From owner-freebsd-questions@FreeBSD.ORG Mon Oct 31 14:45:53 2005 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3510C16A421; Mon, 31 Oct 2005 14:45:53 +0000 (GMT) (envelope-from keramida@ceid.upatras.gr) Received: from kane.otenet.gr (kane.otenet.gr [195.170.0.95]) by mx1.FreeBSD.org (Postfix) with ESMTP id 28F9143D60; Mon, 31 Oct 2005 14:45:47 +0000 (GMT) (envelope-from keramida@ceid.upatras.gr) Received: from flame.pc (aris.bedc.ondsl.gr [62.103.39.226]) by kane.otenet.gr (8.13.4/8.13.4/Debian-1) with SMTP id j9VEjkr4006013; Mon, 31 Oct 2005 16:45:46 +0200 Received: from flame.pc (flame [127.0.0.1]) by flame.pc (8.13.4/8.13.4) with ESMTP id j9VEjiDj002183; Mon, 31 Oct 2005 16:45:44 +0200 (EET) (envelope-from keramida@ceid.upatras.gr) Received: (from keramida@localhost) by flame.pc (8.13.4/8.13.4/Submit) id j9VEjfVV002182; Mon, 31 Oct 2005 16:45:41 +0200 (EET) (envelope-from keramida@ceid.upatras.gr) Date: Mon, 31 Oct 2005 16:45:41 +0200 From: Giorgos Keramidas To: Eric F Crist Message-ID: <20051031144541.GB2122@flame.pc> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Cc: andy@neu.net, freebsd-questions@freebsd.org, freebsd-mobile@freebsd.org Subject: Re: laptop firewall rules X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 31 Oct 2005 14:45:53 -0000 On 2005-10-30 18:23, Eric F Crist wrote: >On Oct 30, 2005, at 4:41 PM, andy@neu.net wrote: >> Does anyone have a good example of a firewall ruleset for a >> wireless interface in a laptop, or a pointer to documentation? >> I want to use IPFilter on 6.0 rc1. I want to let all >> connections out and keep state, but block all incoming from >> the outside. > > That ruleset is easy: > > ipfw add check-state > ipfw add allow tcp from me to any setup keep-state > ipfw add allow tcp from any to any established > ipfw add deny from any to me in No, please! If you are using "keep-state", when "allow all established" is hardly ever a good idea.