> masquerading rules. Could somebody help me to find an example of addroute
> and delroute scripts for that case?

Here's my scripts (but I use ip-up and ip-down options, not addroute and
delroute):

Here's my initial firewall setup script, which I invoke from
/etc/rc.d/init.d/network:
#!/bin/sh

# this script is called by /etc/rc.d/init.d/network

# the ppp IP addresses
# ppp_isp_ip=$(/sbin/ifconfig ppp0 | grep inet | awk '{ print $3 }' | sed -e
s/P-t-P://)"/32"

# my LAN's address
my_lan="192.168.0.0/24"

# turn on antispoofing for all interfaces
for f in /proc/sys/net/ipv4/conf/*/rp_filter; do echo 1 > $f; done

# flush, then set all policies
ipchains -F
ipchains -P input ACCEPT
ipchains -P output ACCEPT
ipchains -P forward ACCEPT

# create user chains
ipchains -N icmp-err
ipchains -N ppp-out
ipchains -N ppp-in

# set icmp-err chain
ipchains -A icmp-err -p icmp --icmp-type destination-unreachable -j ACCEPT
ipchains -A icmp-err -p icmp --icmp-type source-quench -j ACCEPT
ipchains -A icmp-err -p icmp --icmp-type time-exceeded -j ACCEPT
ipchains -A icmp-err -p icmp --icmp-type parameter-problem -j ACCEPT

# set ppp-out chain
ipchains -A ppp-out -j DENY -l
ipchains -A ppp-out -p tcp --dport http -t 0x01 0x10
ipchains -A ppp-out -p tcp --dport telnet -t 0x01 0x10
ipchains -A ppp-out -p tcp --dport ftp-data -t 0x01 0x02
ipchains -A ppp-out -p tcp --dport nntp -t 0x01 0x02
ipchains -A ppp-out -p tcp --dport pop -t 0x01 0x02

# set ppp-in chain
ipchains -A ppp-in -s $my_lan -j DENY -l
ipchains -A ppp-in -p tcp --dport 6000:6010 -j DENY
ipchains -A ppp-in -p udp --dport 61000:65096 -j ACCEPT
ipchains -A ppp-in -p tcp --dport 1024:65096 -j ACCEPT
ipchains -A ppp-in -p udp --dport 1024:65096 -j ACCEPT
ipchains -A ppp-in -p udp -s 207.66.20.12  53 -j ACCEPT
ipchains -A ppp-in -p udp -s 207.66.20.13  53 -j ACCEPT
ipchains -A ppp-in -p tcp -s 207.66.20.12  53 -j ACCEPT
ipchains -A ppp-in -p tcp -s 207.66.20.13  53 -j ACCEPT
ipchains -A ppp-in -p icmp --icmp-type pong -j ACCEPT
ipchains -A ppp-in -p icmp -j icmp-err
ipchains -A ppp-in -s 224.0.0.10:65535 -j DENY
ipchains -A ppp-in -j DENY -l

# set input chain
ipchains -A input -i ppp0 -j DENY

# set output chain
ipchains -A output -i ppp0 -j DENY

Here's the 'ip-up' option script from diald.conf (ie, /etc/ppp/pppfw_up):
#!/bin/sh

# this script is called by diald as ip-up script

ppp_dyn_ip=$(/sbin/ifconfig ppp0 | grep inet | awk '{ print $2 }' | sed -e
s/addr://)"/32"

# load per protocol masquerading module for ftp
/sbin/insmod ip_masq_ftp

# set forwarding rules
/sbin/ipchains -A forward -i ppp0 -j MASQ
/sbin/ipchains -A forward -j DENY -l

# replace first rule in ppp-out chain
/sbin/ipchains -R ppp-out 1 -s ! $3 -j DENY

# reset input rules
/sbin/ipchains -F input
/sbin/ipchains -A input -i ppp0 -j ppp-in

# reset output rules
/sbin/ipchains -F output
/sbin/ipchains -A output -i ppp0 -j ppp-out

# add newly brought up route
/sbin/route add default gw $4 ppp0

Here's the 'ip-up' option script from diald.conf (ie, /etc/ppp/pppfw_down):
#!/bin/sh
# this script is called by diald as delroute script

# default route to tap0
/sbin/route add default gw 192.168.0.102 tap0

# unload ftp masquerading module
/sbin/rmmod ip/masq_ftp

# reset forward chain to plain ACCEPT policy
/sbin/ipchains -F forward

# reset input chain
/sbin/ipchains -F input
/sbin/ipchains -A input -i ppp0 -j DENY

# reset output chain
/sbin/ipchains -F output
/sbin/ipchains -A output -i ppp0 -j DENY





-
To unsubscribe from this list: send the line "unsubscribe linux-diald" in
the body of a message to [EMAIL PROTECTED]

Reply via email to