Tom,

that worked like a charm. Thank you very much!

Best regards,
Dorian

On 13 October 2017 at 19:27, Tom Eastep <teas...@shorewall.net> wrote:
> On 10/13/2017 01:53 AM, Dorian Kind wrote:
>> Hi all,
>>
>> I'm a happy shorewall user since 2009 and never had an issue that I
>> couldn't solve using the excellent documentation. There's just one thing
>> that always bugged me. We have a couple of tunnels to branch offices,
>> for which shorewall inserts the appropriate iptables rules (webr being
>> the local zone, while the *pn zones are connected over IPsec tunnels):
>>
>> Chain webr_frwd (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>> [...]
>>  759K  121M webr2gvapn  all  --  *      eth-ext1  0.0.0.0/0
>> <http://0.0.0.0/0>            10.50.0.0/16 <http://10.50.0.0/16>
>> policy match dir out pol ipsec
>> 6660K 4097M webr2swlpn  all  --  *      eth-ext1  0.0.0.0/0
>> <http://0.0.0.0/0>            10.60.0.0/16 <http://10.60.0.0/16>
>> policy match dir out pol ipsec
>>   18M   66G webr2fnopn  all  --  *      eth-ext1  0.0.0.0/0
>> <http://0.0.0.0/0>            10.70.0.0/16 <http://10.70.0.0/16>
>> policy match dir out pol ipsec
>> 4961K 6804M webr2hyppn  all  --  *      eth-ext1  0.0.0.0/0
>> <http://0.0.0.0/0>            10.80.0.0/16 <http://10.80.0.0/16>
>> policy match dir out pol ipsec
>> 99227  134M webr2rwvpn  all  --  *      eth-ext1  0.0.0.0/0
>> <http://0.0.0.0/0>            10.100.0.0/16 <http://10.100.0.0/16>
>>  policy match dir out pol ipsec
>>
>> However, in order to prevent local traffic from leaking out when the
>> IPsec SA can't be established for some reason, I use a script to insert
>> the following two rules after shorewall has generated its
>> ruleset--because per policy, local (webr) traffic to the internet is
>> allowed:
>>
>> iptables -I OUTPUT -d 10.0.0.0/8 <http://10.0.0.0/8> --out-interface
>> eth-ext1 -m policy --pol none --dir out -j REJECT --reject-with
>> icmp-admin-prohibited
>> iptables -I FORWARD -d 10.0.0.0/8 <http://10.0.0.0/8> --out-interface
>> eth-ext1 -m policy --pol none --dir out -j REJECT --reject-with
>> icmp-admin-prohibited
>>
>> I would really like to integrate these rules into the shorewall
>> configuration, but can't figure out any way to do it. From what I can
>> tell, shorewall-rules does not have policy match options.
>>
>> Is there a canonical way to prevent RFC1918-addressed, non IPsec
>> encrypted packets from leaving the FW on an external interface?
>>
>
> You can simply put the rules in your rules file as:
>
> ?SECTION ALL
> REJECT(icmp-admin-prohibited)   webr    net:10.0.0.0/8
>
> (assumes that 'webr' is your local LAN and 'net' is the Internet zone)
>
> The jumps to the *webr2net chains specify "-m policy --pol none --dir
> out" and the rules will be in those chains.
>
> -Tom
> --
> Tom Eastep        \   Q: What do you get when you cross a mobster with
> Shoreline,         \     an international standard?
> Washington, USA     \ A: Someone who makes you an offer you can't
> http://shorewall.org \   understand
>                       \_______________________________________________
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> _______________________________________________
> Shorewall-users mailing list
> Shorewall-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to