OK, I actually have more than a couple questions.  I'm basically
pursuing two IPF-related topics.  The first should be relatively easy to
address.

        First of all, I'm contemplating upgrading an OpenBSD-based firewall.
Is IPF supported with the most recent stable OpenBSD release (i.e. v4.1 as I
compose this message)?  If so, what version of IPF would be the most stable?
(FWIW, I prefer IPF over pf.)

        I'm conceptualizing a network authentication system for people
accessing a firewalled network from "outside."  I'm hoping to code things via
various scripting mechanisms, rather than compiling anything.  The UI is
planned to be a Web page.  The idea is that the remote user hits a secure Web
form requiring authentication. Upon successful login, the Web server "back-
end" will initiate addition of a few IPF rules into the authentication table,
presumably via...

% echo "<ipf-rule1>[\n<ipf-rule2>[etc.]]"|ipf -P -f -

I am inferring from ipf(5) that the above will work with a pre-defined preauth
rule (or set of such rules), but it's not exactly clear to me how.  For
example, "-P" creates a "temporary" entry in the authentication rule table.
What defines the lifespan of the entry?  If that's left to me, do I just need
to subsequently repeat the above with the "-r" flag?  A typical rule set for a
protocol I might want to handle this way currently looks something like this
(using MS Remote Desktop as an example):

block return-rst in quick on fxp0 proto tcp \
 from any to any port = 3389  head 3389
# Miscreants we don't care about
block return-rst in quick proto tcp \
 from <remote-CIDR> to any flags S/SAFR group 3389
[...etc...]
# Allow access to local net.
pass  in log first quick proto tcp \
 from any to <local-CIDR> flags S/SAFR keep state keep frags group 3389

Could I merely modify that last pass rule to use the same syntax, only starting
it with "preauth" instead of "pass" and then use the above ipf command to
include a pass rule citing the specific IP address from which the remote user
authenticated?  I would also be interested in transitioning to this solution
for a short time.  Assuming all that's necessary is the switch from "pass" to
"preauth", could I add a subsequent "pass" rule (identical to the one above)
immediately after the preauth rule to allow "unauthenticated" access for a
time?

Thanks for your consideration,
Mike
-- 
         Michael T. Davis  (Mike)        |    Systems Specialist: CBE,MSE
    E-mail: [EMAIL PROTECTED]   | Departmental Networking/Computing
           -or- [EMAIL PROTECTED]          |     The Ohio State University
 http://www.ecr6.ohio-state.edu/~davism/ |     197 Watts, (614) 292-6928

Reply via email to