, you're not getting in ...
  block in log all

# Trusted needed hosts:
# Subnet gateway -
  pass in     quick proto tcp from 123.456.68.1 to any flags S keep state
  pass in     quick proto udp from 123.456.68.1 to any keep state
# NTP - 
  pass in     quick proto tcp from 123.456.1.201 to any flags S keep state
  pass in     quick proto udp from 123.456.1.201 to any keep state
  pass in     quick proto tcp from 123.456.1.202 to any flags S keep state
  pass in     quick proto udp from 123.456.1.202 to any keep state
  pass in     quick proto tcp from 123.456.1.203 to any flags S keep state
  pass in     quick proto udp from 123.456.1.203 to any keep state
  pass in     quick proto tcp from 123.456.1.204 to any flags S keep state
  pass in     quick proto udp from 123.456.1.204 to any keep state
# NAS -
  pass in     quick proto tcp from 123.456.161.16 to any flags S keep state
  pass in     quick proto udp from 123.456.161.16 to any keep state
# DNS - 
  pass in     quick proto tcp from 123.456.247.34 to any flags S keep state
  pass in     quick proto udp from 123.456.247.34 to any keep state
  pass in     quick proto tcp from 123.456.247.66 to any flags S keep state
  pass in     quick proto udp from 123.456.247.66 to any keep state
  pass in     quick proto tcp from 123.456.247.98 to any flags S keep state
  pass in     quick proto udp from 123.456.247.98 to any keep state
# WINS (for Samba) -
  pass in     quick proto tcp from 123.456.162.243 to any flags S keep state
  pass in     quick proto udp from 123.456.162.243 to any keep state
  pass in     quick proto tcp from 123.456.162.242 to any flags S keep state
  pass in     quick proto udp from 123.456.162.242 to any keep state

# Allow access to all services from our subnet:
  pass in     quick proto tcp from 123.456.70.0/26  to any flags S keep state   
        # 70.0 -70.63
  pass in     quick proto udp from 123.456.70.0/26  to any keep state           
        # 70.0 -70.63
  pass in     quick proto tcp from 123.456.70.64/27 to any flags S keep state   
        # 70.64-70.95
  pass in     quick proto udp from 123.456.70.64/27 to any keep state           
        # 70.64-70.95
  pass in     quick proto tcp from 123.456.70.96/28 to any flags S keep state   
        # 70.96-70.99
  pass in     quick proto udp from 123.456.70.96/28 to any keep state           
        # 70.96-70.99

# Allow SSH access   from selected IPs:
  pass in     quick proto tcp from 123.456.0.0/16  to any port = 22 flags S 
keep state   # incoming
  pass in     quick proto tcp from any port = 22   to any           flags S 
keep state   # outgoing


# Allow ICMP (ping, traceroute, etc.)
  pass in     quick proto icmp all keep state

# Allow SMTP (mail) -
# pass in     quick proto tcp from any to any port = 25 flags S keep state

# Debug: Allow traffic from any local host:
# pass in log quick           from 123.456.0.0/16  to any keep state
##pass in     quick           from 123.456.0.0/16  to any keep state
# pass in log quick           from 123.456.0.0/16  to any keep state
##pass in     quick           from 123.456.0.0/16  to any keep state

# Allow HTTP
# pass in     quick proto tcp from any to any port = 80 flags S keep state

Reply via email to