Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 31 Jul 2004 14:08:04 -0400
From:      "JJB" <Barbish3@adelphia.net>
To:        "James A. Coulter" <james.coulter@cox.net>, <freebsd-questions@freebsd.org>
Subject:   RE: Firewall Rule Set not allowing access to DNS servers?
Message-ID:  <MIEPLLIBMLEEABPDBIEGEEDDGIAA.Barbish3@adelphia.net>
In-Reply-To: <000401c47721$07faf590$6e01a8c0@sabrina>

next in thread | previous in thread | raw e-mail | index | archive | help
Look back at the ipfw sample rule set and you will see that there
are both udp and tcp protocol access to DSN. Also not that udp does
not use setup keyword.

# Allow out access to my ISP's Domain name server.
# x.x.x.x must be the IP address of your ISP's DNS
# Dup these lines if your ISP has more than one DNS server
# Get the IP addresses from /etc/resolv.conf file
$cmd 00110 allow tcp from any to x.x.x.x 53 out via $pif setup
keep-state
$cmd 00111 allow udp from any to x.x.x.x 53 out via $pif keep-state

You DNS rules are
# Allow out access to my ISP's Domain name server.
# x.x.x.x must be the IP address of your ISP's DNS
# Dup these lines if your ISP has more than one DNS server
# Get the IP addresses from /etc/resolv.conf file
$cmd 020 $skip UDP from any to 68.105.161.20 53 out via $pif setup
keep-state
$cmd 021 $skip UDP from any to 68.1.18.25 53 out via $pif setup
keep-state
$cmd 022 $skip UDP from any to 68.10.16.30 53 out via $pif setup
keep-state

As you can see you have no tcp protocol statements.
Your  udp rules use setup keyword which is only for tcp rules so
your udp packets never match this rule and default to getting
blocked which is why you get log error messages and you can not
access public internet.

Also if you look closely at the first 4 ipfw log messages you will
see first message is about ip address 193.0.14.129 which is the
primary dns server pointed to by url search pn.at.cox.net   in
/etc/resolv.conf

Change your DNS rules to look like this

# Allow out access to my ISP's Domain name server.
# x.x.x.x must be the IP address of your ISP's DNS
# Dup these lines if your ISP has more than one DNS server
# Get the IP addresses from /etc/resolv.conf file
$cmd 020 $skip udp from any to 193.0.14.129 53 out via $pif
keep-state
$cmd 021 $skip udp from any to 68.1.18.25 53 out via $pif
keep-state
$cmd 022 $skip udp from any to 68.10.16.30 53 out via $pif
keep-state
$cmd 023 $skip udp from any to 68.105.161.20 53 out via $pif
keep-state
$cmd 024 $skip tcp  from any to 193.0.14.129 53 out via $pif setup
keep-state
$cmd 025 $skip tcp  from any to 68.1.18.25 53 out via $pif  setup
keep-state
$cmd 026 $skip tcp  from any to 68.10.16.30 53 out via $pif  setup
keep-state
$cmd 027 $skip tcp  from any to 68.105.161.20 53 out via $pif  setup
keep-state

-----Original Message-----
From: owner-freebsd-questions@freebsd.org
[mailto:owner-freebsd-questions@freebsd.org]On Behalf Of James A.
Coulter
Sent: Saturday, July 31, 2004 1:09 PM
To: Barbish3@adelphia.net; freebsd-questions@freebsd.org
Subject: RE: Firewall Rule Set not allowing access to DNS servers?

My LAN is configured with static IP addresses, 192.168.1.x.

I have no problems communicating within the LAN.

I have full connectivity with the internet from every machine on my
LAN when
the firewall is open.

When I use the rule set in question, I can ping and send mail but I
cannot
access the DNS servers listed in resolv.conf.

These are the same DNS servers placed in resolv.conf when the
firewall is
open.

I'm sorry, but I never said dc1 was my inside nic.

Again, I appreciate any help with this.  The files you requested
follow.

