At 14:14:46.15 on 11-AUG-2007 in message
<[EMAIL PROTECTED]>, I wrote:

>       OK, I actually have more than a couple questions.  I'm basically
>pursuing two IPF-related topics.  The first should be relatively easy to
>address.
>
>       First of all, I'm contemplating upgrading an OpenBSD-based firewall.
>Is IPF supported with the most recent stable OpenBSD release (i.e. v4.1 as I
>compose this message)?  If so, what version of IPF would be the most stable?
>(FWIW, I prefer IPF over pf.)
>
>       I'm conceptualizing a network authentication system for people
>accessing a firewalled network from "outside."  I'm hoping to code things via
>various scripting mechanisms, rather than compiling anything.  The UI is
>planned to be a Web page.  The idea is that the remote user hits a secure Web
>form requiring authentication. Upon successful login, the Web server "back-
>end" will initiate addition of a few IPF rules into the authentication table,
>presumably via...
>
>% echo "<ipf-rule1>[\n<ipf-rule2>[etc.]]"|ipf -P -f -
>
>I am inferring from ipf(5) that the above will work with a pre-defined preauth
>rule (or set of such rules), but it's not exactly clear to me how.  For
>example, "-P" creates a "temporary" entry in the authentication rule table.
>What defines the lifespan of the entry?  If that's left to me, do I just need
>to subsequently repeat the above with the "-r" flag?  A typical rule set for a
>protocol I might want to handle this way currently looks something like this
>(using MS Remote Desktop as an example):
>
>block return-rst in quick on fxp0 proto tcp \
> from any to any port = 3389  head 3389
># Miscreants we don't care about
>block return-rst in quick proto tcp \
> from <remote-CIDR> to any flags S/SAFR group 3389
>[...etc...]
># Allow access to local net.
>pass  in log first quick proto tcp \
> from any to <local-CIDR> flags S/SAFR keep state keep frags group 3389
>
>Could I merely modify that last pass rule to use the same syntax, only
> starting
>it with "preauth" instead of "pass" and then use the above ipf command to
>include a pass rule citing the specific IP address from which the remote user
>authenticated?  I would also be interested in transitioning to this solution
>for a short time.  Assuming all that's necessary is the switch from "pass" to
>"preauth", could I add a subsequent "pass" rule (identical to the one above)
>immediately after the preauth rule to allow "unauthenticated" access for a
>time?
>[...]

        With regard to OpenBSD 4.1 support, Darren responded...

<Hmmm, I'll look into this and get back to you in a week with some patches.
<The major issue is usually all of the device major/minor files that need
<t be fiddled with.
<
<I'm a bit short for time right now, so I'll answer the rest of your
<question later.

I'm (also) still looking for answers and/or documentation for the
authentication-related questions.

Thanks for your consideration,
Mike
-- 
                                         |    Systems Specialist: CBE,MSE
         Michael T. Davis (Mike)         | Departmental Networking/Computing
 http://www.ecr6.ohio-state.edu/~davism/ |     The Ohio State University
                                         |     197 Watts, (614) 292-6928

Reply via email to