Re: ipfw pipes + firewall

2003-11-29 Thread Alex de Kruijff
On Sat, Nov 29, 2003 at 02:29:13PM +0800, Khairil Yusof wrote:
 On Sat, 2003-11-29 at 06:45, Alex de Kruijff wrote:
 
   00100  83 11350 pipe 1 ip from any to any out
   00200  93 11266 pipe 2 ip from any to any in
   00300   0 0 check-state
   00400   0 0 deny tcp from any to any established
   01400 103 14855 allow tcp from any to me dst-port 22 in setup keep-state
   ... more firewall rules which are being matched
 
  I find your 400 rule very strage. Rule 400 souldn't apply because they
  are passed by 300 (this one doens't have a counter :( ).
 
 I'm following the example given by ipfw(8). Rule 0400 is apparently
 supposed to block any non dynamic rules. Does rule 300 have a counter?
 I've followed both ipfw(8) and
 http://www.freebsd.org/doc/en_US.ISO8859-1/articles/dialup-firewall/rules.html

Maybe i missed it but i didn't see rule 400. As you can see from the
output it doesn't seem to do anything. That means it only takes up
process time.

I did see dst-port. Sorry for the confusion. I suppose that it being
filled in for me; it not needed to write it down.

 Im using the example from the article for my pppoe connection at home. 
 
  For rule 1400 the dst-port is wronly placed. Port are (or can be) given
  after the ip without any marker. I would replace 1400 with:
  allow tcp from any to me 22 in
  allow tcp from me 22 to any out
  No need to have dynamic rules here so place it before 300
 
 This sounds right, it would cut down on overhead of additional dynamic
 rules. So making public ports rules without dynamic rules is better? 

No you use both. Dynamic rules are use so the computer seem unreacable
from the out site (i.e. ftp, web, ect. server can not be reaced) and
seems fully open from the inside (i.e. allowing you to surf the web).

 Digging in the archives, Matthew Seaman said that dynamic rules should
 be safer, but I'm not sure if it applies for my case.
 
 I'm no security expert, so thanks for the insight.

This is how i would setup a basic firewall:
1 Reject spoofing out
2 Deny spoofing in
3 Allow wanted incomming traffic (and out again) (let say you like to
  ssh your computer from the internet or to have visitors to you website)
4 check-state
5 Allow traffic out and keep-state
6 Reject everyting out (proberbly doesn't gets any hits because of 5)
7 Deny everyting else



-- 
Alex

Articles based on solutions that I use:
http://www.kruijff.org/alex/index.php?dir=docs/FreeBSD/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


ipfw pipes + firewall

2003-11-28 Thread Khairil Yusof
I've read the man pages, and tested it out, and just want to confirm
that what Im doing is right and that I didn't miss anything.

Disable one_pass so that packets after matching pipe rule will continue
on to other rules. Without this, packets matching pipes are not not
applied again against firewall rules.

net.inet.ip.fw.one_pass: 0

I then put the pipe rules before any firewall rules so that anything
going in and out (in this case) go through the pipes first. They are
then matched by normal firewall rules.

00100  83 11350 pipe 1 ip from any to any out
00200  93 11266 pipe 2 ip from any to any in
00300   0 0 check-state
00400   0 0 deny tcp from any to any established
01400 103 14855 allow tcp from any to me dst-port 22 in setup keep-state
... more firewall rules which are being matched

From what I can see the pipe rules are being matched. I tested bandwidth
controls, and they work. And I also could not access ports which I did
have a dynamic rule for (as in 01400).

--


FreeBSD 5.2-BETA i386 
4:56pm up 20:23, 4 users, load averages: 0.99, 0.76, 0.66


signature.asc
Description: This is a digitally signed message part


Re: ipfw pipes + firewall

2003-11-28 Thread Alex de Kruijff
On Fri, Nov 28, 2003 at 09:37:06PM +0800, Khairil Yusof wrote:
 I've read the man pages, and tested it out, and just want to confirm
 that what Im doing is right and that I didn't miss anything.
 
 Disable one_pass so that packets after matching pipe rule will continue
 on to other rules. Without this, packets matching pipes are not not
 applied again against firewall rules.
 
 net.inet.ip.fw.one_pass: 0
 
 I then put the pipe rules before any firewall rules so that anything
 going in and out (in this case) go through the pipes first. They are
 then matched by normal firewall rules.
 
 00100  83 11350 pipe 1 ip from any to any out
 00200  93 11266 pipe 2 ip from any to any in
 00300   0 0 check-state
 00400   0 0 deny tcp from any to any established
 01400 103 14855 allow tcp from any to me dst-port 22 in setup keep-state
 ... more firewall rules which are being matched
 
 From what I can see the pipe rules are being matched. I tested bandwidth
 controls, and they work. And I also could not access ports which I did
 have a dynamic rule for (as in 01400).

I find your 400 rule very strage. Rule 400 souldn't apply because they
are passed by 300 (this one doens't have a counter :( ).

For rule 1400 the dst-port is wronly placed. Port are (or can be) given
afther the ip without any marker. I would replace 1400 with:
allow tcp from any to me 22 in
allow tcp from me 22 to any out
No need to have dynamic rules here so place it before 300


-- 
Alex

Articles based on solutions that I use:
http://www.kruijff.org/alex/index.php?dir=docs/FreeBSD/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: ipfw pipes + firewall

2003-11-28 Thread Khairil Yusof
On Sat, 2003-11-29 at 06:45, Alex de Kruijff wrote:

  00100  83 11350 pipe 1 ip from any to any out
  00200  93 11266 pipe 2 ip from any to any in
  00300   0 0 check-state
  00400   0 0 deny tcp from any to any established
  01400 103 14855 allow tcp from any to me dst-port 22 in setup keep-state
  ... more firewall rules which are being matched

 I find your 400 rule very strage. Rule 400 souldn't apply because they
 are passed by 300 (this one doens't have a counter :( ).

I'm following the example given by ipfw(8). Rule 0400 is apparently
supposed to block any non dynamic rules. Does rule 300 have a counter?
I've followed both ipfw(8) and
http://www.freebsd.org/doc/en_US.ISO8859-1/articles/dialup-firewall/rules.html

Im using the example from the article for my pppoe connection at home. 

 For rule 1400 the dst-port is wronly placed. Port are (or can be) given
 after the ip without any marker. I would replace 1400 with:
 allow tcp from any to me 22 in
 allow tcp from me 22 to any out
 No need to have dynamic rules here so place it before 300

This sounds right, it would cut down on overhead of additional dynamic
rules. So making public ports rules without dynamic rules is better? 

Digging in the archives, Matthew Seaman said that dynamic rules should
be safer, but I'm not sure if it applies for my case.

I'm no security expert, so thanks for the insight.

--
FreeBSD 5.2-BETA i386 
2:24pm up 11:29, 3 users, load averages: 0.22, 0.44, 0.66


signature.asc
Description: This is a digitally signed message part