Here's my ifconfig - a:

sara# ifconfig -a
dc0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        inet 192.168.1.1 netmask 0xffffff00 broadcast 192.168.1.255
        inet6 fe80::204:5aff:fe76:55f0%dc0 prefixlen 64 scopeid 0x1
        ether 00:04:5a:76:55:f0
        media: Ethernet autoselect (100baseTX <full-duplex>)
        status: active
dc1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        inet6 fe80::2a0:ccff:fe33:e1f6%dc1 prefixlen 64 scopeid 0x2
        inet 68.105.58.150 netmask 0xfffffe00 broadcast
68.105.59.255
        ether 00:a0:cc:33:e1:f6
        media: Ethernet autoselect (100baseTX <full-duplex>)
        status: active
lp0: flags=8810<POINTOPOINT,SIMPLEX,MULTICAST> mtu 1500
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
        inet6 ::1 prefixlen 128
        inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4
        inet 127.0.0.1 netmask 0xff000000
ppp0: flags=8010<POINTOPOINT,MULTICAST> mtu 1500
sl0: flags=c010<POINTOPOINT,LINK2,MULTICAST> mtu 552
faith0: flags=8002<BROADCAST,MULTICAST> mtu 1500

Here's resolv.conf:

sara# more /etc/resolv.conf
search pn.at.cox.net
nameserver 68.105.161.20
nameserver 68.1.18.25
nameserver 68.10.16.30

Here's the entire rule set I'm trying to use.

I did follow the comments.

Please note the variable pif is set to dc1, my outside nic.

################ Start of IPFW rules file
###############################
# Flush out the list before we begin.
ipfw -q -f flush
# Set rules command prefix
cmd="ipfw -q add"
skip="skipto 800"
pif="dc1"     # public interface name of Nic card
              # facing the public internet



#################################################################
# No restrictions on Inside Lan Interface for private network
# Change xl0 to your Lan Nic card interface name
#################################################################
$cmd 005 allow all from any to any via dc0

#################################################################
# No restrictions on Loopback Interface
#################################################################
$cmd 010 allow all from any to any via lo0

#################################################################
# check if packet is inbound and nat address if it is
#################################################################
$cmd 014 divert natd ip from any to any in via $pif

#################################################################
# Allow the packet through if it has previous been added to the
# the "dynamic" rules table by a allow keep-state statement.
#################################################################
$cmd 015 check-state

#################################################################
# Interface facing Public internet (Outbound Section)
# Interrogate session start requests originating from behind the
# firewall on the private network or from this gateway server
# destine for the public internet.
#################################################################

# Allow out access to my ISP's Domain name server.
# x.x.x.x must be the IP address of your ISP's DNS
# Dup these lines if your ISP has more than one DNS server
# Get the IP addresses from /etc/resolv.conf file
$cmd 020 $skip UDP from any to 68.105.161.20 53 out via $pif setup
keep-state
$cmd 021 $skip UDP from any to 68.1.18.25 53 out via $pif setup
keep-state
$cmd 022 $skip UDP from any to 68.10.16.30 53 out via $pif setup
keep-state

# Allow out access to my ISP's DHCP server for cable/DSL
configurations.
$cmd 030 $skip udp from any to 172.19.17.22 67 out via $pif
keep-state

# Allow out non-secure standard www function
$cmd 040 $skip tcp from any to any 80 out via $pif setup keep-state

# Allow out secure www function https over TLS SSL
$cmd 050 $skip tcp from any to any 443 out via $pif setup keep-state

# Allow out send & get email function
$cmd 060 $skip tcp from any to any 25 out via $pif setup keep-state
$cmd 061 $skip tcp from any to any 110 out via $pif setup keep-state

# Allow out FBSD (make install & CVSUP) functions
# Basically give user root "GOD" privileges.
$cmd 070 $skip tcp from me to any out via $pif setup keep-state uid
root

# Allow out ping
$cmd 080 $skip icmp from any to any out via $pif keep-state

# Allow out Time
$cmd 090 $skip tcp from any to any 37 out via $pif setup keep-state

# Allow out nntp news (IE: news groups)
$cmd 100 $skip tcp from any to any 119 out via $pif setup keep-state

# Allow out secure FTP, Telnet, and SCP
# This function is using SSH (secure shell)
$cmd 110 $skip tcp from any to any 22 out via $pif setup keep-state

