SOLVED: ipfw And ping

2011-12-06 Thread Tim Daneliuk
I have a fairly restrictive firewall but I wanted to open a hole for ping and traceroute - both outbound from a NATed LAN as well as inbound to the boundary FreeBSD machine. The magic sauce turned out to be: ipfw add allow icmp from any to any icmptypes 0,3,4,8,11,12 The other insight here w

Re: ipfw And ping

2011-12-04 Thread Ian Smith
In freebsd-questions Digest, Vol 391, Issue 10, Message: 25 On Sun, 04 Dec 2011 01:44:53 -0600 Tim Daneliuk wrote: > On 12/04/2011 01:04 AM, Ian Smith wrote: > > > > > > For one, google 'icmp redirect attack' > > But isn't that handled by setting: > > > net.inet.icmp.drop_redire

Re: ipfw And ping

2011-12-03 Thread Tim Daneliuk
On 12/04/2011 01:04 AM, Ian Smith wrote: For one, google 'icmp redirect attack' But isn't that handled by setting: net.inet.icmp.drop_redirect=1 # This is the ICMP rule we generally use: # ipfw add 10 allow icmp from any to any in icmptypes 0,3,4,11,12,14,16,18 Hmmm I just t

Re: ipfw And ping

2011-12-03 Thread Ian Smith
In freebsd-questions Digest, Vol 391, Issue 9, Message: 9 On Fri, 02 Dec 2011 10:35:45 -0600 Tim Daneliuk wrote: > On 12/01/2011 05:45 PM, Jon Radel wrote: > > > > On 12/1/11 6:25 PM, Tim Daneliuk wrote: > > > >> ${FWCMD} add allow icmp from any to any > >> > >> It does work but, two quest

Re: ipfw And ping

2011-12-02 Thread Коньков Евгений
Здравствуйте, Tim. Вы писали 2 декабря 2011 г., 1:25:04: TD> I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. TD> Pings were not getting through so I added this near the top TD> of the rule set: TD># TD># Allow icmp TD># TD>${FWCMD} add allow icmp fr

Re: ipfw And ping

2011-12-02 Thread Tim Daneliuk
On 12/01/2011 05:45 PM, Jon Radel wrote: On 12/1/11 6:25 PM, Tim Daneliuk wrote: I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. Pings were not getting through so I added this near the top of the rule set: # # Allow icmp # ${FWCMD} add allow icmp from any to any

Re: ipfw And ping

2011-12-02 Thread Jon Radel
On 12/1/11 6:25 PM, Tim Daneliuk wrote: I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. Pings were not getting through so I added this near the top of the rule set: # # Allow icmp # ${FWCMD} add allow icmp from any to any It does work but, two questions: 1) Is

Re: ipfw And ping

2011-12-01 Thread Robert Bonomi
Tim Daneliuk wrote: > To: Robert Bonomi > Subject: Re: ipfw And ping > > On 12/01/2011 09:12 PM, Robert Bonomi wrote: > >> From tun...@tundraware.com Thu Dec 1 20:57:55 2011 > >> Date: Thu, 01 Dec 2011 20:56:03 -0600 > >> > >> Both. > >

Re: ipfw And ping

2011-12-01 Thread Tim Daneliuk
On 12/01/2011 08:56 PM, Robert Bonomi wrote: Similarly, I let the firewall respond to pings adressed to it's _external_ interface, but silently drop anything addressed any further inside my network. (If they can _reach_ my firewall, then a problem, whatever it is, *is* 'my problem' and that's

Re: ipfw And ping

2011-12-01 Thread Tim Daneliuk
On 12/01/2011 08:56 PM, Robert Bonomi wrote: From owner-freebsd-questi...@freebsd.org Thu Dec 1 17:27:19 2011 Date: Thu, 01 Dec 2011 17:25:04 -0600 From: Tim Daneliuk To: FreeBSD Mailing List Subject: ipfw And ping I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. Pings

Re: ipfw And ping

2011-12-01 Thread Robert Bonomi
> From owner-freebsd-questi...@freebsd.org Thu Dec 1 17:27:19 2011 > Date: Thu, 01 Dec 2011 17:25:04 -0600 > From: Tim Daneliuk > To: FreeBSD Mailing List > Subject: ipfw And ping > > I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. > Pings were

Re: ipfw And ping

2011-12-01 Thread Michael Sierchio
You can rate-limit pings and other icmp with sysctl nodes (sysctl net.inet.icmp ) You can make the rule a little more restrictive: add allow icmp from any to any icmptypes 0,3,8,11 if you want to disallow echo requests, omit 8 - the others are essential for most things to work properly or to dia

ipfw And ping

2011-12-01 Thread Tim Daneliuk
I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. Pings were not getting through so I added this near the top of the rule set: # # Allow icmp # ${FWCMD} add allow icmp from any to any It does work but, two questions: 1) Is there a better way? 2) Will this c