# Allow out whois
$cmd 120 $skip tcp from any to any 43 out via $pif setup keep-state

# Allow ntp time server
$cmd 130 $skip udp from any to any 123 out via $pif keep-state

#################################################################
# Interface facing Public internet (Inbound Section)
# Interrogate packets originating from the public internet
# destine for this gateway server or the private network.
#################################################################

# Deny all inbound traffic from non-routable reserved address spaces
$cmd 300 deny all from 192.168.0.0/16  to any in via $pif  #RFC 1918
private
IP
$cmd 301 deny all from 172.16.0.0/12   to any in via $pif  #RFC 1918
private
IP
$cmd 302 deny all from 10.0.0.0/8      to any in via $pif  #RFC 1918
private
IP
$cmd 303 deny all from 127.0.0.0/8     to any in via $pif  #loopback
$cmd 304 deny all from 0.0.0.0/8       to any in via $pif  #loopback
$cmd 305 deny all from 169.254.0.0/16  to any in via $pif  #DHCP
auto-config
$cmd 306 deny all from 192.0.2.0/24    to any in via $pif  #reserved
for
doc's
$cmd 307 deny all from 204.152.64.0/23 to any in via $pif  #Sun
cluster
$cmd 308 deny all from 224.0.0.0/3     to any in via $pif  #Class D
& E
multicast

# Deny ident
$cmd 315 deny tcp from any to any 113 in via $pif

# Deny all Netbios service. 137=name, 138=datagram, 139=session
# Netbios is MS/Windows sharing services.
# Block MS/Windows hosts2 name server requests 81
$cmd 320 deny tcp from any to any 137 in via $pif
$cmd 321 deny tcp from any to any 138 in via $pif
$cmd 322 deny tcp from any to any 139 in via $pif
$cmd 323 deny tcp from any to any 81  in via $pif

# Deny any late arriving packets
$cmd 330 deny all from any to any frag in via $pif

# Deny ACK packets that did not match the dynamic rule table
$cmd 332 deny tcp from any to any established in via $pif

# Allow traffic in from ISP's DHCP server. This rule must contain
# the IP address of your ISP's DHCP server as it's the only
# authorized source to send this packet type.
# Only necessary for cable or DSL configurations.
# This rule is not needed for 'user ppp' type connection to
# the public internet. This is the same IP address you captured
# and used in the outbound section.
$cmd 360 allow udp from 172.19.17.22 to any 68 in via $pif
keep-state

# Allow in standard www function because I have apache server
$cmd 370 allow tcp from any to me 80 in via $pif setup limit
src-addr 2
$cmd 370 allow tcp from any to me 8888 in via $pif setup limit
src-addr 2

# Allow in secure FTP, Telnet, and SCP from public Internet
$cmd 380 allow tcp from any to me 22 in via $pif setup limit
src-addr 2

# Allow in non-secure Telnet session from public Internet
# labeled non-secure because ID & PW are passed over public
# internet as clear text.
# Delete this sample group if you do not have telnet server enabled.
# $cmd 390 allow tcp from any to me 23 in via $pif setup limit
src-addr 2

# Reject & Log all unauthorized incoming connections from the public
internet
$cmd 500 deny log all from any to any in via $pif

# Reject & Log all unauthorized out going connections to the public
internet

$cmd 550 deny log all from any to any out via $pif

# This is skipto location for outbound stateful rules
$cmd 800 divert natd ip from any to any out via $pif
$cmd 801 allow ip from any to any

# Everything else is denied by default
# deny and log all packets that fell through to see what they are
$cmd 999 deny log all from any to any


################ End of IPFW rules file
###############################

Here's all of today's security ouput:

Jul 31 07:50:36 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:1649
193.0.14.129:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:2671
68.105.161.20:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:1042
68.1.18.25:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4365
68.10.16.30:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:2365
68.105.161.20:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4325
68.1.18.25:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:3378
68.10.16.30:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:2952
68.105.161.20:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:1359
68.1.18.25:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4738
68.10.16.30:53 out via dc1
Jul 31 07:50:37 sara /kernel: ipfw: limit 10 reached on entry 550
Jul 31 07:51:42 sara /kernel: ipfw: 500 Deny TCP 81.56.103.50:3860
68.105.58.150:21 in via dc1
Jul 31 07:51:51 sara last message repeated 2 times
Jul 31 07:53:15 sara /kernel: ipfw: 500 Deny TCP 81.56.103.50:3875
68.105.58.150:21 in via dc1
Jul 31 07:53:24 sara last message repeated 2 times
Jul 31 07:53:32 sara /kernel: ipfw: 500 Deny TCP 81.56.103.50:3878
68.105.58.150:21 in via dc1
Jul 31 07:53:41 sara last message repeated 2 times
Jul 31 07:53:44 sara /kernel: ipfw: 500 Deny TCP 81.56.103.50:3881
68.105.58.150:21 in via dc1
Jul 31 07:53:44 sara /kernel: ipfw: limit 10 reached on entry 500
Jul 31 08:13:35 sara /kernel: ipfw: 65000 Deny UDP 68.1.18.25:53
192.168.1.102:3232 in via dc1
Jul 31 08:13:35 sara /kernel: ipfw: 65000 Deny UDP 68.105.161.20:53
192.168.1.102:3232 in via dc1
Jul 31 08:14:33 sara /kernel: ipfw: 65000 Deny UDP 10.2.184.1:67
255.255.255.255:68 in via dc1
Jul 31 08:15:28 sara last message repeated 2 times
Jul 31 08:15:47 sara last message repeated 5 times
Jul 31 08:15:47 sara /kernel: ipfw: limit 10 reached on entry 65000
Jul 31 08:31:20 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:3534
198.41.0.4:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:3178
68.105.161.20:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4476
68.1.18.25:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4747
68.10.16.30:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4952
68.105.161.20:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:2260
68.1.18.25:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4087
68.10.16.30:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4914
68.105.161.20:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:1849
68.1.18.25:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:2220
68.10.16.30:53 out via dc1
Jul 31 08:31:21 sara /kernel: ipfw: limit 10 reached on entry 550

Here's rc.conf again:

# -- sysinstall generated deltas --
# Sun Jul  4 10:40:48 2004
# Created: Sun Jul  4 10:40:48 2004
# Enable network daemons for user convenience.
# Please make all changes to this file, not to
/etc/defaults/rc.conf.
# This file now contains just the overrides from
/etc/defaults/rc.conf.
hostname="sara.mshome.net"
ifconfig_dc1="DHCP"
ifconfig_dc0="inet 192.168.1.1 netmask 255.255.255.0"
firewall_enable="YES" firewall_script="/etc/ipfw.rules"
firewall_logging="YES"
kern_securelevel_enable="NO"
linux_enable="YES"
moused_enable="YES"
named_enable="YES"
nfs_client_enable="YES"
nfs_reserved_port_only="YES"
nfs_server_enable="YES"
sendmail_enable="YES"
sshd_enable="YES"
usbd_enable="YES"
ntpd_enable="YES"
inetd_enable="YES"
gateway_enable="YES"
natd_enable="YES"
natd_interface="dc1"
natd_flags="-dynamic"

Here's dmesg.boot:

Copyright (c) 1992-2004 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993,
1994
        The Regents of the University of California. All rights
reserved.
FreeBSD 4.10-RELEASE #8: Fri Jul 30 07:19:43 CDT 2004
    jcoulter@sara.mshome.net:/usr/obj/usr/src/sys/SARA
Timecounter "i8254"  frequency 1193182 Hz
CPU: Intel Celeron (634.78-MHz 686-class CPU)
  Origin = "GenuineIntel"  Id = 0x686  Stepping = 6

Features=0x383f9ff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,SEP,MTRR,PGE,M
CA,CMOV,
PAT,PSE36,MMX,FXSR,SSE>
real memory  = 134201344 (131056K bytes)
avail memory = 127057920 (124080K bytes)
Preloaded elf kernel "kernel" at 0xc0381000.
Pentium Pro MTRR support enabled
md0: Malloc disk
Using $PIR table, 8 entries at 0xc00f0e80
npx0: <math processor> on motherboard
npx0: INT 16 interface
pcib0: <Intel 82443BX (440 BX) host to PCI bridge> on motherboard
pci0: <PCI bus> on pcib0
agp0: <Intel 82443BX (440 BX) host to PCI bridge> mem
0xe4000000-0xe7ffffff
at device 0.0 on pci0
pcib1: <Intel 82443BX (440 BX) PCI-PCI (AGP) bridge> at device 1.0
on pci0
pci1: <PCI bus> on pcib1
pci1: <ATI Mach64-GB graphics accelerator> at 0.0 irq 11
isab0: <Intel 82371AB PCI to ISA bridge> at device 4.0 on pci0
isa0: <ISA bus> on isab0
atapci0: <Intel PIIX4 ATA33 controller> port 0xb800-0xb80f at device
4.1 on
pci0
ata0: at 0x1f0 irq 14 on atapci0
ata1: at 0x170 irq 15 on atapci0
uhci0: <Intel 82371AB/EB (PIIX4) USB controller> port 0xb400-0xb41f
irq 9 at
device 4.2 on pci0
usb0: <Intel 82371AB/EB (PIIX4) USB controller> on uhci0
usb0: USB revision 1.0
uhub0: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1
uhub0: 2 ports with 2 removable, self powered
chip0: <Intel 82371AB Power management controller> port
0xe800-0xe80f at
device 4.3 on pci0
dc0: <ADMtek AN985 10/100BaseTX> port 0xb000-0xb0ff mem
0xe1000000-0xe10003ff irq 12 at device 10.0 on pci0
dc0: Ethernet address: 00:04:5a:76:55:f0
miibus0: <MII bus> on dc0
ukphy0: <Generic IEEE 802.3u media interface> on miibus0
ukphy0:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto
dc1: <LC82C115 PNIC II 10/100BaseTX> port 0xa800-0xa8ff mem
0xe0800000-0xe08000ff irq 10 at device 11.0 on pci0
dc1: Ethernet address: 00:a0:cc:33:e1:f6
miibus1: <MII bus> on dc1
dcphy0: <Intel 21143 NWAY media interface> on miibus1
dcphy0:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto
isa0: too many dependant configs (8)
isa0: unexpected small tag 14
orm0: <Option ROM> at iomem 0xc0000-0xc7fff on isa0
pmtimer0 on isa0
fdc0: <NEC 72065B or clone> at port 0x3f0-0x3f5,0x3f7 irq 6 drq 2 on
isa0
fdc0: FIFO enabled, 8 bytes threshold
fd0: <1440-KB 3.5" drive> on fdc0 drive 0
atkbdc0: <Keyboard controller (i8042)> at port 0x60,0x64 on isa0
atkbd0: <AT Keyboard> flags 0x1 irq 1 on atkbdc0
kbd0 at atkbd0
vga0: <Generic ISA VGA> at port 0x3c0-0x3df iomem 0xa0000-0xbffff on
isa0
sc0: <System console> at flags 0x100 on isa0
sc0: VGA <16 virtual consoles, flags=0x300>
sio0 at port 0x3f8-0x3ff irq 4 flags 0x10 on isa0
sio0: type 16550A
sio1 at port 0x2f8-0x2ff irq 3 on isa0
sio1: type 16550A
ppc0: <Parallel port> at port 0x378-0x37f irq 7 on isa0
ppc0: SMC-like chipset (ECP/EPP/PS2/NIBBLE) in COMPATIBLE mode
ppc0: FIFO with 16/16/9 bytes threshold
plip0: <PLIP network interface> on ppbus0
lpt0: <Printer> on ppbus0
lpt0: Interrupt-driven port
ppi0: <Parallel I/O> on ppbus0
IP packet filtering initialized, divert enabled, rule-based
forwarding
enabled, default to deny, logging limited to 10 packets/entry by
default
ad0: DMA limited to UDMA33, non-ATA66 cable or device
ad0: 19623MB <IBM-DTLA-305020> [39870/16/63] at ata0-master UDMA33
acd0: CDROM <SONY CD-ROM CDU4821> at ata0-slave PIO4
Mounting root from ufs:/dev/ad0s1a

Thanks,

Jim C.



> -----Original Message-----
> From: JJB [mailto:Barbish3@adelphia.net]
> Sent: Saturday, July 31, 2004 10:28 AM
> To: James A. Coulter; freebsd-questions@freebsd.org
> Subject: RE: Firewall Rule Set not allowing access to DNS servers?
>
>
> You better re-read what you posted in early post. You posted
> that dc1 is your outside NIC, which is connected to your
> cable modem which is connected to your ISP. Your outside NIC
> needs DHCP to get ip and dns info from your ISP. NOW YOU SAY
> dc1 IS INSIDE INTERFACE NAME.  Make up your mind which is correct.
>
> Verify you have correct  interface name coded in ipfw rules
> for NIC connected to cable modem and that the same NIC
> interface name is the one in rc.conf with DHCP option. When
> DHCP gets DNS info from ISP /etc/resolv.conf will auto
> updated with correct info. Read comments in sample firewall
> source and follow what comments say.  You are making this
> harder than it really is.
>
> Also there is no setup option on UDP packets just keepstate
>
> Post full contents of your current dmesg.boot, rc.conf,  ipfw
> rule set, and ipfw log files so people can see just want you
> have configured.  And answer question of how you are
> assigning ip address to LAN PCs? Also post output of ifconfig
> -a command after boot completes.
>
>
> -----Original Message-----
> From: owner-freebsd-questions@freebsd.org
> [mailto:owner-freebsd-questions@freebsd.org]On Behalf Of
> James A. Coulter
> Sent: Saturday, July 31, 2004 9:55 AM
> To: freebsd-questions@freebsd.org
> Cc: Barbish3@adelphia.net
> Subject: RE: Firewall Rule Set not allowing access to DNS servers?
>
> Thanks for the response. . .
>
> I changed rule 00005 from x10 to dc0 - thanks
>
> Not sure why I would want my inside nic requesting DHCP
> service from my ISP. It has been working fine in the
> configuration I have it so I've left it the way it is.
>
> I checked the security log, and found this:
>
> Jul 30 08:58:37 sara /kernel: ipfw: 450 Deny UDP
> 68.105.58.150:2609 68.105.161.20:53 out via dc1 Jul 30
> 08:58:37 sara /kernel: ipfw: 450 Deny UDP 68.105.58.150:4067
> 68.1.18.25:53 out via dc1 Jul 30 08:58:37 sara /kernel: ipfw:
> 450 Deny UDP 68.105.58.150:3773 68.10.16.30:53 out via dc1
>
> These are the three name servers specified in the rule set
>
> I checked the rule set and found this:
>
> # Allow out access to my ISP's Domain name server.
> # x.x.x.x must be the IP address of your ISP's DNS
> # Dup these lines if your ISP has more than one DNS server
> # Get the IP addresses from /etc/resolv.conf file
> $cmd 020 $skip tcp from any to 68.105.161.20 53 out via $pif
> setup keep-state $cmd 021 $skip tcp from any to 68.1.18.25 53
> out via $pif setup keep-state $cmd 022 $skip tcp from any to
> 68.10.16.30 53 out via $pif setup keep-state
>
> Because security said the firewall was denying UDP packets, I
> changed the rules to this:
>
> $cmd 020 $skip udp from any to 68.105.161.20 53 out via $pif
> setup keep-state $cmd 021 $skip udp from any to 68.1.18.25 53
> out via $pif setup keep-state $cmd 022 $skip udp from any to
> 68.10.16.30 53 out via $pif setup keep-state
>
> But that hasn't helped.  I'm still getting:
>
> Jul 31 08:31:21 sara /kernel: ipfw: 550 Deny UDP
> 68.105.58.150:3178 68.105.161.20:53 out via dc1 Jul 31
> 08:31:21 sara /kernel: ipfw: 550 Deny UDP 68.105.58.150:4476
> 68.1.18.25:53 out via dc1 Jul 31 08:31:21 sara /kernel: ipfw:
> 550 Deny UDP 68.105.58.150:4747 68.10.16.30:53 out via dc1
>
> FWIW, these rules are skipping to:
>
> # This is skipto location for outbound stateful rules
> $cmd 800 divert natd ip from any to any out via $pif
> $cmd 801 allow ip from any to any
>
> I apologize for being such a bother and I do appreciate any
> help or suggestions.
>
> TIA
>
> Jim C.
>
>
>
> > -----Original Message-----
> > From: owner-freebsd-questions@freebsd.org
> > [mailto:owner-freebsd-questions@freebsd.org] On Behalf Of JJB
> > Sent: Friday, July 30, 2004 1:20 PM
> > To: James A. Coulter; freebsd-questions@freebsd.org
> > Subject: RE: Firewall Rule Set not allowing access to DNS
servers?
> >
> >
> > Change this ipfw rule from
> >
> > 00005   allow ip from any to any via xl0
> >
> > To
> > 00005   allow ip from any to any via dc0
> >
> > because dc0 is the lan interface name and not xl0.
> >
> >
> > Change these statement in rc.conf because you have interface
name
> > backwards. Dc1 is the NIC connected to your cable modem and
> you want
> > to get DHCP info from your ISP. Dc0 is the NIC connected to
> your LAN.
> >
> > From
> > ifconfig_dc1="DHCP"
> > ifconfig_dc0="inet 192.168.1.1 netmask 255.255.255.0"
> >
> > to
> > ifconfig_dc0="DHCP"
> > ifconfig_dc1="inet 192.168.1.1 netmask 255.255.255.0"
> >
> >
> > You do not say how your LAN PCs get their ip address.
> > You can hard code them on each LAN PC
> > or you have to run isc-dhcp-server on your Gateway box to
> auto assign
> > ip address to LAN PCs.
> >
> >
> >
> >
> >
> >
> >
> > -----Original Message-----
> > From: owner-freebsd-questions@freebsd.org
> > [mailto:owner-freebsd-questions@freebsd.org]On Behalf Of James
A.
> > Coulter
> > Sent: Friday, July 30, 2004 10:56 AM
> > To: freebsd-questions@freebsd.org
> > Subject: Firewall Rule Set not allowing access to DNS servers?
> >
> > I am using FreeBSD 4.10 as a gateway/router for a small
> home LAN. My
> > outside interface (dc1) is connected to a cable modem and is
> > configured for DHCP.
> >
> > I have compiled and installed a custome kernel with IPFIREWALL
and
> > IPDIVERT options and with a rule set allowing any to any with no
> > problems
> >
> > I am in the process of adding a proper rule set to provide
> security. I
> > was referred to
> http://freebsd.a1poweruser.com:6088/FBSD_firewall/ and
> > installed the Stateful + NATD Rule Set modified for my
> > outside interface, domain name servers, and DHCP server.
> >
> > I can ping IP addresses and pass SMTP mail back and forth from
the
> > gateway/router and all machines on the LAN, but I cannot
> ping URLs - I
> > am getting "ping: cannot resolve
> > www.freebsd.org: Host name lookup failure" errors.
> >
> >
> > This is what ipfw -a list looks like:
> >
> > sara# ipfw -a list
> > 00005   0     0 allow ip from any to any via xl0
> > 00010  52  3640 allow ip from any to any via lo0
> > 00014   0     0 divert 8668 ip from any to any in recv dc1
> > 00015   0     0 check-state
> > 00020   0     0 skipto 800 tcp from any to 68.105.161.20 53
> > keep-state out
> > xmit dc1 setup
> > 00021   0     0 skipto 800 tcp from any to 68.1.18.25 53
> keep-state
> > out xmit
> > dc1 setup
> > 00022   0     0 skipto 800 tcp from any to 68.10.16.30 53
> keep-state
> > out
> > xmit dc1 setup
> > 00030   0     0 skipto 800 udp from any to 172.19.17.22 67
> > keep-state out
> > xmit dc1
> > 00040   0     0 skipto 800 tcp from any to any 80 keep-state out
> > xmit dc1
> > setup
> > 00050   0     0 skipto 800 tcp from any to any 443 keep-state
out
> > xmit dc1
> > setup
> > 00060   0     0 skipto 800 tcp from any to any 25 keep-state out
> > xmit dc1
> > setup
> > 00061   0     0 skipto 800 tcp from any to any 110 keep-state
out
> > xmit dc1
> > setup
> > 00070   0     0 skipto 800 tcp from me to any uid root
keep-state
> > out xmit
> > dc1 setup
> > 00080   0     0 skipto 800 icmp from any to any keep-state out
> xmit
> > dc1
> > 00090   0     0 skipto 800 tcp from any to any 37 keep-state out
> > xmit dc1
> > setup
> > 00100   0     0 skipto 800 tcp from any to any 119 keep-state
out
> > xmit dc1
> > setup
> > 00110   0     0 skipto 800 tcp from any to any 22 keep-state out
> > xmit dc1
> > setup
> > 00120   0     0 skipto 800 tcp from any to any 43 keep-state out
> > xmit dc1
> > setup
> > 00130   0     0 skipto 800 udp from any to any 123 keep-state
out
> > xmit dc1
> > 00300   0     0 deny ip from 192.168.0.0/16 to any in recv dc1
> > 00301   0     0 deny ip from 172.16.0.0/12 to any in recv dc1
> > 00302   0     0 deny ip from 10.0.0.0/8 to any in recv dc1
> > 00303   0     0 deny ip from 127.0.0.0/8 to any in recv dc1
> > 00304   0     0 deny ip from 0.0.0.0/8 to any in recv dc1
> > 00305   0     0 deny ip from 169.254.0.0/16 to any in recv dc1
> > 00306   0     0 deny ip from 192.0.2.0/24 to any in recv dc1
> > 00307   0     0 deny ip from 204.152.64.0/23 to any in recv dc1
> > 00308   0     0 deny ip from 224.0.0.0/3 to any in recv dc1
> > 00315   0     0 deny tcp from any to any 113 in recv dc1
> > 00320   0     0 deny tcp from any to any 137 in recv dc1
> > 00321   0     0 deny tcp from any to any 138 in recv dc1
> > 00322   0     0 deny tcp from any to any 139 in recv dc1
> > 00323   0     0 deny tcp from any to any 81 in recv dc1
> > 00330   0     0 deny ip from any to any in recv dc1 frag
> > 00332   0     0 deny tcp from any to any in recv dc1 established
> > 00360   0     0 allow udp from 172.19.17.22 to any 68 keep-state
> in
> > recv dc1
> > 00370   0     0 allow tcp from any to me 80 limit src-addr 2 in
> recv
> > dc1
> > setup
> > 00370   0     0 allow tcp from any to me 8888 limit src-addr 2
in
> > recv dc1
> > setup
> > 00380   0     0 allow tcp from any to me 22 limit src-addr 2 in
> recv
> > dc1
> > setup
> > 00400   0     0 deny log logamount 10 ip from any to any in recv
> dc1
> > 00450  81  5288 deny log logamount 10 ip from any to any out
xmit
> dc1
> > 00800   0     0 divert 8668 ip from any to any out xmit dc1
> > 00801 645 59255 allow ip from any to any
> > 00999   0     0 deny log logamount 10 ip from any to any
> > 65535   1   347 deny ip from any to any
> > This is what my /etc/rc.conf looks like:
> >
> > hostname="sara.mshome.net"
> > ifconfig_dc1="DHCP"
> > ifconfig_dc0="inet 192.168.1.1 netmask 255.255.255.0"
> > firewall_enable="YES" firewall_script="/etc/ipfw.rules"
> > firewall_logging="YES" kern_securelevel_enable="NO"
> linux_enable="YES"
> > moused_enable="YES" named_enable="YES" nfs_client_enable="YES"
> > nfs_reserved_port_only="YES" nfs_server_enable="YES"
> > sendmail_enable="YES" sshd_enable="YES" usbd_enable="YES"
> > ntpd_enable="YES" inetd_enable="YES" gateway_enable="YES"
> > natd_enable="YES" natd_interface="dc1" natd_flags="-dynamic"
> >
> > Finally, this is what /etc/resolv.conf looks like:
> >
> > sara# more /etc/resolv.conf
> > search pn.at.cox.net
> > nameserver 68.105.161.20
> > nameserver 68.1.18.25
> > nameserver 68.10.16.30
> >
> > Any ideas?
> >
> > Thanks,
> >
> > Jim C.
> >
> > _______________________________________________
> > freebsd-questions@freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> > To unsubscribe, send any mail to
> > "freebsd-questions-unsubscribe@freebsd.org"
> >
> > _______________________________________________
> > freebsd-questions@freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> > To unsubscribe, send any mail to
> > "freebsd-questions-unsubscribe@freebsd.org"
> >
>
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "freebsd-questions-unsubscribe@freebsd.org"
>
>

_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"freebsd-questions-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?MIEPLLIBMLEEABPDBIEGEEDDGIAA.Barbish3>